this post was submitted on 11 Nov 2025
1377 points (98.8% liked)

linuxmemes

27990 readers
850 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack users for any reason. This includes using blanket terms, like "every user of thing".
  • Don't get baited into back-and-forth insults. We are not animals.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn, no politics, no trolling or ragebaiting.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, <loves/tolerates/hates> systemd, and wants to interject for a moment. You can stop now.
  • 5. πŸ‡¬πŸ‡§ Language/язык/Sprache
  • This is primarily an English-speaking community. πŸ‡¬πŸ‡§πŸ‡¦πŸ‡ΊπŸ‡ΊπŸ‡Έ
  • Comments written in other languages are allowed.
  • The substance of a post should be comprehensible for people who only speak English.
  • Titles and post bodies written in other languages will be allowed, but only as long as the above rule is observed.
  • 6. (NEW!) Regarding public figuresWe all have our opinions, and certain public figures can be divisive. Keep in mind that this is a community for memes and light-hearted fun, not for airing grievances or leveling accusations.
  • Keep discussions polite and free of disparagement.
  • We are never in possession of all of the facts. Defamatory comments will not be tolerated.
  • Discussions that get too heated will be locked and offending comments removed.
  • Β 

    Please report posts and comments that break these rules!


    Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't remove France.

    founded 2 years ago
    MODERATORS
    top 50 comments
    sorted by: hot top controversial new old
    [–] Olhonestjim@lemmy.world 1 points 1 day ago

    "Hang on, you mean to tell me this fucker barely uses the internet or TV at all anymore and instead just reads books and watches old films on disc? Like real books, not ghost-written memoirs of our favorite elites?"

    [–] Melvin_Ferd@lemmy.world 11 points 1 day ago

    I love this idea when in reality they probably have some Israeli 3rd party that they use that can just pop any system in under an hour regardless of any protection you think you have.

    [–] imetators@lemmy.dbzer0.com 31 points 2 days ago (6 children)

    Not a hackerman, but I really don't think that 12yo CPU is much more secure than a modern one.

    [–] Zeon@lemmy.world 6 points 1 day ago* (last edited 1 day ago)

    If we're talking about security, the newer CPUs have better microcode. Those older CPUs are vulnerable to attacks such as Spectre. Older boards supported by Libreboot, such as the Haswell boards (e.g., Dell 9020 OptiPlex), which support 100% free BIOS firmware, which is to be used in conjunction with 100% free software. If you do so, you will have more security, freedom, and privacy than any other modern consumer grade computer.

    Then again, these boards are old, so, given the microcode is old, if you're running a virtual machine with a bunch of malicious software, an attacker can potentially exploit your host's CPU and break out of that VM. Of course, determine your threat model. Are you running no JavaScript ever and only using libre software?

    A deblobbed kernel isn't great either in some cases, you may need some patches. For example, someone was able to exploit Intel's iGPU on these older boards and gain complete access to your machine. The only way to fix this is by using a blob. Though, if you strictly only use libre software, this wouldn't be a concern as much so you wouldn't need this blob.

    If you stick strictly to 100% free software, older hardware and a deblobbed kernel might be appropriate. But if you need to run blobs along with other proprietary software like JavaScript, the security provided by something like the Intel iGPU blob patch could be beneficial.

    [–] redsand@lemmy.dbzer0.com 6 points 2 days ago

    Probably a reference to coreboot systems and maybe RISC stuff like open SPARC.

    [–] Dragonstaff@leminal.space 6 points 2 days ago

    It will prevent you from doing a lot of the things that will get the NSA interested in you?

    Imagine trying to brute force a password on a Dell.

    [–] Valmond@lemmy.world 2 points 1 day ago

    Let them try yo hack my C64 ✊🏻🀘🏻

    [–] KeenFlame@feddit.nu 6 points 2 days ago

    A correct assumption

    load more comments (1 replies)
    [–] mech@feddit.org 86 points 2 days ago

    all the 3-letter agencies pool their resources
    billions of dollars are dumped into the project
    several years later they manage to decrypt all of this guy's communications
    it's nothing but chats about how to encrypt shit

    [–] hakunawazo@lemmy.world 72 points 2 days ago (10 children)
    load more comments (10 replies)
    [–] xxce2AAb@feddit.dk 296 points 3 days ago (6 children)

    "Well, we raided his mom's house and confiscated all his cobbled-together e-waste."

    "And!?"

    "His drives were encrypted. Apparently he 'applied PQC patches to dm-crypt himself', whatever that means. All I know is that it made the guys from NSA scream. There was nothing we could do."

    "So we've got nothing?"

    "Oh no. He happily gave us both the keyfile and the passphrase."

    "So..?"

    "No warez, no CSA, no political manifestos or illicit recipes. Not even tax evasion - it's not like he has an income. Just... copyleft source code as far as the eye could see."

    [–] piyuv@lemmy.world 118 points 3 days ago (2 children)

    I lol’d at this. But seriously, privacy is a fundamental human right. You don’t need to have something to hide to assert your right of privacy.

    [–] DeathsEmbrace@lemmy.world 24 points 3 days ago

    Yeah the government doesn't understand we don't want you to be sociopaths with the excuse of our safety.

    [–] Mongostein@lemmy.ca 1 points 1 day ago

    There’s also the issue of changing legality; what’s legal today might be illegal tomorrow

    [–] serenissi@lemmy.world 102 points 3 days ago (2 children)

    copyleft source code is a telltale sign of communism, thus anon can be associated with Big terrorist like the Antifa.

    [–] Skullgrid@lemmy.world 39 points 3 days ago

    open source collaborative software is anarchy. Book him

    load more comments (1 replies)
    load more comments (4 replies)
    [–] eldain@feddit.nl 70 points 3 days ago (2 children)

    Ah yes, a Linux teenagers power fantasy. Hardened Gentoo and Selinux beats deblobbing btw, noob.

    [–] dejected_warp_core@lemmy.world 21 points 2 days ago (6 children)

    Selinux

    Hey, let's not get crazy. I still want to use it for practical things, too. /s

    load more comments (6 replies)
    [–] redsand@lemmy.dbzer0.com 3 points 2 days ago (1 children)

    You've made me miss grsec and rbac again πŸ₯²

    [–] eldain@feddit.nl 2 points 1 day ago (1 children)

    Good old days :') I only noticed yesterday the grsec patches are no longer available, such a shame.

    load more comments (1 replies)
    [–] UnderpantsWeevil@lemmy.world 69 points 3 days ago* (last edited 3 days ago) (5 children)

    check the IP logs

    Its all encrypted? This guy uses VPNs and Tor?

    Presuming that Mossad can be topped with a subscription to ProtonVPN or a Tor browser is adorable. Hell, presuming nobody in the intelligence services is familiar with Linux is even more adorable. "We've got everyone at the NSA fooled because we're Arch users". Yeah, sure buddy. What do you think these professional computer nerds are doing in their own free time?

    Where do you even think encrypted applications come from?

    [–] IronBird@lemmy.world 31 points 3 days ago* (last edited 3 days ago) (2 children)

    most of these security agencies effectiveness is just in the myth's they've built around themselves of actually being effective.

    mossad in particular, just has a complete disregard for killing innocents and a really good propaganda wing to suppress all their fuckups.

    most killers are not right in the head, they act on pure emotion, they post "i am going kill X" online to their social media of choice the night before going to kill X...it's dumb as shit. that's how low the bar is on utilizing violence

    fact is lone wolf threats are practically unstoppable, especially if they have a modicum of competency

    this is also why it's said killing gets easier/"first ones the hardest" etc. even if your not some sociopath (which, most people as a whole arent)...once you know and understand just how easy it is to kill people and get away with it...lot of the worlds problems start to look like they have very easy solutions...

    load more comments (2 replies)
    load more comments (4 replies)
    [–] tuckerm@feddit.online 187 points 3 days ago (11 children)

    Linux nerds literally only want one thing and it's fucking the idea that your full disk encryption will pay off one day.

    [–] django@discuss.tchncs.de 88 points 3 days ago (1 children)

    It's when your disk breaks and you can just throw it away without worries.

    load more comments (1 replies)
    load more comments (10 replies)
    [–] SCmSTR@lemmy.blahaj.zone 25 points 2 days ago (6 children)

    The extent some people go to refuse their privacy being stepped on. These people like this are pathetic. /s

    BRO JUST LET THEM DO WHATEVER THEY WANT YOU'LL BE FINE AS LONG AS

    Y O U H A V E N O T H I N G T O H I D E

    [–] Dragonstaff@leminal.space 4 points 2 days ago

    Frankly, I think the people with more to hide are more virtuous than I. Labor organizers, activists, etc. If you're working to overthrow my country, awesome. Best of luck to you.

    But it's also fair to say most of us will not truly benefit from writing a custom boot loader and after a certain point this is just a hobby.

    [–] waspentalive@lemmy.world 2 points 1 day ago

    Ah, the call of the total information warrior - "If you have done nothing wrong, you have nothing to hide": do they track your phone wherever you drive? Ever drive past a crime in progress unknowingly? Can you prove you were not participating in the crime? Even if it is the dead of night in the warehouse district on your way home from work?

    [–] humorlessrepost@lemmy.world 10 points 2 days ago (1 children)

    At least there are cameras tracking everyone’s movements now.

    And local cash-accepting taxi companies have been replaced by two cooperative companies, so that loophole is almost closed.

    [–] Melvin_Ferd@lemmy.world 2 points 1 day ago

    For me it's because you all never went far enough. It's not about data privacy. It was always about data scarcity. You all wanted content creators to get paid while also using that same platform to keep your stuff private. Except the way content creators get paid is working for websites and corporations that steal your data and create profiles that information brokers can trade amongst themselves to build larger profiles where they don't even need you to use any of their systems just to build your profile. But you like random bearded guy that makes cat comics. We should have always been hostile to anyone using the internet to create content in order to sell it.

    load more comments (2 replies)
    [–] The_Picard_Maneuver@piefed.world 61 points 3 days ago (6 children)

    "His fucking kernel is deblobbed too?"

    As a noob, I genuinely can't tell if this is real jargon or not

    [–] towerful@programming.dev 72 points 3 days ago* (last edited 3 days ago) (6 children)

    It's referring to binary blobs. A windows exe might be a binary blob.
    These are distributed compiled. Even if the project is open sources, the binary blob might have been generated by a compromised compiler.

    This is one of the reasons the XZ Utils compromisation went unnoticed for so long. One of the compressed files used for testing contained malicious code that would be included in the build artefacts (IE, the final compiled binary) under very narrow and specific circumstances.

    So "deblobbed" means absolutely everything in the OS was built & compiled on their computer from original source code

    Thanks! I wonder if I will ever reach that level of privacy paranoia. At the rate that I'm going, maybe 5 years.

    load more comments (5 replies)
    load more comments (5 replies)
    [–] ExtremeUnicorn@feddit.org 81 points 3 days ago (8 children)

    I'm in this post and I like it.

    load more comments (8 replies)
    [–] neox_@sh.itjust.works 6 points 2 days ago* (last edited 2 days ago)

    I'm like this post but I use GNU Guix System instead of Gentoo and GNU Boot instead of the old fully free Libreboot (and I have my own appartment lol).

    [–] halvar@lemy.lol 42 points 3 days ago

    Last line should have been "we cant he lives on the street"

    [–] Franconian_Nomad@feddit.org 57 points 3 days ago

    12 hours a day on his computer

    Those are rookie numbers, he has to get his game up.

    [–] mlg@lemmy.world 24 points 3 days ago

    Can't have ring -3 vulnerabilities if your CPU doesn't have a ring -3

    I don't know, but I'm down with the clown... oh sorry, I thought you asked what was a Juggalo

    [–] Fontasia@feddit.nl 12 points 2 days ago

    Literally just spends all day commenting hacker news posts

    [–] 2910000@lemmy.world 37 points 3 days ago (2 children)

    They missed out the firmware in the WiFi adapter

    load more comments (2 replies)
    load more comments
    view more: next β€Ί