• SCmSTR@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    3
    ·
    2 hours ago

    The extent some people go to refuse their privacy being stepped on. These people like this are pathetic. /s

    BRO JUST LET THEM DO WHATEVER THEY WANT YOU’LL BE FINE AS LONG AS

    Y O U H A V E N O T H I N G T O H I D E

    • humorlessrepost@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 hours ago

      At least there are cameras tracking everyone’s movements now.

      And local cash-accepting taxi companies have been replaced by two cooperative companies, so that loophole is almost closed.

  • mech@feddit.org
    link
    fedilink
    arrow-up
    43
    ·
    7 hours ago

    all the 3-letter agencies pool their resources
    billions of dollars are dumped into the project
    several years later they manage to decrypt all of this guy’s communications
    it’s nothing but chats about how to encrypt shit

  • eldain@feddit.nl
    link
    fedilink
    arrow-up
    54
    ·
    11 hours ago

    Ah yes, a Linux teenagers power fantasy. Hardened Gentoo and Selinux beats deblobbing btw, noob.

      • eldain@feddit.nl
        link
        fedilink
        arrow-up
        3
        ·
        4 hours ago

        You can’t impress me with a bog standard Gentoo. If you want to show power, build a fortress. At least put some tripwire you mostly trip yourself on (program that keeps an encrypted hash database of your system files to find intrusion changes, needs an update with every update of course or it alerts only your negligence).

        • Petter1@discuss.tchncs.de
          link
          fedilink
          arrow-up
          1
          ·
          2 hours ago

          Tripwire should encrypt everything and store key in RAM. Shutdown after 30s, if not emergency overwrite string is entered stored coded on real life paper in a vault with a 9 digits alphanumeric lock. 😏

  • UnderpantsWeevil@lemmy.world
    link
    fedilink
    English
    arrow-up
    59
    arrow-down
    2
    ·
    edit-2
    12 hours ago

    check the IP logs

    Its all encrypted? This guy uses VPNs and Tor?

    Presuming that Mossad can be topped with a subscription to ProtonVPN or a Tor browser is adorable. Hell, presuming nobody in the intelligence services is familiar with Linux is even more adorable. “We’ve got everyone at the NSA fooled because we’re Arch users”. Yeah, sure buddy. What do you think these professional computer nerds are doing in their own free time?

    Where do you even think encrypted applications come from?

    • IronBird@lemmy.world
      link
      fedilink
      arrow-up
      21
      arrow-down
      1
      ·
      edit-2
      11 hours ago

      most of these security agencies effectiveness is just in the myth’s they’ve built around themselves of actually being effective.

      mossad in particular, just has a complete disregard for killing innocents and a really good propaganda wing to suppress all their fuckups.

      most killers are not right in the head, they act on pure emotion, they post “i am going kill X” online to their social media of choice the night before going to kill X…it’s dumb as shit. that’s how low the bar is on utilizing violence

      fact is lone wolf threats are practically unstoppable, especially if they have a modicum of competency

      this is also why it’s said killing gets easier/“first ones the hardest” etc. even if your not some sociopath (which, most people as a whole arent)…once you know and understand just how easy it is to kill people and get away with it…lot of the worlds problems start to look like they have very easy solutions…

      • UnderpantsWeevil@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        ·
        10 hours ago

        I mean, tell it to Jeffery Epstein. The man was pulling strings halfway around the world with his endless supply of blackmail and bribery.

      • mirshafie@europe.pub
        link
        fedilink
        arrow-up
        6
        ·
        edit-2
        11 hours ago

        Also lots of killers seek psychiatric help voluntarily (and are often sadly ignored). For a sane, moderately competent person it’s easy to plan the perfect murder or terror attack – it’s a different thing to carry it through because a sane person also has mental guardrails.

        Mossad is effective because Israelis are ruthlessly trained to dehumanize anyone who’s an obstacle to their goals.

    • DeltaWingDragon@sh.itjust.works
      link
      fedilink
      arrow-up
      14
      ·
      11 hours ago

      From security agencies, presumably…

      Got me? No!

      Security agencies create encryption for their own usage. This means they want it to be mathematically as strong as possible, to protect their secrets from enemy security agencies. Why would they backdoor their own protection system?

      They’ll just go through the side door instead.

      • AnimalsDream@slrpnk.net
        link
        fedilink
        English
        arrow-up
        3
        ·
        7 hours ago

        The Snowden docs proved that the NSA was intentionally weakening some encryption standards to make them amenable for cracking.

        Then there’s also the constant pressure from the FBI to make it law that encryption technologies must have backdoors. These are both public record.

    • sunbytes@lemmy.world
      link
      fedilink
      arrow-up
      4
      ·
      11 hours ago

      I don’t think they’ll be prodigies or anything but they probably know literally one or two tricks or weaknesses that they heavily depend upon.

      So you can never really feel secure (that’s not to say take no caution).

    • AnimalsDream@slrpnk.net
      link
      fedilink
      English
      arrow-up
      4
      ·
      7 hours ago

      Tower’s explanation of blobs is kind of strange and not really correct. In a general sense a binary blob is just a situation where you have open-source software that is combined with proprietary components.

      Most relevant example to the meme is that the Linux kernel is open-source, but can sometimes contain drivers that are proprietary and don’t have source code available. Those proprietary drivers would be the blobs.

      As a counter-example, the linux-libre kernel that devfuuu linked to, is a version of the Linux kernel that has had all the blobs removed.

    • towerful@programming.dev
      link
      fedilink
      arrow-up
      63
      ·
      edit-2
      13 hours ago

      It’s referring to binary blobs. A windows exe might be a binary blob.
      These are distributed compiled. Even if the project is open sources, the binary blob might have been generated by a compromised compiler.

      This is one of the reasons the XZ Utils compromisation went unnoticed for so long. One of the compressed files used for testing contained malicious code that would be included in the build artefacts (IE, the final compiled binary) under very narrow and specific circumstances.

      So “deblobbed” means absolutely everything in the OS was built & compiled on their computer from original source code

  • mlg@lemmy.world
    link
    fedilink
    English
    arrow-up
    19
    ·
    12 hours ago

    Can’t have ring -3 vulnerabilities if your CPU doesn’t have a ring -3

    • Rai@lemmy.dbzer0.com
      link
      fedilink
      arrow-up
      3
      ·
      11 hours ago

      I legit spent the afternoon the other day installing Linux on my first non-Raspberry Pi machine since 2007. It is a 13 year old laptop with NVidia GPUs (2). It went perfectly smoothly and Linux sees both GPUs. I tried Megabonk on it and it runs at 60FPS maxed out. I encrypted the drive. Bless you, Pop!_OS

      • Illecors@lemmy.cafe
        link
        fedilink
        English
        arrow-up
        21
        ·
        16 hours ago

        I run Gentoo.

        It’s made my fundamentals stronger.

        It allows me to run the minimal number of codepaths.

        Every now and then it makes me happy. Sometimes proud of myself. All because I solved some problem that was helped by the mindset Gentoo had set up.

          • Illecors@lemmy.cafe
            link
            fedilink
            English
            arrow-up
            2
            ·
            10 hours ago

            I don’t know the size in bytes, haven’t cared much about it for some time now. It also very much depends on the definition of minimal. My minimal != your minimal.

            I’m referring to use flags, which allow me to not have a bunch of features I don’t use compiled to begin with. Less code - fewer headaches.

      • mirshafie@europe.pub
        link
        fedilink
        arrow-up
        3
        ·
        11 hours ago

        Gentoo is fun and a nice way to learn more about computers. Their wiki and their community was really good when I was into it, I’m sure it still is. But compiling everything from scratch is quite demanding of your CPU and your time, so it’s not really something that you run as your daily driver for long.

  • redsand@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    18
    ·
    14 hours ago

    I got into gentoo because it made patching the kernel to hold luks keys in debug registers instead of RAM easier than Arch 😅

  • xxce2AAb@feddit.dk
    link
    fedilink
    arrow-up
    281
    ·
    21 hours ago

    “Well, we raided his mom’s house and confiscated all his cobbled-together e-waste.”

    “And!?”

    “His drives were encrypted. Apparently he ‘applied PQC patches to dm-crypt himself’, whatever that means. All I know is that it made the guys from NSA scream. There was nothing we could do.”

    “So we’ve got nothing?”

    “Oh no. He happily gave us both the keyfile and the passphrase.”

    “So…?”

    “No warez, no CSA, no political manifestos or illicit recipes. Not even tax evasion - it’s not like he has an income. Just… copyleft source code as far as the eye could see.”

  • tuckerm@feddit.online
    link
    fedilink
    English
    arrow-up
    181
    arrow-down
    1
    ·
    22 hours ago

    Linux nerds literally only want one thing and it’s fucking the idea that your full disk encryption will pay off one day.

    • UnderpantsWeevil@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      arrow-down
      1
      ·
      12 hours ago

      your full disk encryption will pay off one day

      They day you fuck up your password one too many times and lock yourself out of your own computer.

    • devfuuu@lemmy.world
      link
      fedilink
      arrow-up
      7
      ·
      13 hours ago

      It pays off the moment someone steals my bag with the laptop when I leave the office or coffe shop.

    • SorryQuick@lemmy.ca
      link
      fedilink
      arrow-up
      4
      ·
      12 hours ago

      Is there any reason to do full disk encryption, vs encrypting a single partiton or a folder with eCryptfs? It’s not like your /usr/bin, etc… needs to be encrypted, but encrypting it reduces performance.

      • CrackedLinuxISO@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        4
        ·
        edit-2
        8 hours ago

        Suppose you’re in some hypothetical country where torrenting is illegal. The presence of /usr/bin/qbittorrent on your disk could be enough to face charges. Unencrypted /var/log? Maybe they can see you’ve been running a cryptocurrency miner. There could be plenty of data outside of $HOME on your computer which a cop might try to use against you.

        In the most paranoid hypothetical scenario, someone could mount your unencrypted /usr/bin and replace openssl with a compromised version.

      • darklamer@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        6 hours ago

        Is there any reason to do full disk encryption, vs encrypting a single partiton or a folder with eCryptfs?

        One obvious reason is that it just is very simple to encrypt the entire disk and be done with it.

      • Ŝan@piefed.zip
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        9
        ·
        7 hours ago

        What’s þe fun in þat? I bought þe giant electromagnet electric media wiper for a reason.

    • bdonvr@thelemmy.club
      link
      fedilink
      arrow-up
      28
      arrow-down
      2
      ·
      19 hours ago

      It can, but most likely it only would if you’re doing illegal shit and get caught. They’d search your place for evidence and FDE could keep them from discovering some things.

      But uh, if they got that far into investigating you then you’re probably already screwed.

      • communism@lemmy.ml
        link
        fedilink
        arrow-up
        44
        ·
        18 hours ago

        Not true at all. Governments regularly raid political dissidents. It’s a disciplinary tactic in and of itself. I’ve been raided for plenty of shit and never been convicted of any crime.

        • bdonvr@thelemmy.club
          link
          fedilink
          arrow-up
          20
          ·
          edit-2
          17 hours ago

          I mean the average dork not cool people like you (if you’re being truthful)

          Persons of interest to governments should always be diligent.

          • communism@lemmy.ml
            link
            fedilink
            arrow-up
            19
            ·
            16 hours ago

            My point is that raids are for the purpose of gathering evidence. The way it usually works is that the state decides they want to criminalise you for something so they search your place for anything they can use to incriminate you—not vice versa, ie they dont already have enough evidence to incriminate you when they plan the raid.

            I don’t know about a majority of people, but with the rise of the far-right across many countries I think it is a significant number of people who are at risk of this, and I think it’s rather short-sighted to assume only a small number of “cool people” are affected (thank you though). Like I am a nobody, I’m not famous, and there are lots of political organisers and militants like me you’ve never heard of being targeted for their political activities. You don’t need to be a Snowden to have some degree of state interest in you, and most state repression (raids, incarceration, arrests, etc) is relatively cheap to dish out willy-nilly.

            • mlg@lemmy.world
              link
              fedilink
              English
              arrow-up
              3
              ·
              12 hours ago

              I think he’s over blowing the 5 dollar wrench method.

              Unless you live in a place where human rights are disregarded like every possible moment, they’d probably only resort to torturing you to gain access if they believe you are somehow connected or have ancillary evidence that points to you. IE that darkweb dude they tortured in Turkey to gain access to his encrypted laptop containing incriminating evidence.

              Otherwise they’ll just do a preemptive raid hoping that it leads to new information.

              Like right now border patrol has been forcing foreigners to show data on their mobile devices to see if you have any roasted vance memes so they can turn you away. But in many cases, it has been done because they already had you flagged as posting or sharing roasted vance memes online.

              Of course you could also always be in a craphole country where they’ll torture you anyway, regardless if they have any reason to believe you are connected to something, but simply due to the fact that you opted to use FDE or any practical security scheme.

          • MummysLittleBloodSlut@lemmy.blahaj.zone
            link
            fedilink
            English
            arrow-up
            12
            ·
            16 hours ago

            I know a nice middle aged mum whose house was raided by whatever the Australian SWAT team calls themselves at 2am. She’s basically considered a public enemy by the government. And the worst she’s ever been accused of is blocking traffic and using water-soluble spray chalk on buildings.

      • kalapala@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        16
        ·
        16 hours ago

        Doesn’t need to be a government but just common thiefs getting your computer and selling it to someone who knows what to look for.

    • chloroken@lemmy.ml
      link
      fedilink
      English
      arrow-up
      7
      arrow-down
      2
      ·
      21 hours ago

      That’s the best part, it can never really “pay off.” It can only mitigate. Hardly seems worth it to me. Alas.

        • chloroken@lemmy.ml
          link
          fedilink
          English
          arrow-up
          13
          arrow-down
          1
          ·
          19 hours ago

          I personally am only worried about data loss, not data theft. But I do take privacy relatively seriously nonetheless.

          • RaivoKulli@sopuli.xyz
            link
            fedilink
            arrow-up
            3
            ·
            19 hours ago

            I use different methods for both. Encryption so all of my logins and personal stuff isn’t lost if my laptop is stolen and backups to safeguars the important data.