The Linux Thread - The Autist's OS of Choice

  • Want to keep track of this thread?
    Accounts can bookmark posts, watch threads for updates, and jump back to where you stopped reading.
    Create account
Okay, now they are holding you in contempt of court until you provide it.
That's not always going to happen and there are a ton of cases where it won't. If the cops get a warrant for your house that doesn't include your computers they can't "accidentally" find your linux ISOs or whatever.

RMA'ing drives containing CSAM.
Yeah, I couldn't possibly not want western digital recovering my tax records, personal coding project, and backup of my phone then selling it to be fed into an AI. No, anyone who enjoys their privacy has terabytes of CSAM. Unironically kill yourself.
 
Last edited:
That's not always going to happen and there are a ton of cases where it won't. If the cops get a warrant for your house that doesn't include your computers they can't "accidentally" find your linux ISOs or whatever.
You are correct, but also that makes me wonder what the hell is going down at your house.

If you have a search and seizure warrant on your electronic devices you aren't getting away though.
 
Since I moved to Linux I've actually become MORE racist, so there's some truth to this I imagine
From the comments: "I'm old enough to remember when open source was communism. So now it's white supremacy. Let's see what's next."
>using Linux confirmed for nazbol
In all seriousness, though, Linux makes it easier to get Python and R working, which in turn means that it's easier to analyze nigger crime statistics, which in turn finally will make you more racist. I'm not surprised that Linux makes anyone racist for said reason.
 
Honestly if you're at that point you either pissed off a power tripping major and can use national attention to end their career, or an entire political party in which case you're fucked
 
I'm pretty multiple people (at least you and @Nice Stick) apparently are down with "if you have nothing to hide you have nothing to fear" if it's on a computer. Are either of you british?
If you really want to talk about security, then look at it from a risk management perspective. The probability of occurrence is low and the impact if it did occur is low, so I conclude that slowing down my computer by ~20% to protect against it is retarded and gay.
 
I'm pretty multiple people (at least you and @Nice Stick) apparently are down with "if you have nothing to hide you have nothing to fear" if it's on a computer. Are either of you british?
There is a threshold where being overly cautious is less secure then not being cautious. If you're doing what everyone else is doing then you will never stand out, and the bare minimum of caution and security is sufficient. However if you're doing everything theoretically possible to be more secure you often start having a skewed digital footprint that raises red flags and imposes further scrutiny on you, and enough scrutiny can defeat even your best defences, or your best defences can backfire as you can no longer prove your innocence. If you tunnel all your traffic through a VPN you could be suspected of doing something illegal and be investigated, and if they see your computers have uncrackable encryption that a digital forensics expert can't validate, they can assume you have been sharing CSAM. They likely can't arrest you on it, but they can hold you for a while and ruin your public image.

It's like how people notice schizophrenics despite them doing everything they can to be unnoticed.
 
If you really want to talk about security, then look at it from a risk management perspective. The probability of occurrence is low and the impact if it did occur is low, so I conclude that slowing down my computer by ~20% to protect against it is retarded and gay.
Pulling numbers out of your ass yet you have the audacity to call other things gay.

There is a threshold where being overly cautious is less secure then not being cautious. If you're doing what everyone else is doing then you will never stand out, and the bare minimum of caution and security is sufficient. However if you're doing everything theoretically possible to be more secure you often start having a skewed digital footprint that raises red flags and imposes further scrutiny on you.
Do tell, how is my "digital footprint" being skewed by having FDE?
 
I don't get what the issue with grub is..
I don't know either. I can't get grub to save the selection I made, I assume because it can't write to whatever address it's trying to save the variable to. Keeps popping up with "failure writing sector 0x37338 to hd1." Thought maybe I fucked something up, so I'm trying another reinstall and now os-prober can't find windows and sbctl can't find my efi folder.

If I can get back to where I was a few hours ago I'll just leave it there and just know I can't reboot windows, take a shit, and find it on the lock screen again.
 
Do tell, how is my "digital footprint" being skewed by having FDE?
It doesn’t, but it will definitely be considered highly suspicious if they ever want to touch your computer for another reason. No idea what that would be, but basically any time you tell a cop “no” they will take it personally.
 
Intel Management Engine. the spyware in your cpu
Not only is that retarded but I am not running a computer with the IME.

And while we're at it
If you tunnel all your traffic through a VPN you could be suspected of doing something illegal and be investigated, and if they see your computers have uncrackable encryption that a digital forensics expert can't validate, they can assume you have been sharing CSAM. They likely can't arrest you on it, but they can hold you for a while and ruin your public image.
this is also fucking retarded. Right up there with the rest of the "if you have nothing to hide you have nothing to fear" faggots. I don't even know where to start. People in real countries are innocent until proven guilty. What do you even mean by validate in "that a digital forensics expert can't validate"? And this whole asinine story is just multiple absurd "well they could do this" statements. Yeah, anything could happen. I could wake up tomorrow every human except me has grown a 3rd arm.

As if "they" are going to jail randos and "ruin their reputation" because said randos use a VPN and had bitlocker automatically activated when they installed windows? Are you fucking retarded?

If you're doing what everyone else is doing then you will never stand out, and the bare minimum of caution and security is sufficient.
And speaking of fucking retarded, you have a google or apple phone with the mic always on near you all the time right? After all, you wouldn't want to stand out from the crowd.
 
Okay, now they are holding you in contempt of court until you provide it.
Some countries take nemo tenetur a lot more seriously than the US or UK. In Germany, for example, a defendant in a criminal case can't be legally compelled to give up his encryption keys, and refusal to do so can't be treated as evidence of guilt.
 
Last edited:
I mean, I don't think running a vpn all the time now days is that supsicious. Now maybe if you are running i2p, and tor, constantly. It might set of some kind of radar. I can't remember where it was I heard this, but at least in some places downloading tor basically put you in some kind of list right away. That's something I just barely remember hearing, and I could have part of that wrong.

As for disk encryption. I don't think that will really make you stand out that much. My only problem with it. Is for myself the specific form of security that provides, isn't really what I care about. At least not for my root filesystem.

I do have a flashdrive I keep things like some passwords, and other things I want secure that's encrypted so if someone somehow ends up with it. They don't get all of my data. And for the actual drives I use.

Something I recommend people look into is ecryptfs. You can encrypt your whole home with it if you want, but the reason I like it is you can just have one encrypted directory in your home dir, and you can keep things you want secured in that. And skip all of the down sides that come with having your root encrypted. In my opinion it's a lot more practical, and has the benefit of not being decrypted until you actually want to use it. Instead of your whole root being decrypted every time you use your computer, by the nature of it being your whole drive.
 
Something I recommend people look into is ecryptfs. You can encrypt your whole home with it if you want, but the reason I like it is you can just have one encrypted directory in your home dir, and you can keep things you want secured in that. And skip all of the down sides that come with having your root encrypted. In my opinion it's a lot more practical, and has the benefit of not being decrypted until you actually want to use it. Instead of your whole root being decrypted every time you use your computer, by the nature of it being your whole drive.
The issue with this is that if you (or an application) ever save a file temporarily outside the encrypted folder, it could be recoverable. Full-disk encryption protects you from that, as well as from things like passwords being scraped from your swapfile. You say “decrypt the entire disk”, but it really just decrypts files as it reads them, and modern processors integrate the hardware to do so, so the performance penalty is minimal or nonexistent.
 
Some drama in the Void Linux community brewing.
Another thread (Archive), another removed OP, but at least the comments have survived so far.

People aren't happy.
1757503673.webp1757503648.webp1757503636.webp1757503611.webp

Except for the Chimera tranny.
1757503779.webp
 
Except for the Chimera tranny.
I'm actually surprised there is some push back because of all the weirdos involved in running Void Linux. Obviously, you are aware of Chimera's Linux enhanced CoC, right? They essentially admit they will stalk your social media to ensure you are compliant with their political slant. A bunch of tranny faggots larping as Stasi online.
 
On my desktop I've been running a system with a single boot partition and the rest as a LUKS/LVM setup. This worked great on my desktop when I had grub, and when I moved to systemd-boot it seemed fine with it, too. (I ran into a minor issue while setting up secure boot where sbctl couldn't find my boot folders, but that turned out to be because I hadn't flagged the partition properly).
Without the complication of LUKS, "single boot + LVM" is something I ran for a decade. It is fragile. I imagine LUKS makes it even moreso. You really want to lower the barrier to entry to your OS for the cases where you hit trouble, IME. My new approach is: "There must be at least one easily-accessible Linux install."

Here's how the problem looks: If your drive isn't immediately accessible to Linux, how most distroes are designed today is to use an initrd to enter Linux. What an initrd is is basically a redundant micro distribution that Linux boots into before Linux boots into the proper partition, so it can do things like bring up encrypted / LVM. LVM "OS partitions" in particular cannot come up without initrd. initrd increases the complexity of boot time for the ostensible benefit of being more resilient/universal.

When everything works fine, this approach isn't bad. But after a decade, the problem is that initrds sometimes have problems. My current installations are all designed to just boot a kernel; my Gentoo box doesn't even think about initrd any more, and my system is set up so that EFI directly boots my kernel, though I can tell it to boot into grub as well. This has improved my boot resilience immensely.

If you're really insistent on LUKS, I suggest making your LUKS partition your /home/ which won't interfere with OS boot.

Just understand, you're making decisions about your boottime that are difficult to manage, and that's why you're in trouble.
 
Last edited:
Back
Top Bottom