this post was submitted on 11 Nov 2025
1455 points (98.7% liked)

linuxmemes

27979 readers
2317 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack users for any reason. This includes using blanket terms, like "every user of thing".
  • Don't get baited into back-and-forth insults. We are not animals.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn, no politics, no trolling or ragebaiting.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, <loves/tolerates/hates> systemd, and wants to interject for a moment. You can stop now.
  • 5. πŸ‡¬πŸ‡§ Language/язык/Sprache
  • This is primarily an English-speaking community. πŸ‡¬πŸ‡§πŸ‡¦πŸ‡ΊπŸ‡ΊπŸ‡Έ
  • Comments written in other languages are allowed.
  • The substance of a post should be comprehensible for people who only speak English.
  • Titles and post bodies written in other languages will be allowed, but only as long as the above rule is observed.
  • 6. (NEW!) Regarding public figuresWe all have our opinions, and certain public figures can be divisive. Keep in mind that this is a community for memes and light-hearted fun, not for airing grievances or leveling accusations.
  • Keep discussions polite and free of disparagement.
  • We are never in possession of all of the facts. Defamatory comments will not be tolerated.
  • Discussions that get too heated will be locked and offending comments removed.
  • Β 

    Please report posts and comments that break these rules!


    Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't remove France.

    founded 2 years ago
    MODERATORS
     
    top 50 comments
    sorted by: hot top controversial new old
    [–] Olhonestjim@lemmy.world 1 points 5 hours ago

    "Hang on, you mean to tell me this fucker barely uses the internet or TV at all anymore and instead just reads books and watches old films on disc? Like real books, not ghost-written memoirs of our favorite elites?"

    [–] Melvin_Ferd@lemmy.world 12 points 1 day ago

    I love this idea when in reality they probably have some Israeli 3rd party that they use that can just pop any system in under an hour regardless of any protection you think you have.

    [–] imetators@lemmy.dbzer0.com 34 points 1 day ago (6 children)

    Not a hackerman, but I really don't think that 12yo CPU is much more secure than a modern one.

    [–] Zeon@lemmy.world 7 points 1 day ago* (last edited 1 day ago)

    If we're talking about security, the newer CPUs have better microcode. Those older CPUs are vulnerable to attacks such as Spectre. Older boards supported by Libreboot, such as the Haswell boards (e.g., Dell 9020 OptiPlex), which support 100% free BIOS firmware, which is to be used in conjunction with 100% free software. If you do so, you will have more security, freedom, and privacy than any other modern consumer grade computer.

    Then again, these boards are old, so, given the microcode is old, if you're running a virtual machine with a bunch of malicious software, an attacker can potentially exploit your host's CPU and break out of that VM. Of course, determine your threat model. Are you running no JavaScript ever and only using libre software?

    A deblobbed kernel isn't great either in some cases, you may need some patches. For example, someone was able to exploit Intel's iGPU on these older boards and gain complete access to your machine. The only way to fix this is by using a blob. Though, if you strictly only use libre software, this wouldn't be a concern as much so you wouldn't need this blob.

    If you stick strictly to 100% free software, older hardware and a deblobbed kernel might be appropriate. But if you need to run blobs along with other proprietary software like JavaScript, the security provided by something like the Intel iGPU blob patch could be beneficial.

    [–] Dragonstaff@leminal.space 7 points 1 day ago

    It will prevent you from doing a lot of the things that will get the NSA interested in you?

    Imagine trying to brute force a password on a Dell.

    [–] redsand@lemmy.dbzer0.com 6 points 1 day ago

    Probably a reference to coreboot systems and maybe RISC stuff like open SPARC.

    [–] Valmond@lemmy.world 3 points 1 day ago

    Let them try yo hack my C64 ✊🏻🀘🏻

    [–] 0x0@lemmy.zip 2 points 1 day ago

    Older ThinkPads had socketed CPUs, allowing you to upgrade to pre-IME Intel chips.

    [–] KeenFlame@feddit.nu 7 points 1 day ago

    A correct assumption

    [–] mech@feddit.org 88 points 2 days ago

    all the 3-letter agencies pool their resources
    billions of dollars are dumped into the project
    several years later they manage to decrypt all of this guy's communications
    it's nothing but chats about how to encrypt shit

    [–] hakunawazo@lemmy.world 77 points 2 days ago (10 children)
    load more comments (10 replies)
    [–] neox_@sh.itjust.works 8 points 1 day ago* (last edited 1 day ago) (1 children)

    I'm like this post but I use GNU Guix System instead of Gentoo and GNU Boot instead of the old fully free Libreboot (and I have my own appartment lol).

    load more comments (1 replies)
    [–] SCmSTR@lemmy.blahaj.zone 26 points 1 day ago (6 children)

    The extent some people go to refuse their privacy being stepped on. These people like this are pathetic. /s

    BRO JUST LET THEM DO WHATEVER THEY WANT YOU'LL BE FINE AS LONG AS

    Y O U H A V E N O T H I N G T O H I D E

    [–] Dragonstaff@leminal.space 4 points 1 day ago

    Frankly, I think the people with more to hide are more virtuous than I. Labor organizers, activists, etc. If you're working to overthrow my country, awesome. Best of luck to you.

    But it's also fair to say most of us will not truly benefit from writing a custom boot loader and after a certain point this is just a hobby.

    [–] waspentalive@lemmy.world 2 points 1 day ago

    Ah, the call of the total information warrior - "If you have done nothing wrong, you have nothing to hide": do they track your phone wherever you drive? Ever drive past a crime in progress unknowingly? Can you prove you were not participating in the crime? Even if it is the dead of night in the warehouse district on your way home from work?

    [–] Melvin_Ferd@lemmy.world 2 points 1 day ago

    For me it's because you all never went far enough. It's not about data privacy. It was always about data scarcity. You all wanted content creators to get paid while also using that same platform to keep your stuff private. Except the way content creators get paid is working for websites and corporations that steal your data and create profiles that information brokers can trade amongst themselves to build larger profiles where they don't even need you to use any of their systems just to build your profile. But you like random bearded guy that makes cat comics. We should have always been hostile to anyone using the internet to create content in order to sell it.

    load more comments (3 replies)
    [–] Fleur_@lemmynsfw.com 12 points 1 day ago
    • under investigation for ordering child sex dolls under their real name to their home address with their bank account and posting pictures with their face in it to reddit

    I don't know, but I'm down with the clown... oh sorry, I thought you asked what was a Juggalo

    [–] xxce2AAb@feddit.dk 313 points 2 days ago (8 children)

    "Well, we raided his mom's house and confiscated all his cobbled-together e-waste."

    "And!?"

    "His drives were encrypted. Apparently he 'applied PQC patches to dm-crypt himself', whatever that means. All I know is that it made the guys from NSA scream. There was nothing we could do."

    "So we've got nothing?"

    "Oh no. He happily gave us both the keyfile and the passphrase."

    "So..?"

    "No warez, no CSA, no political manifestos or illicit recipes. Not even tax evasion - it's not like he has an income. Just... copyleft source code as far as the eye could see."

    [–] piyuv@lemmy.world 124 points 2 days ago (2 children)

    I lol’d at this. But seriously, privacy is a fundamental human right. You don’t need to have something to hide to assert your right of privacy.

    [–] Mongostein@lemmy.ca 1 points 22 hours ago

    There’s also the issue of changing legality; what’s legal today might be illegal tomorrow

    load more comments (1 replies)
    [–] serenissi@lemmy.world 105 points 2 days ago (2 children)

    copyleft source code is a telltale sign of communism, thus anon can be associated with Big terrorist like the Antifa.

    load more comments (2 replies)
    load more comments (6 replies)
    [–] Samsy@lemmy.ml 382 points 2 days ago (27 children)
    [–] mika_mika@lemmy.world 2 points 1 day ago

    It's cute that anyone thinks situation 2 would be necessary and that encryption couldn't be broken with the press of a button if someone seriously wanted your info.

    Fantasy land.

    Privacy is a human right, but our rights were eroded long ago.

    [–] redsand@lemmy.dbzer0.com 3 points 1 day ago

    Anyone remember rubberhoseFS or Veracrypt multiple hidden vols?

    load more comments (25 replies)
    [–] eldain@feddit.nl 71 points 2 days ago (2 children)

    Ah yes, a Linux teenagers power fantasy. Hardened Gentoo and Selinux beats deblobbing btw, noob.

    [–] redsand@lemmy.dbzer0.com 3 points 1 day ago (1 children)

    You've made me miss grsec and rbac again πŸ₯²

    [–] eldain@feddit.nl 2 points 1 day ago (1 children)

    Good old days :') I only noticed yesterday the grsec patches are no longer available, such a shame.

    [–] redsand@lemmy.dbzer0.com 1 points 23 hours ago

    The maintainer had an epic meltdown over hardware vendors using the code and both breaking the license agreement and implementing it wrong so it didn't work right.

    [–] dejected_warp_core@lemmy.world 22 points 2 days ago (6 children)

    Selinux

    Hey, let's not get crazy. I still want to use it for practical things, too. /s

    load more comments (6 replies)
    [–] UnderpantsWeevil@lemmy.world 72 points 2 days ago* (last edited 2 days ago) (6 children)

    check the IP logs

    Its all encrypted? This guy uses VPNs and Tor?

    Presuming that Mossad can be topped with a subscription to ProtonVPN or a Tor browser is adorable. Hell, presuming nobody in the intelligence services is familiar with Linux is even more adorable. "We've got everyone at the NSA fooled because we're Arch users". Yeah, sure buddy. What do you think these professional computer nerds are doing in their own free time?

    Where do you even think encrypted applications come from?

    [–] IronBird@lemmy.world 32 points 2 days ago* (last edited 2 days ago) (2 children)

    most of these security agencies effectiveness is just in the myth's they've built around themselves of actually being effective.

    mossad in particular, just has a complete disregard for killing innocents and a really good propaganda wing to suppress all their fuckups.

    most killers are not right in the head, they act on pure emotion, they post "i am going kill X" online to their social media of choice the night before going to kill X...it's dumb as shit. that's how low the bar is on utilizing violence

    fact is lone wolf threats are practically unstoppable, especially if they have a modicum of competency

    this is also why it's said killing gets easier/"first ones the hardest" etc. even if your not some sociopath (which, most people as a whole arent)...once you know and understand just how easy it is to kill people and get away with it...lot of the worlds problems start to look like they have very easy solutions...

    load more comments (2 replies)
    load more comments (5 replies)
    [–] The_Picard_Maneuver@piefed.world 65 points 2 days ago (6 children)

    "His fucking kernel is deblobbed too?"

    As a noob, I genuinely can't tell if this is real jargon or not

    [–] towerful@programming.dev 77 points 2 days ago* (last edited 2 days ago) (6 children)

    It's referring to binary blobs. A windows exe might be a binary blob.
    These are distributed compiled. Even if the project is open sources, the binary blob might have been generated by a compromised compiler.

    This is one of the reasons the XZ Utils compromisation went unnoticed for so long. One of the compressed files used for testing contained malicious code that would be included in the build artefacts (IE, the final compiled binary) under very narrow and specific circumstances.

    So "deblobbed" means absolutely everything in the OS was built & compiled on their computer from original source code

    load more comments (6 replies)
    load more comments (5 replies)
    [–] tuckerm@feddit.online 196 points 2 days ago (26 children)

    Linux nerds literally only want one thing and it's fucking the idea that your full disk encryption will pay off one day.

    load more comments (26 replies)
    [–] ExtremeUnicorn@feddit.org 85 points 2 days ago (9 children)

    I'm in this post and I like it.

    load more comments (9 replies)
    load more comments
    view more: next β€Ί