this post was submitted on 11 Nov 2025
1492 points (98.8% liked)

linuxmemes

28233 readers
820 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack users for any reason. This includes using blanket terms, like "every user of thing".
  • Don't get baited into back-and-forth insults. We are not animals.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn, no politics, no trolling or ragebaiting.
  • Don't come looking for advice, this is not the right community.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, <loves/tolerates/hates> systemd, and wants to interject for a moment. You can stop now.
  • 5. πŸ‡¬πŸ‡§ Language/язык/Sprache
  • This is primarily an English-speaking community. πŸ‡¬πŸ‡§πŸ‡¦πŸ‡ΊπŸ‡ΊπŸ‡Έ
  • Comments written in other languages are allowed.
  • The substance of a post should be comprehensible for people who only speak English.
  • Titles and post bodies written in other languages will be allowed, but only as long as the above rule is observed.
  • 6. (NEW!) Regarding public figuresWe all have our opinions, and certain public figures can be divisive. Keep in mind that this is a community for memes and light-hearted fun, not for airing grievances or leveling accusations.
  • Keep discussions polite and free of disparagement.
  • We are never in possession of all of the facts. Defamatory comments will not be tolerated.
  • Discussions that get too heated will be locked and offending comments removed.
  • Β 

    Please report posts and comments that break these rules!


    Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't remove France.

    founded 2 years ago
    MODERATORS
     
    top 50 comments
    sorted by: hot top controversial new old
    [–] Samsy@lemmy.ml 395 points 3 weeks ago (10 children)
    [–] Axolotl_cpp@feddit.it 85 points 3 weeks ago (1 children)

    What if i don't remember my own password?

    [–] pressanykeynow@lemmy.world 143 points 3 weeks ago (1 children)

    It says "until" so you'll be having plenty of time to remember it.

    [–] Axolotl_cpp@feddit.it 33 points 3 weeks ago* (last edited 3 weeks ago) (1 children)

    I'il probably have internal bleeding before i remember them

    [–] pressanykeynow@lemmy.world 48 points 3 weeks ago* (last edited 3 weeks ago) (3 children)

    Well in reality they will use waterboarding or some other technique that ensures suffering while not being life threatening. There's actually a great movie called Unthinkable about this.

    [–] tyler@programming.dev 23 points 3 weeks ago (1 children)

    That still doesn’t mean you’re gonna remember it. I forget my master password all the time. Torture would just ensure I’d forget it even worse.

    [–] Nalivai@lemmy.world 34 points 3 weeks ago (6 children)

    That's the whole thing with torture. It demonstrably doesn't work, but people who use it aren't the people who're concerned with scientific reality

    load more comments (6 replies)
    load more comments (2 replies)
    [–] Maxxie@piefed.blahaj.zone 43 points 3 weeks ago

    yes

    there was another crypto kidnapping (also in russia) a few years ago, they tortured him and got all his apes. DeFi, kinda scary

    [–] cole 18 points 3 weeks ago (4 children)

    give them the duress password gg

    load more comments (4 replies)
    [–] this@sh.itjust.works 15 points 3 weeks ago

    Feels more and more likely living in the land of freedum right now.

    load more comments (6 replies)
    [–] xxce2AAb@feddit.dk 322 points 3 weeks ago (6 children)

    "Well, we raided his mom's house and confiscated all his cobbled-together e-waste."

    "And!?"

    "His drives were encrypted. Apparently he 'applied PQC patches to dm-crypt himself', whatever that means. All I know is that it made the guys from NSA scream. There was nothing we could do."

    "So we've got nothing?"

    "Oh no. He happily gave us both the keyfile and the passphrase."

    "So..?"

    "No warez, no CSA, no political manifestos or illicit recipes. Not even tax evasion - it's not like he has an income. Just... copyleft source code as far as the eye could see."

    [–] piyuv@lemmy.world 131 points 3 weeks ago (2 children)

    I lol’d at this. But seriously, privacy is a fundamental human right. You don’t need to have something to hide to assert your right of privacy.

    [–] DeathsEmbrace@lemmy.world 28 points 3 weeks ago

    Yeah the government doesn't understand we don't want you to be sociopaths with the excuse of our safety.

    load more comments (1 replies)
    [–] serenissi@lemmy.world 106 points 3 weeks ago (2 children)

    copyleft source code is a telltale sign of communism, thus anon can be associated with Big terrorist like the Antifa.

    [–] Skullgrid@lemmy.world 40 points 3 weeks ago

    open source collaborative software is anarchy. Book him

    load more comments (1 replies)
    [–] rirus@feddit.org 20 points 3 weeks ago (2 children)

    Only Asymetric encryption, like PGP has Problems with Quantum Computers. Symmetric, like AES, used by dm-crypt is not affected by Quantum Computers. It doesn't rely on multiplied big prime numbers or stuff like that.

    load more comments (2 replies)
    [–] Valmond@lemmy.world 15 points 3 weeks ago

    FOSS gang rise up!

    load more comments (2 replies)
    [–] tuckerm@feddit.online 198 points 3 weeks ago (18 children)

    Linux nerds literally only want one thing and it's fucking the idea that your full disk encryption will pay off one day.

    [–] django@discuss.tchncs.de 92 points 3 weeks ago (1 children)

    It's when your disk breaks and you can just throw it away without worries.

    load more comments (1 replies)
    [–] bdonvr@thelemmy.club 28 points 3 weeks ago (2 children)

    It can, but most likely it only would if you're doing illegal shit and get caught. They'd search your place for evidence and FDE could keep them from discovering some things.

    But uh, if they got that far into investigating you then you're probably already screwed.

    [–] communism@lemmy.ml 49 points 3 weeks ago (1 children)

    Not true at all. Governments regularly raid political dissidents. It's a disciplinary tactic in and of itself. I've been raided for plenty of shit and never been convicted of any crime.

    [–] bdonvr@thelemmy.club 24 points 3 weeks ago* (last edited 3 weeks ago) (3 children)

    I mean the average dork not cool people like you (if you're being truthful)

    Persons of interest to governments should always be diligent.

    [–] communism@lemmy.ml 25 points 3 weeks ago (1 children)

    My point is that raids are for the purpose of gathering evidence. The way it usually works is that the state decides they want to criminalise you for something so they search your place for anything they can use to incriminate youβ€”not vice versa, ie they dont already have enough evidence to incriminate you when they plan the raid.

    I don't know about a majority of people, but with the rise of the far-right across many countries I think it is a significant number of people who are at risk of this, and I think it's rather short-sighted to assume only a small number of "cool people" are affected (thank you though). Like I am a nobody, I'm not famous, and there are lots of political organisers and militants like me you've never heard of being targeted for their political activities. You don't need to be a Snowden to have some degree of state interest in you, and most state repression (raids, incarceration, arrests, etc) is relatively cheap to dish out willy-nilly.

    load more comments (1 replies)
    load more comments (2 replies)
    [–] kalapala@sopuli.xyz 17 points 3 weeks ago

    Doesn't need to be a government but just common thiefs getting your computer and selling it to someone who knows what to look for.

    load more comments (16 replies)
    [–] mech@feddit.org 89 points 3 weeks ago

    all the 3-letter agencies pool their resources
    billions of dollars are dumped into the project
    several years later they manage to decrypt all of this guy's communications
    it's nothing but chats about how to encrypt shit

    [–] ExtremeUnicorn@feddit.org 85 points 3 weeks ago (9 children)

    I'm in this post and I like it.

    load more comments (9 replies)
    [–] hakunawazo@lemmy.world 78 points 3 weeks ago (10 children)
    load more comments (10 replies)
    [–] UnderpantsWeevil@lemmy.world 73 points 3 weeks ago* (last edited 3 weeks ago) (6 children)

    check the IP logs

    Its all encrypted? This guy uses VPNs and Tor?

    Presuming that Mossad can be topped with a subscription to ProtonVPN or a Tor browser is adorable. Hell, presuming nobody in the intelligence services is familiar with Linux is even more adorable. "We've got everyone at the NSA fooled because we're Arch users". Yeah, sure buddy. What do you think these professional computer nerds are doing in their own free time?

    Where do you even think encrypted applications come from?

    [–] IronBird@lemmy.world 33 points 3 weeks ago* (last edited 3 weeks ago) (2 children)

    most of these security agencies effectiveness is just in the myth's they've built around themselves of actually being effective.

    mossad in particular, just has a complete disregard for killing innocents and a really good propaganda wing to suppress all their fuckups.

    most killers are not right in the head, they act on pure emotion, they post "i am going kill X" online to their social media of choice the night before going to kill X...it's dumb as shit. that's how low the bar is on utilizing violence

    fact is lone wolf threats are practically unstoppable, especially if they have a modicum of competency

    this is also why it's said killing gets easier/"first ones the hardest" etc. even if your not some sociopath (which, most people as a whole arent)...once you know and understand just how easy it is to kill people and get away with it...lot of the worlds problems start to look like they have very easy solutions...

    load more comments (2 replies)
    load more comments (5 replies)
    [–] eldain@feddit.nl 71 points 3 weeks ago (4 children)

    Ah yes, a Linux teenagers power fantasy. Hardened Gentoo and Selinux beats deblobbing btw, noob.

    [–] dejected_warp_core@lemmy.world 22 points 3 weeks ago (6 children)

    Selinux

    Hey, let's not get crazy. I still want to use it for practical things, too. /s

    load more comments (6 replies)
    load more comments (3 replies)
    [–] The_Picard_Maneuver@piefed.world 65 points 3 weeks ago (6 children)

    "His fucking kernel is deblobbed too?"

    As a noob, I genuinely can't tell if this is real jargon or not

    [–] towerful@programming.dev 77 points 3 weeks ago* (last edited 3 weeks ago) (6 children)

    It's referring to binary blobs. A windows exe might be a binary blob.
    These are distributed compiled. Even if the project is open sources, the binary blob might have been generated by a compromised compiler.

    This is one of the reasons the XZ Utils compromisation went unnoticed for so long. One of the compressed files used for testing contained malicious code that would be included in the build artefacts (IE, the final compiled binary) under very narrow and specific circumstances.

    So "deblobbed" means absolutely everything in the OS was built & compiled on their computer from original source code

    Thanks! I wonder if I will ever reach that level of privacy paranoia. At the rate that I'm going, maybe 5 years.

    load more comments (5 replies)
    load more comments (5 replies)
    [–] Franconian_Nomad@feddit.org 63 points 3 weeks ago

    12 hours a day on his computer

    Those are rookie numbers, he has to get his game up.

    [–] halvar@lemy.lol 46 points 3 weeks ago

    Last line should have been "we cant he lives on the street"

    [–] 2910000@lemmy.world 40 points 3 weeks ago (6 children)

    They missed out the firmware in the WiFi adapter

    load more comments (6 replies)
    [–] DieserTypMatthias@lemmy.ml 38 points 3 weeks ago* (last edited 3 weeks ago) (2 children)
    [–] mojofrododojo@lemmy.world 23 points 3 weeks ago

    DOWN BY THE RIVER

    load more comments (1 replies)
    [–] imetators@lemmy.dbzer0.com 35 points 3 weeks ago (6 children)

    Not a hackerman, but I really don't think that 12yo CPU is much more secure than a modern one.

    load more comments (6 replies)
    [–] SCmSTR@lemmy.blahaj.zone 26 points 3 weeks ago (7 children)

    The extent some people go to refuse their privacy being stepped on. These people like this are pathetic. /s

    BRO JUST LET THEM DO WHATEVER THEY WANT YOU'LL BE FINE AS LONG AS

    Y O U H A V E N O T H I N G T O H I D E

    load more comments (7 replies)
    [–] mlg@lemmy.world 24 points 3 weeks ago

    Can't have ring -3 vulnerabilities if your CPU doesn't have a ring -3

    [–] eruchitanda@lemmy.world 21 points 3 weeks ago* (last edited 3 weeks ago) (1 children)

    This is cute and all, but I'll bet that <country-s-intel-agency> would have other ways to get into your computer.

    ​ edit: wrong ending bracket

    /rant: can we get angle brackets back for god sake?

    [–] redsand@lemmy.dbzer0.com 19 points 3 weeks ago (3 children)

    I got into gentoo because it made patching the kernel to hold luks keys in debug registers instead of RAM easier than Arch πŸ˜…

    load more comments (3 replies)
    load more comments
    view more: next β€Ί