this post was submitted on 01 Aug 2023
254 points (98.8% liked)

Linux

48372 readers
1538 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 59 points 1 year ago* (last edited 1 year ago) (5 children)

[This comment has been deleted by an automated system]

[–] [email protected] 62 points 1 year ago (5 children)

This is why I keep my initrd tattooed as a barcode on my testicles.

[–] [email protected] 37 points 1 year ago

"Please teabag the web cam to boot."

[–] [email protected] 14 points 1 year ago

There's two types of users, those who write a detailed precise technical answer to the subject, and then there's you

[–] [email protected] 10 points 1 year ago

Kernel upgrades are very... Painful.

[–] [email protected] 4 points 1 year ago

You know, I've been thinking about what I want my first tattoo to be for months, you've just given me a great idea

[–] [email protected] 24 points 1 year ago (7 children)

I don't know why I keep hearing of security measures to stop someone sleuthing into bootloaders.

Am I the only person using Linux who isn't James Bond?

[–] [email protected] 17 points 1 year ago* (last edited 1 year ago)

[This comment has been deleted by an automated system]

[–] eager_eagle 11 points 1 year ago (2 children)

so you never caught a team of government officials in your living room brute forcing your bootloader at 4am as you got up to use the bathroom, huh. Lucky guy.

[–] [email protected] 5 points 1 year ago* (last edited 1 year ago)

Your government doesn't just hit you with a wrench?

[–] [email protected] 1 points 1 year ago

Silly Lemmy user, it’s 4am and I’m on Lemmy

[–] [email protected] 8 points 1 year ago (1 children)

I’m an engineer with trade secrets on his laptop. I’ve heard of dozens of people getting laptops stolen from their cars that they left for like ten or fifteen minutes.

The chances are slims, but if it happens I’m in deep trouble whether those secrets leak of not. I’m not taking the risk. I’m encrypting my disk.

It’s not like there’s a difference in performance nowadays.

[–] [email protected] 5 points 1 year ago (1 children)

TPM's not going to help with that situation, though, right? Either you're typing in your encryption password on boot (in which case you don't need TPM to keep your password), or you're not, in which case the thief has your TPM module with the password in it.

[–] [email protected] 2 points 1 year ago

From what I understand, TPM is "trusted" because of the fact the secrets it contains are supposed to be safe from an attacker with hardware access.

This is what makes it good at protecting data in case of a stolen laptop. This is also what makes it good at enforcing offline DRM or any kind of system where manufacturers can restrict the kind of software users can run on their hardware.

[–] [email protected] 3 points 1 year ago

It's 30% legitimate concern over a non-negligible risk of government overreach, 70% having fun pretending to be James Bond.

[–] [email protected] 1 points 1 year ago

I mean, i do have some stuff that i encrypt, but encrypting the folder or packing it on a small partitiin and encrypting only this fs after booting makes more sense to me.

[–] [email protected] -1 points 1 year ago (1 children)

I'm still on the hunt for a desktop Linux distro that has no security features or passwords. My usage for this may not be common but it can't be rare enough that there are zero options

[–] [email protected] 7 points 1 year ago (1 children)

Ubuntu, no encryption, select boot to desktop by default when the system installs.

Like, really?

[–] [email protected] 1 points 1 year ago (1 children)

Still smashing in passwords left and right

[–] [email protected] 1 points 1 year ago

Ah so you want the windows 98 experience, root access by default all the time without passwords or extra prompts.

Maybe setting auto login and sudo without password can be almost enough? https://askubuntu.com/questions/147241/execute-sudo-without-password

I agree that there should be an easy setting to at least allow updates without password. I installed Manjaro for my mom, after a while she complained "there are updates every day and I need to input the password too many times"

[–] [email protected] 7 points 1 year ago (1 children)

TPM bad, put your secrets on a proper encryption peripheral, like a smartcard running javacardOS

TPM will turn into cpu-bound DRM, the more you use it, the more this cancer will grow

[–] [email protected] 13 points 1 year ago* (last edited 1 year ago) (1 children)

[This comment has been deleted by an automated system]

[–] [email protected] 1 points 1 year ago (1 children)

You are only seeing what TPM is now. Not what TPM will become when it become an entire encrypted computing processor capable of executing any code while inspection is impossible.

Imagine denuvo running at ring level -1

[–] [email protected] 7 points 1 year ago* (last edited 1 year ago) (1 children)

[This comment has been deleted by an automated system]

[–] [email protected] 1 points 1 year ago (1 children)

Yes, it's right in the name "trusted platform module". There is no secret that their ambition is to become a space to run code outside the user's reach and scrutiny.

They start with the most legitimate and innocuous purpose. Once it is adopted and ubiquitous it will not suffer the fate of the other attempts and rotting on the vine.

Then surprise TPM 5.0 become full scale full speed trusted execution environment and it's too late to do anything about it. Eventually , non trusted processing capability will be phased out and only Intel and signed code will run.

[–] [email protected] 2 points 1 year ago

Trusting some obscure hardware might be a bad idea then.