this post was submitted on 11 Nov 2025
1448 points (98.7% liked)

linuxmemes

27979 readers
1268 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack users for any reason. This includes using blanket terms, like "every user of thing".
  • Don't get baited into back-and-forth insults. We are not animals.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn, no politics, no trolling or ragebaiting.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, <loves/tolerates/hates> systemd, and wants to interject for a moment. You can stop now.
  • 5. πŸ‡¬πŸ‡§ Language/язык/Sprache
  • This is primarily an English-speaking community. πŸ‡¬πŸ‡§πŸ‡¦πŸ‡ΊπŸ‡ΊπŸ‡Έ
  • Comments written in other languages are allowed.
  • The substance of a post should be comprehensible for people who only speak English.
  • Titles and post bodies written in other languages will be allowed, but only as long as the above rule is observed.
  • 6. (NEW!) Regarding public figuresWe all have our opinions, and certain public figures can be divisive. Keep in mind that this is a community for memes and light-hearted fun, not for airing grievances or leveling accusations.
  • Keep discussions polite and free of disparagement.
  • We are never in possession of all of the facts. Defamatory comments will not be tolerated.
  • Discussions that get too heated will be locked and offending comments removed.
  • Β 

    Please report posts and comments that break these rules!


    Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't remove France.

    founded 2 years ago
    MODERATORS
     
    top 50 comments
    sorted by: hot top controversial new old
    [–] Melvin_Ferd@lemmy.world 13 points 17 hours ago

    I love this idea when in reality they probably have some Israeli 3rd party that they use that can just pop any system in under an hour regardless of any protection you think you have.

    [–] imetators@lemmy.dbzer0.com 34 points 1 day ago (6 children)

    Not a hackerman, but I really don't think that 12yo CPU is much more secure than a modern one.

    [–] Zeon@lemmy.world 7 points 16 hours ago* (last edited 16 hours ago)

    If we're talking about security, the newer CPUs have better microcode. Those older CPUs are vulnerable to attacks such as Spectre. Older boards supported by Libreboot, such as the Haswell boards (e.g., Dell 9020 OptiPlex), which support 100% free BIOS firmware, which is to be used in conjunction with 100% free software. If you do so, you will have more security, freedom, and privacy than any other modern consumer grade computer.

    Then again, these boards are old, so, given the microcode is old, if you're running a virtual machine with a bunch of malicious software, an attacker can potentially exploit your host's CPU and break out of that VM. Of course, determine your threat model. Are you running no JavaScript ever and only using libre software?

    A deblobbed kernel isn't great either in some cases, you may need some patches. For example, someone was able to exploit Intel's iGPU on these older boards and gain complete access to your machine. The only way to fix this is by using a blob. Though, if you strictly only use libre software, this wouldn't be a concern as much so you wouldn't need this blob.

    If you stick strictly to 100% free software, older hardware and a deblobbed kernel might be appropriate. But if you need to run blobs along with other proprietary software like JavaScript, the security provided by something like the Intel iGPU blob patch could be beneficial.

    [–] Valmond@lemmy.world 3 points 16 hours ago

    Let them try yo hack my C64 ✊🏻🀘🏻

    [–] redsand@lemmy.dbzer0.com 6 points 20 hours ago

    Probably a reference to coreboot systems and maybe RISC stuff like open SPARC.

    [–] Dragonstaff@leminal.space 7 points 20 hours ago

    It will prevent you from doing a lot of the things that will get the NSA interested in you?

    Imagine trying to brute force a password on a Dell.

    [–] 0x0@lemmy.zip 2 points 16 hours ago

    Older ThinkPads had socketed CPUs, allowing you to upgrade to pre-IME Intel chips.

    [–] KeenFlame@feddit.nu 7 points 1 day ago

    A correct assumption

    [–] Aggravationstation@feddit.uk 2 points 17 hours ago

    I don't know, but I'm down with the clown... oh sorry, I thought you asked what was a Juggalo

    [–] neox_@sh.itjust.works 8 points 1 day ago* (last edited 1 day ago) (1 children)

    I'm like this post but I use GNU Guix System instead of Gentoo and GNU Boot instead of the old fully free Libreboot (and I have my own appartment lol).

    [–] greywolf0x1@lemmy.ml 3 points 1 day ago

    Hello, Fellow Guix-SD user.

    [–] mech@feddit.org 87 points 1 day ago

    all the 3-letter agencies pool their resources
    billions of dollars are dumped into the project
    several years later they manage to decrypt all of this guy's communications
    it's nothing but chats about how to encrypt shit

    [–] hakunawazo@lemmy.world 77 points 1 day ago (10 children)
    load more comments (10 replies)
    [–] Fleur_@lemmynsfw.com 12 points 1 day ago
    • under investigation for ordering child sex dolls under their real name to their home address with their bank account and posting pictures with their face in it to reddit
    [–] SCmSTR@lemmy.blahaj.zone 26 points 1 day ago (6 children)

    The extent some people go to refuse their privacy being stepped on. These people like this are pathetic. /s

    BRO JUST LET THEM DO WHATEVER THEY WANT YOU'LL BE FINE AS LONG AS

    Y O U H A V E N O T H I N G T O H I D E

    [–] waspentalive@lemmy.world 2 points 16 hours ago

    Ah, the call of the total information warrior - "If you have done nothing wrong, you have nothing to hide": do they track your phone wherever you drive? Ever drive past a crime in progress unknowingly? Can you prove you were not participating in the crime? Even if it is the dead of night in the warehouse district on your way home from work?

    [–] Melvin_Ferd@lemmy.world 2 points 17 hours ago

    For me it's because you all never went far enough. It's not about data privacy. It was always about data scarcity. You all wanted content creators to get paid while also using that same platform to keep your stuff private. Except the way content creators get paid is working for websites and corporations that steal your data and create profiles that information brokers can trade amongst themselves to build larger profiles where they don't even need you to use any of their systems just to build your profile. But you like random bearded guy that makes cat comics. We should have always been hostile to anyone using the internet to create content in order to sell it.

    [–] Dragonstaff@leminal.space 4 points 20 hours ago

    Frankly, I think the people with more to hide are more virtuous than I. Labor organizers, activists, etc. If you're working to overthrow my country, awesome. Best of luck to you.

    But it's also fair to say most of us will not truly benefit from writing a custom boot loader and after a certain point this is just a hobby.

    load more comments (3 replies)
    [–] eldain@feddit.nl 71 points 1 day ago (2 children)

    Ah yes, a Linux teenagers power fantasy. Hardened Gentoo and Selinux beats deblobbing btw, noob.

    [–] redsand@lemmy.dbzer0.com 3 points 20 hours ago (1 children)

    You've made me miss grsec and rbac again πŸ₯²

    [–] eldain@feddit.nl 2 points 13 hours ago (1 children)

    Good old days :') I only noticed yesterday the grsec patches are no longer available, such a shame.

    [–] redsand@lemmy.dbzer0.com 1 points 13 hours ago

    The maintainer had an epic meltdown over hardware vendors using the code and both breaking the license agreement and implementing it wrong so it didn't work right.

    [–] dejected_warp_core@lemmy.world 22 points 1 day ago (6 children)

    Selinux

    Hey, let's not get crazy. I still want to use it for practical things, too. /s

    load more comments (6 replies)
    [–] UnderpantsWeevil@lemmy.world 72 points 1 day ago* (last edited 1 day ago) (8 children)

    check the IP logs

    Its all encrypted? This guy uses VPNs and Tor?

    Presuming that Mossad can be topped with a subscription to ProtonVPN or a Tor browser is adorable. Hell, presuming nobody in the intelligence services is familiar with Linux is even more adorable. "We've got everyone at the NSA fooled because we're Arch users". Yeah, sure buddy. What do you think these professional computer nerds are doing in their own free time?

    Where do you even think encrypted applications come from?

    [–] CrabAndBroom@lemmy.ml 1 points 17 hours ago

    I tend to just operate on the principle of: I know my setup probably wouldn't hold up for a second if some sort of organized three-letter government body decided to focus on me, but my threat model is more the kind of general internet-sweeping surveillance fuckery that goes on. I'm not doing anything especially dodgy on the internet and I think messing around with privacy stuff is fun, so my security level is faintly absurd for what it is. I'm sure someone could crack it if they were determined enough, but I assume the amount of effort required relative to what you'd find would just make it pointless anyway.

    load more comments (7 replies)
    [–] xxce2AAb@feddit.dk 312 points 2 days ago (8 children)

    "Well, we raided his mom's house and confiscated all his cobbled-together e-waste."

    "And!?"

    "His drives were encrypted. Apparently he 'applied PQC patches to dm-crypt himself', whatever that means. All I know is that it made the guys from NSA scream. There was nothing we could do."

    "So we've got nothing?"

    "Oh no. He happily gave us both the keyfile and the passphrase."

    "So..?"

    "No warez, no CSA, no political manifestos or illicit recipes. Not even tax evasion - it's not like he has an income. Just... copyleft source code as far as the eye could see."

    [–] piyuv@lemmy.world 123 points 2 days ago (2 children)

    I lol’d at this. But seriously, privacy is a fundamental human right. You don’t need to have something to hide to assert your right of privacy.

    [–] Mongostein@lemmy.ca 1 points 11 hours ago

    There’s also the issue of changing legality; what’s legal today might be illegal tomorrow

    load more comments (1 replies)
    [–] serenissi@lemmy.world 104 points 2 days ago (2 children)

    copyleft source code is a telltale sign of communism, thus anon can be associated with Big terrorist like the Antifa.

    load more comments (2 replies)
    load more comments (6 replies)
    [–] Samsy@lemmy.ml 380 points 2 days ago (27 children)
    [–] mika_mika@lemmy.world 1 points 15 hours ago

    It's cute that anyone thinks situation 2 would be necessary and that encryption couldn't be broken with the press of a button if someone seriously wanted your info.

    Fantasy land.

    Privacy is a human right, but our rights were eroded long ago.

    [–] redsand@lemmy.dbzer0.com 2 points 20 hours ago

    Anyone remember rubberhoseFS or Veracrypt multiple hidden vols?

    load more comments (25 replies)
    [–] The_Picard_Maneuver@piefed.world 65 points 1 day ago (6 children)

    "His fucking kernel is deblobbed too?"

    As a noob, I genuinely can't tell if this is real jargon or not

    [–] towerful@programming.dev 77 points 1 day ago* (last edited 1 day ago) (6 children)

    It's referring to binary blobs. A windows exe might be a binary blob.
    These are distributed compiled. Even if the project is open sources, the binary blob might have been generated by a compromised compiler.

    This is one of the reasons the XZ Utils compromisation went unnoticed for so long. One of the compressed files used for testing contained malicious code that would be included in the build artefacts (IE, the final compiled binary) under very narrow and specific circumstances.

    So "deblobbed" means absolutely everything in the OS was built & compiled on their computer from original source code

    load more comments (6 replies)
    load more comments (5 replies)
    [–] tuckerm@feddit.online 195 points 2 days ago (26 children)

    Linux nerds literally only want one thing and it's fucking the idea that your full disk encryption will pay off one day.

    load more comments (26 replies)
    load more comments
    view more: next β€Ί