The Linux Thread - The Autist's OS of Choice

  • Want to keep track of this thread?
    Accounts can bookmark posts, watch threads for updates, and jump back to where you stopped reading.
    Create account
I don't use multiplexers that much as I found this fancy system called "X Windows" which lets me put 2 OR MORE terminal emulators on the screen at the same time.
This is also a more fault-tolerant solution. I've had terminal emulators and multiplexers crash or get into weird unrecoverable states before.

For fun try
Code:
echo -e "\033(0"

The reset command will fix it. If your terminal emulator crashes outright that's not really good.
 
I've never had much interest in terminal multiplexers. Because I use use tiling window managers. They do the multiplexing for me, and I think they way window managers handle keybinds in a smoother way than any of the multiplexers have to, by the nature of needing a key combo to tell it you are sending it a command then the actual key to do what you want to do. And it has the advantage of being able to handle all my windows in the same way.

I've been using them for a while, and I really can't go back. I've tried to use something with floating windows, a few times like desktops. And even if they have window snapping it's really not as good. Some have some kind of tiling, but usually it feels hacky compared to window managers made to work that way from the ground up.
 
I just want to say that getting Tiberian Sun running on Linux has proven to be a fucking impossible task and it has forever wounded my love of this OS. The worst part is I actually had it running on ngubu 20.04. I have no fucking idea why it suddenly wont play ball lol

Linuuuuuuuuuuuuuuuuuuuuuuuuuuuux!
 

This is the kind of horrifying shit, that comes from people trying to niggerfy computers down to the point a 3 year old can use them. When things are made "simpler" by actually making them 200% more complicated and retarded.

Also in general I hate the idea of having to "jailbreak" a device to just use it a bit more like a normal operating system. But that's another topic.
U know this reminds me of something I thought of a while ago
People come to Linux ans they say I need it to work EXACTLY like windows
So in my mind that means having a windows like filesystem thumbnails in the file picker control panel with the same layout that kinda thing
Then when you actually ask them they say Linux mint is exactly what they're looking for
You ask why and they say it has a taskbar and a start menu
It reminded me that schoolkids were being given Chromebooks and had absolutely no issues switching over to a "new" OS
Meanwhile i was jailbreaking a suface rt 2 with windows 8.1 on it and I had no idea what to do as id never used it before
"Familiarity" is really just people saying "I want this to feel intuitive to use without having to read a manual"
 

I found this random video with 855 views. This guy tries a ton of distros. And put a lot of effort into it. He's a small youtuber so it's not ultra high quality or anything, but I can appreciate this time that probably went into this.
 
Rather than upgrade my desktop to Trixie, I decided to swap my desktop with my Ai/VM/Etc machine. I figure it won't notice a little extra RAM use from a web browser or 30.
2025-09-02_13-00.webp
And yes, I still need to convince the Nvidia driver to work.
 

I found this random video with 855 views. This guy tries a ton of distros. And put a lot of effort into it. He's a small youtuber so it's not ultra high quality or anything, but I can appreciate this time that probably went into this.
What a contrast!
Compare with e.g. JayzTwoCents video, and his video is among the better ones.

>Solo
>No budget
>No sponsors
>Covers how to make a bootable USB
>Creates a test plan
>Tests 20 Linux distros
>Records everything
>Shows graphs
>Compares desktops, gives usage tips
>Covers gaming with Wine, Proton, Lutris, Bottles, ProtonDB
>Points out games anti-cheat
>Runs Windows apps
>Shows VMs with VirtualBox and QEMU/KVM
>Covers GIMP and Photoshop
>Teaches systemd, btop, ttys, man pages
>Shouts out other creators
>167 subs
>Big team
>Big budget
>Sponsors
>Tests Linux for gaming
>It's Bazzite
>Shows nothing, just talks to camera
>Bazzite fails
>"Gaming on Linux sucks"
>"Anyway, just use Windows 11"
>Windows 11 killing SSDs?
>"Here's my video on what SSD to buy"
>4.25M subs

Why are big tech youtubers so damn lazy?
 
What a contrast!
Compare with e.g. JayzTwoCents video, and his video is among the better ones.

>Solo
>No budget
>No sponsors
>Covers how to make a bootable USB
>Creates a test plan
>Tests 20 Linux distros
>Records everything
>Shows graphs
>Compares desktops, gives usage tips
>Covers gaming with Wine, Proton, Lutris, Bottles, ProtonDB
>Points out games anti-cheat
>Runs Windows apps
>Shows VMs with VirtualBox and QEMU/KVM
>Covers GIMP and Photoshop
>Teaches systemd, btop, ttys, man pages
>Shouts out other creators
>167 subs
>Big team
>Big budget
>Sponsors
>Tests Linux for gaming
>It's Bazzite
>Shows nothing, just talks to camera
>Bazzite fails
>"Gaming on Linux sucks"
>"Anyway, just use Windows 11"
>Windows 11 killing SSDs?
>"Here's my video on what SSD to buy"
>4.25M subs

Why are big tech youtubers so damn lazy?
To be fair Jayz is bad even by YouTuber standards. The man manages to be less informative than LinusTechTips, even after that channel dropped the pretence of not just being tech-adjacent entertainment. You’re comparing a very above average small channel with the very worst large channel. Level1Techs is the go-to big channel for gaming on Linux. It’s a subject Wendell knows very well, even though he has very little content about it.
IIRC Jayz is a car tuning channel that expanded into watercooled gaming computers, and apart from some semi-competent custom loop builds, he has very little to offer.
 
I wish you could browse Kiwi Farms with w3m, but JavaScript doesn't allow that. I've been using w3m to browse 4chan. mpv's mailcap file can be set up to open all media files (audio, video, images), and you can add your browser to a keybind in w3m's options to open webpages that do not use JavaScript for DDOS protection.
Why are big tech youtubers so damn lazy?
 

Attachments

  • 1756840889314105.webp
    1756840889314105.webp
    259.6 KB · Views: 24
I wonder what will happen with Windows, unless I am mistaken they don't got anything like that in their OS either. Maybe they'll get some exception or perhaps MS will go along with it? If you are right about them wanting to place something like this before login I wonder if they might find some BIOS or motherboard manufacturers to be more pliable or easier to push around to add some bullshit like this into the core of any system. That would be fucked.
Brazil probably doesn't have enough pull to force manufacturers to do what they want. But, BIOS or HW level in general, would be, obviously, the way to go.
I've been sperging about this in the open source thread but it already exists. All Brazil need do is dictate that mobo manufacturers must enable secure boot and have it only trust microsoft keys.

honestly. I've started buying into the Eglin Air Force base reddit theory more. I mean, it's not a theory, but I've been thinking about what exactly they are trying to accomplish.
I've got one for you: Why does everyone in security agree that if your attacker has physical access that you're cooked but then turn around and spend all this effort trying to solve the "evil maid attack" by implementing secure boot/pluton/etc.?
 
I've got one for you: Why does everyone in security agree that if your attacker has physical access that you're cooked but then turn around and spend all this effort trying to solve the "evil maid attack" by implementing secure boot/pluton/etc.?
If you are implying something about tpm. I don't know. If anything Intel Management Engine is what I would worry about more, and amd psp.

Freedom pitfalls with modern Intel hardware​

Coreboot is nominally Free Software, but requires certain vendor code on some x86 targets that it supports, on both Intel and AMD.

Intel Management Engine (ME)​

NOTE: The information below is slightly out of date. Nowadays, Intel ME does not run on an ARC coprocessor, but instead runs on a modified Intel 486 based architecture, with the ME firmware written for x86 based on the Minix operating system. However, the overall design philosophy and operation is mostly the same.

On most current Intel platforms that have Intel ME, it is now possible to disable Intel ME after BringUp. See:

https://github.com/corna/me_cleaner

On all GM45+ICH9M laptops that have an Intel ME in it (additionally, this means X4X+ICH10 desktops), the ME firmware is not needed in the boot flash. Either a modified descriptor is used, which disables the ME and removes the region for it in the boot flash, or a descriptorless setup is used. However, all modern Intel platforms otherwise require an Intel ME image to be present in the main boot flash.

Now onto the main topic:

Introduced in June 2006 in Intel’s 965 Express Chipset Family of (Graphics and) Memory Controller Hubs, or (G)MCHs, and the ICH8 I/O Controller Family, the Intel Management Engine (ME) is a separate computing environment physically located in the (G)MCH chip. In Q3 2009, the first generation of Intel Core i3/i5/i7 (Nehalem) CPUs and the 5 Series Chipset family of Platform Controller Hubs, or PCHs, brought a more tightly integrated ME (now at version 6.0) inside the PCH chip, which itself replaced the ICH. Thus, the ME is present on all Intel desktop, mobile (laptop), and server systems since mid 2006.

The ME consists of an ARC processor core (replaced with other processor cores in later generations of the ME), code and data caches, a timer, and a secure internal bus to which additional devices are connected, including a cryptography engine, internal ROM and RAM, memory controllers, and a direct memory access (DMA) engine to access the host operating system’s memory as well as to reserve a region of protected external memory to supplement the ME’s limited internal RAM. The ME also has network access with its own MAC address through an Intel Gigabit Ethernet Controller. Its boot program, stored on the internal ROM, loads a firmware “manifest” from the PC’s SPI flash chip. This manifest is signed with a strong cryptographic key, which differs between versions of the ME firmware. If the manifest isn’t signed by a specific Intel key, the boot ROM won’t load and execute the firmware and the ME processor core will be halted.

The ME firmware is compressed and consists of modules that are listed in the manifest along with secure cryptographic hashes of their contents. One module is the operating system kernel, which is based on a proprietary real-time operating system (RTOS) kernel called “ThreadX”. The developer, Express Logic, sells licenses and source code for ThreadX. Customers such as Intel are forbidden from disclosing or sublicensing the ThreadX source code. Another module is the Dynamic Application Loader (DAL), which consists of a Java virtual machine and set of preinstalled Java classes for cryptography, secure storage, etc. The DAL module can load and execute additional ME modules from the PC’s HDD or SSD. The ME firmware also includes a number of native application modules within its flash memory space, including Intel Active Management Technology (AMT), an implementation of a Trusted Platform Module (TPM), Intel Boot Guard, and audio and video DRM systems.

The Active Management Technology (AMT) application, part of the Intel “vPro” brand, is a Web server and application code that enables remote users to power on, power off, view information about, and otherwise manage the PC. It can be used remotely even while the PC is powered off (via Wake-on-Lan). Traffic is encrypted using SSL/TLS libraries, but recall that all of the major SSL/TLS implementations have had highly publicized vulnerabilities. The AMT application itself has known vulnerabilities, which have been exploited to develop rootkits and keyloggers and covertly gain encrypted access to the management features of a PC. Remember that the ME has full access to the PC’s RAM. This means that an attacker exploiting any of these vulnerabilities may gain access to everything on the PC as it runs: all open files, all running applications, all keys pressed, and more.

Intel Boot Guard is an ME application introduced in Q2 2013 with ME firmware version 9.0 on 4th Generation Intel Core i3/i5/i7 (Haswell) CPUs. It allows a PC OEM to generate an asymmetric cryptographic keypair, install the public key in the CPU, and prevent the CPU from executing boot firmware that isn’t signed with their private key. This means that coreboot and libreboot are impossible to port to such PCs, without the OEM’s private signing key. Note that systems assembled from separately purchased motherboard and CPU parts are unaffected, since the vendor of the motherboard (on which the boot firmware is stored) can’t possibly affect the public key stored on the CPU.

ME firmware versions 4.0 and later (Intel 4 Series and later chipsets) include an ME application for audio and video DRM called “Protected Audio Video Path” (PAVP). The ME receives from the host operating system an encrypted media stream and encrypted key, decrypts the key, and sends the encrypted media decrypted key to the GPU, which then decrypts the media. PAVP is also used by another ME application to draw an authentication PIN pad directly onto the screen. In this usage, the PAVP application directly controls the graphics that appear on the PC’s screen in a way that the host OS cannot detect. ME firmware version 7.0 on PCHs with 2nd Generation Intel Core i3/i5/i7 (Sandy Bridge) CPUs replaces PAVP with a similar DRM application called “Intel Insider”. Like the AMT application, these DRM applications, which in themselves are defective by design, demonstrate the omnipotent capabilities of the ME: this hardware and its proprietary firmware can access and control everything that is in RAM and even everything that is shown on the screen.

The Intel Management Engine with its proprietary firmware has complete access to and control over the PC: it can power on or shut down the PC, read all open files, examine all running applications, track all keys pressed and mouse movements, and even capture or display images on the screen. And it has a network interface that is demonstrably insecure, which can allow an attacker on the network to inject rootkits that completely compromise the PC and can report to the attacker all activities performed on the PC. It is a threat to freedom, security, and privacy that can’t be ignored.

Before version 6.0 (that is, on systems from 2008/2009 and earlier), the ME can be disabled by setting a couple of values in the SPI flash memory. The ME firmware can then be removed entirely from the flash memory space. The libreboot project does this on the Intel 4 Series systems that it supports, such as the ThinkPad X200 and ThinkPad T400. ME firmware versions 6.0 and later, which are found on all systems with an Intel Core i3/i5/i7 CPU and a PCH, include “ME Ignition” firmware that performs some hardware initialization and power management. If the ME’s boot ROM does not find in the SPI flash memory an ME firmware manifest with a valid Intel signature, the whole PC will shut down after 30 minutes.

Due to the signature verification, developing free replacement firmware for the ME is basically impossible. The only entity capable of replacing the ME firmware is Intel. As previously stated, the ME firmware includes proprietary code licensed from third parties, so Intel couldn’t release the source code even if they wanted to. And even if they developed completely new ME firmware without third-party proprietary code and released its source code, the ME’s boot ROM would reject any modified firmware that isn’t signed by Intel. Thus, the ME firmware is both hopelessly proprietary and “tivoized”.

In summary, the Intel Management Engine and its applications are a backdoor with total access to and control over the rest of the PC. The ME is a threat to freedom, security, and privacy, and the libreboot project strongly recommends avoiding it entirely. Since recent versions of it can’t be removed, this means avoiding all recent generations of Intel hardware.

The above paragraph is only talking about setups where the full Intel ME firmware is used, containing networking code and especially Active Management Technology (AMT).

Use of the me_cleaner utility is believed to minimize any security risk when using these Intel platforms, and coreboot does contain fully free code for sandybridge/ivybridge platforms.

More information about the Management Engine can be found on various Web sites, including me.bios.io, unhuffme, coreboot wiki, and Wikipedia. The book Platform Embedded Security Technology Revealed describes in great detail the ME’s hardware architecture and firmware application modules.

If you’re stuck with the ME (non-libreboot system), you might find this interesting: https://hardenedlinux.github.io/fir...ME_firmware_on_sandybridge_and_ivybridge.html

Firmware Support Package (FSP)​

On all recent Intel systems, coreboot support has revolved around integrating a vendor file (for each system) called the FSP (firmware support package), which handles all of the hardware initialization, including memory and CPU initialization. Reverse engineering and replacing this file is almost impossible, due to how complex it is. Even for the most skilled developer, it would take years to replace. Intel distributes this file to firmware developers, for free redistribution.

Since the FSP is responsible for the early hardware initialization, that means it also handles SMM (System Management Mode). This is a special mode that operates below the operating system level.

CPU microcode updates​

The microcode configures logic gates in your CPU, to implement an instruction set architecture. Your CPU will already contain them, but it also supplies a way to update the microcode at boot time, fixing bugs and greatly enhancing the general reliability of your system.

Microcode is already discussed in great detail, on the binary blobs policy.

This interesting video talks about how a group of people reverse engineered the microcode on AMD processors:

https://yewtu.be/watch?v=W3FbTMqYi4U

Here is another video:

https://yewtu.be/watch?v=I6dQfnb3y0I

The git repository for that project is here:

https://github.com/RUB-SysSec/Microcode

Both the video and the repository give some further insight about CPU microcode. The way it works on AMD will be very similar to Intel.

Freedom pitfalls to consider on AMD hardware​

NOTE: Nowadays there’s openSIL https://github.com/openSIL/openSIL - it’s AMD’s attempt to provide some source code again, that projects like coreboot can use, but AMD is still problematic; the PSP for example (see below) cannot be “neutered” (nothing like me_cleaner, or psp_cleaner) exists yet.

AMD has more or less the same problem as Intel, when it comes to software freedom.

AMD Platform Security Processor (PSP)​

This is basically AMD’s own version of the Intel Management Engine. It has all of the same basic security and freedom issues, although the implementation is wildly different.

The Platform Security Processor (PSP) is built in on the AMD CPUs whose architecture is Late Family 16h (Puma), Zen 17h or later (and also on the AMD GPUs which are GCN 5th gen (Vega) or later). On the CPUs, a PSP controls the main x86 core startup. PSP firmware is cryptographically signed with a strong key similar to the Intel ME. If the PSP firmware is not present, or if the AMD signing key is not present, the x86 cores will not be released from reset, rendering the system inoperable.

The PSP is an ARM core with TrustZone technology, built onto the main CPU die. As such, it has the ability to hide its own program code, scratch RAM, and any data it may have taken and stored from the lesser-privileged x86 system RAM (kernel encryption keys, login data, browsing history, keystrokes, who knows!). To make matters worse, the PSP theoretically has access to the entire system memory space (AMD either will not or cannot deny this, and it would seem to be required to allow the DRM “features” to work as intended), which means that it has at minimum MMIO-based access to the network controllers and any other PCI/PCIe peripherals installed on the system.

In theory any malicious entity with access to the AMD signing key would be able to install persistent malware that could not be eradicated without an external flasher and a known good PSP image. Furthermore, multiple security vulnerabilities have been demonstrated in AMD firmware in the past, and there is every reason to assume one or more zero day vulnerabilities are lurking in the PSP firmware. Given the extreme privilege level (ring -2 or ring -3) of the PSP, said vulnerabilities would have the ability to remotely monitor and control any PSP enabled machine completely outside of the user’s knowledge.

Much like with the Intel Boot Guard (an application of the Intel Management Engine), AMD’s PSP can also act as a tyrant by checking signatures on any boot firmware that you flash, making replacement boot firmware (e.g. libreboot, coreboot) impossible on some boards. Early anecdotal reports indicate that AMD’s boot guard counterpart will be used on most OEM hardware, disabled only on so-called “enthusiast” CPUs.

AMD IMC firmware​

Read https://www.coreboot.org/AMD_IMC.

NOTE: This section is oudated, and it is in need of cleanup.

AMD SMU firmware​

NOTE: This section may be outdated, and it is in need of cleanup.

Handles some power management for PCIe devices (without this, your laptop will not work properly) and several other power management related features.

The firmware is signed, although on older AMD hardware it is a symmetric key, which means that with access to the key (if leaked) you could sign your own modified version and run it. Rudolf Marek (coreboot hacker) found out how to extract this key in this video demonstration, and based on this work, Damien Zammit (another coreboot hacker) partially replaced it with free firmware, but on the relevant system (ASUS F2A85-M) there were still other such files present (Video BIOS, and others).

AMD AGESA firmware​

NOTE: More needs to be written about this, to reflect the current reality. The situation with AMD has evolved in recent years. The information on this FAQ page is a few years out of date.

This is responsible for virtually all core hardware initialization on modern AMD systems. In 2011, AMD started cooperating with the coreboot project, releasing this as source code under a free license. In 2014, they stopped releasing source code and started releasing AGESA as vendor blobs instead. This makes AGESA now equivalent to Intel FSP.

AMD CPU microcode updates​

Read the Intel section practically the same, though it was found with much later hardware in AMD that you could run without microcode updates. It’s unknown whether the updates are needed on all AMD boards (depends on CPU).

The libreboot project does not consider microcode updates a problem, and it enables them by default on all supported hardware.
 
I've been sperging about this in the open source thread but it already exists. All Brazil need do is dictate that mobo manufacturers must enable secure boot and have it only trust microsoft keys.
More reason to hate SecureBoot it seems, if what you are saying is correct then that vindicates all the people that hated it back when it came out. Feels like most Linux users nowadays have the consensus that this was just FOSS cultism and that enrolling your own keys is easy and works fine.

To be fair Jayz is bad even by YouTuber standards. The man manages to be less informative than LinusTechTips, even after that channel dropped the pretence of not just being tech-adjacent entertainment.
Not saying he didn't have some genuine issues with what he tried to do because he obviously did, but it is still funny how some random guy who runs a tech comedy channel, isn't super technical which is obvious from his videos & hates the terminal with a bloody passion had better luck daily driving Linux for a month on a laptop than a tech focused information channel:

The thumbnail is just for laughs, the entire video is really just him having fun w/ Compiz effects and showing off his laptop with Fedora that he had been using for a month. He even played Civ6 for a little bit and it worked fine. He had minor gripes at the end but nothing too serious.

The only distro he had problems with in the past was Ubuntu IIRC because their installer was bugging out and due to the snap store being unable to resolve him having a terminal open while trying to install applications from it, which is just the typical Canonical crap. I like that he shat on the GNOME defaults without even knowing it in the video, but I find it odd that SecureBoot failed on install, though which is relevant to other discussion here. I thought Fedora had signed keys so it theoretically shouldn't have had any issues installing with it on unless I am mistaken, but as always SecureBoot is fickle and annoying. I have never had any good luck with it on Linux personally, I have finally managed to get a setup with SecureBoot on but it was really fucking annoying to set up at least for me.
 
Last edited:

Watching this. I feel like it really made it obvious why I can stand watching lunduke (besides the fact he is the only person that covers some stories).

It's because I hate the people he talks about SOO much more. Than him. When he talks about these people he seems like a so much more bearable.

Until he makes another video saying we need to strip away Internet privacy to stop the heckin trolls.
 
To be fair Jayz is bad even by YouTuber standards. The man manages to be less informative than LinusTechTips, even after that channel dropped the pretence of not just being tech-adjacent entertainment.
Yeah, obviously I'm exaggerating a bit, but is he really that bad? The only big tech channels I know are him and Gamers Nexus. I've never watched an LTT video and I'd like to keep it that way. Jayz just comes off like your average general audience tech channel, or at least that's how I picture it.

I've been sperging about this in the open source thread but it already exists. All Brazil need do is dictate that mobo manufacturers must enable secure boot and have it only trust microsoft keys.
If you are implying something about tpm. I don't know. If anything Intel Management Engine is what I would worry about more, and amd psp.
More reason to hate SecureBoot it seems, if what you are saying is correct then that vindicates all the people that hated it back when it came out. Feels like most Linux users nowadays have the consensus that this was just FOSS cultism and that enrolling your own keys is easy and works fine.
Just how many layers of "fuck you" do all these corpos and govs need? CPU silicon, firmware, BIOS, OS, browser, not to mention the ISP. Genuinely, what the fuck.
 
Back
Top Bottom