this post was submitted on 04 Feb 2026
-37 points (19.7% liked)

Open Source

44065 readers
527 users here now

All about open source! Feel free to ask questions, and share news, and interesting stuff!

Useful Links

Rules

Related Communities

Community icon from opensource.org, but we are not affiliated with them.

founded 6 years ago
MODERATORS
 

Linux distros log a TON about what you're doing by default.

Tonnes of software uses systemd-journald to log errors, the bash shell saves everything you type into the terminal, and wtmp, btmp, utmp all track exactly who is logged in and when, and the kernel uses dmesg to log a bunch of stuff.

While the system isn't sending these logs to Microsoft or Google, anyone who gets into your system like police or hackers can see almost everything that you have been doing.

If you want to be private, you must disable them.

you are viewing a single comment's thread
view the rest of the comments
[–] antifa_ceo@lemmy.ml 28 points 11 hours ago* (last edited 11 hours ago) (1 children)

I disagree. If its keeping everything local it is inherently private. These system tools are there for security and auditing and troubleshooting. If you are worried about someone getting into your system and doing nefarious shit secure your device better don't disable OS level functionality.

[–] Zelaf@sopuli.xyz 15 points 11 hours ago (1 children)

If someone can read your journal logs and your kernel logs you're already fucked.

Dmesg requires root. The journal requires group permission. That would mean they're either hacked in remotely through either your account or through root. Or they have physical access. The latter which can be resolved using LUKS.

If someone is in remotely you're already screwed as that can mean they can easily get autostarting scripts going or malware.

[–] antifa_ceo@lemmy.ml 3 points 11 hours ago

Yeah agreed. You have much bigger problems to deal with if someone is getting access to these things without your permission.