• Olhonestjim@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    8 hours ago

    “Hang on, you mean to tell me this fucker barely uses the internet or TV at all anymore and instead just reads books and watches old films on disc? Like real books, not ghost-written memoirs of our favorite elites?”

  • Melvin_Ferd@lemmy.world
    link
    fedilink
    arrow-up
    11
    arrow-down
    1
    ·
    1 day ago

    I love this idea when in reality they probably have some Israeli 3rd party that they use that can just pop any system in under an hour regardless of any protection you think you have.

    • Zeon@lemmy.world
      link
      fedilink
      arrow-up
      6
      ·
      edit-2
      1 day ago

      If we’re talking about security, the newer CPUs have better microcode. Those older CPUs are vulnerable to attacks such as Spectre. Older boards supported by Libreboot, such as the Haswell boards (e.g., Dell 9020 OptiPlex), which support 100% free BIOS firmware, which is to be used in conjunction with 100% free software. If you do so, you will have more security, freedom, and privacy than any other modern consumer grade computer.

      Then again, these boards are old, so, given the microcode is old, if you’re running a virtual machine with a bunch of malicious software, an attacker can potentially exploit your host’s CPU and break out of that VM. Of course, determine your threat model. Are you running no JavaScript ever and only using libre software?

      A deblobbed kernel isn’t great either in some cases, you may need some patches. For example, someone was able to exploit Intel’s iGPU on these older boards and gain complete access to your machine. The only way to fix this is by using a blob. Though, if you strictly only use libre software, this wouldn’t be a concern as much so you wouldn’t need this blob.

      If you stick strictly to 100% free software, older hardware and a deblobbed kernel might be appropriate. But if you need to run blobs along with other proprietary software like JavaScript, the security provided by something like the Intel iGPU blob patch could be beneficial.

    • 0x0@lemmy.zip
      link
      fedilink
      arrow-up
      2
      ·
      1 day ago

      Older ThinkPads had socketed CPUs, allowing you to upgrade to pre-IME Intel chips.

  • mech@feddit.org
    link
    fedilink
    arrow-up
    73
    ·
    2 days ago

    all the 3-letter agencies pool their resources
    billions of dollars are dumped into the project
    several years later they manage to decrypt all of this guy’s communications
    it’s nothing but chats about how to encrypt shit

  • neox_@sh.itjust.works
    link
    fedilink
    Français
    arrow-up
    8
    ·
    edit-2
    2 days ago

    I’m like this post but I use GNU Guix System instead of Gentoo and GNU Boot instead of the old fully free Libreboot (and I have my own appartment lol).

  • UnderpantsWeevil@lemmy.world
    link
    fedilink
    English
    arrow-up
    68
    arrow-down
    1
    ·
    edit-2
    2 days ago

    check the IP logs

    Its all encrypted? This guy uses VPNs and Tor?

    Presuming that Mossad can be topped with a subscription to ProtonVPN or a Tor browser is adorable. Hell, presuming nobody in the intelligence services is familiar with Linux is even more adorable. “We’ve got everyone at the NSA fooled because we’re Arch users”. Yeah, sure buddy. What do you think these professional computer nerds are doing in their own free time?

    Where do you even think encrypted applications come from?

    • IronBird@lemmy.world
      link
      fedilink
      arrow-up
      25
      arrow-down
      2
      ·
      edit-2
      2 days ago

      most of these security agencies effectiveness is just in the myth’s they’ve built around themselves of actually being effective.

      mossad in particular, just has a complete disregard for killing innocents and a really good propaganda wing to suppress all their fuckups.

      most killers are not right in the head, they act on pure emotion, they post “i am going kill X” online to their social media of choice the night before going to kill X…it’s dumb as shit. that’s how low the bar is on utilizing violence

      fact is lone wolf threats are practically unstoppable, especially if they have a modicum of competency

      this is also why it’s said killing gets easier/“first ones the hardest” etc. even if your not some sociopath (which, most people as a whole arent)…once you know and understand just how easy it is to kill people and get away with it…lot of the worlds problems start to look like they have very easy solutions…

      • UnderpantsWeevil@lemmy.world
        link
        fedilink
        English
        arrow-up
        10
        arrow-down
        1
        ·
        2 days ago

        I mean, tell it to Jeffery Epstein. The man was pulling strings halfway around the world with his endless supply of blackmail and bribery.

    • Random Dent@lemmy.ml
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      1 day ago

      I tend to just operate on the principle of: I know my setup probably wouldn’t hold up for a second if some sort of organized three-letter government body decided to focus on me, but my threat model is more the kind of general internet-sweeping surveillance fuckery that goes on. I’m not doing anything especially dodgy on the internet and I think messing around with privacy stuff is fun, so my security level is faintly absurd for what it is. I’m sure someone could crack it if they were determined enough, but I assume the amount of effort required relative to what you’d find would just make it pointless anyway.

    • DeltaWingDragon@sh.itjust.works
      link
      fedilink
      arrow-up
      15
      arrow-down
      1
      ·
      2 days ago

      From security agencies, presumably…

      Got me? No!

      Security agencies create encryption for their own usage. This means they want it to be mathematically as strong as possible, to protect their secrets from enemy security agencies. Why would they backdoor their own protection system?

      They’ll just go through the side door instead.

    • sunbytes@lemmy.world
      link
      fedilink
      arrow-up
      4
      ·
      2 days ago

      I don’t think they’ll be prodigies or anything but they probably know literally one or two tricks or weaknesses that they heavily depend upon.

      So you can never really feel secure (that’s not to say take no caution).

  • eldain@feddit.nl
    link
    fedilink
    arrow-up
    62
    arrow-down
    1
    ·
    2 days ago

    Ah yes, a Linux teenagers power fantasy. Hardened Gentoo and Selinux beats deblobbing btw, noob.

      • eldain@feddit.nl
        link
        fedilink
        arrow-up
        2
        ·
        1 day ago

        Good old days :') I only noticed yesterday the grsec patches are no longer available, such a shame.

        • redsand@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 day ago

          The maintainer had an epic meltdown over hardware vendors using the code and both breaking the license agreement and implementing it wrong so it didn’t work right.

      • eldain@feddit.nl
        link
        fedilink
        arrow-up
        9
        ·
        2 days ago

        You can’t impress me with a bog standard Gentoo. If you want to show power, build a fortress. At least put some tripwire you mostly trip yourself on (program that keeps an encrypted hash database of your system files to find intrusion changes, needs an update with every update of course or it alerts only your negligence).

          • eldain@feddit.nl
            link
            fedilink
            arrow-up
            2
            ·
            1 day ago

            I always wondered, did anyone ever find something with it? Wouldn’t a rootkit that is known enough to be in the detection file be outdated? But yes, you read the docs, points to you!

            • redsand@lemmy.dbzer0.com
              link
              fedilink
              English
              arrow-up
              2
              ·
              1 day ago

              Yeah rkhunter looks for all the common kits BUT ALSO checks for suspicious changes if enabled as a service.

        • Petter1@discuss.tchncs.de
          link
          fedilink
          arrow-up
          5
          ·
          2 days ago

          Tripwire should encrypt everything and store key in RAM. Shutdown after 30s, if not emergency overwrite string is entered stored coded on real life paper in a vault with a 9 digits alphanumeric lock. 😏

    • Rai@lemmy.dbzer0.com
      link
      fedilink
      arrow-up
      5
      ·
      2 days ago

      I legit spent the afternoon the other day installing Linux on my first non-Raspberry Pi machine since 2007. It is a 13 year old laptop with NVidia GPUs (2). It went perfectly smoothly and Linux sees both GPUs. I tried Megabonk on it and it runs at 60FPS maxed out. I encrypted the drive. Bless you, Pop!_OS

      • Illecors@lemmy.cafe
        link
        fedilink
        English
        arrow-up
        23
        ·
        3 days ago

        I run Gentoo.

        It’s made my fundamentals stronger.

        It allows me to run the minimal number of codepaths.

        Every now and then it makes me happy. Sometimes proud of myself. All because I solved some problem that was helped by the mindset Gentoo had set up.

          • Illecors@lemmy.cafe
            link
            fedilink
            English
            arrow-up
            4
            ·
            2 days ago

            I don’t know the size in bytes, haven’t cared much about it for some time now. It also very much depends on the definition of minimal. My minimal != your minimal.

            I’m referring to use flags, which allow me to not have a bunch of features I don’t use compiled to begin with. Less code - fewer headaches.

  • mlg@lemmy.world
    link
    fedilink
    English
    arrow-up
    23
    ·
    2 days ago

    Can’t have ring -3 vulnerabilities if your CPU doesn’t have a ring -3