- Joined
- Mar 28, 2023
Ain't no fed stealing my green frog folderYou people must live exciting lives with hackers stealing your computers and RMA'ing drives containing CSAM.

Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Ain't no fed stealing my green frog folderYou people must live exciting lives with hackers stealing your computers and RMA'ing drives containing CSAM.

I have CIA niggers in my wallsYou people must live exciting lives with hackers stealing your computers and RMA'ing drives containing CSAM.
That's not always going to happen and there are a ton of cases where it won't. If the cops get a warrant for your house that doesn't include your computers they can't "accidentally" find your linux ISOs or whatever.Okay, now they are holding you in contempt of court until you provide it.
Yeah, I couldn't possibly not want western digital recovering my tax records, personal coding project, and backup of my phone then selling it to be fed into an AI. No, anyone who enjoys their privacy has terabytes of CSAM. Unironically kill yourself.RMA'ing drives containing CSAM.
You are correct, but also that makes me wonder what the hell is going down at your house.That's not always going to happen and there are a ton of cases where it won't. If the cops get a warrant for your house that doesn't include your computers they can't "accidentally" find your linux ISOs or whatever.
From the comments: "I'm old enough to remember when open source was communism. So now it's white supremacy. Let's see what's next."Since I moved to Linux I've actually become MORE racist, so there's some truth to this I imagine
I'm pretty multiple people (at least you and @Nice Stick) apparently are down with "if you have nothing to hide you have nothing to fear" if it's on a computer. Are either of you british?You are correct, but also that makes me wonder what the hell is going down at your house.
If you really want to talk about security, then look at it from a risk management perspective. The probability of occurrence is low and the impact if it did occur is low, so I conclude that slowing down my computer by ~20% to protect against it is retarded and gay.I'm pretty multiple people (at least you and @Nice Stick) apparently are down with "if you have nothing to hide you have nothing to fear" if it's on a computer. Are either of you british?
There is a threshold where being overly cautious is less secure then not being cautious. If you're doing what everyone else is doing then you will never stand out, and the bare minimum of caution and security is sufficient. However if you're doing everything theoretically possible to be more secure you often start having a skewed digital footprint that raises red flags and imposes further scrutiny on you, and enough scrutiny can defeat even your best defences, or your best defences can backfire as you can no longer prove your innocence. If you tunnel all your traffic through a VPN you could be suspected of doing something illegal and be investigated, and if they see your computers have uncrackable encryption that a digital forensics expert can't validate, they can assume you have been sharing CSAM. They likely can't arrest you on it, but they can hold you for a while and ruin your public image.I'm pretty multiple people (at least you and @Nice Stick) apparently are down with "if you have nothing to hide you have nothing to fear" if it's on a computer. Are either of you british?
Pulling numbers out of your ass yet you have the audacity to call other things gay.If you really want to talk about security, then look at it from a risk management perspective. The probability of occurrence is low and the impact if it did occur is low, so I conclude that slowing down my computer by ~20% to protect against it is retarded and gay.
Do tell, how is my "digital footprint" being skewed by having FDE?There is a threshold where being overly cautious is less secure then not being cautious. If you're doing what everyone else is doing then you will never stand out, and the bare minimum of caution and security is sufficient. However if you're doing everything theoretically possible to be more secure you often start having a skewed digital footprint that raises red flags and imposes further scrutiny on you.
I don't know either. I can't get grub to save the selection I made, I assume because it can't write to whatever address it's trying to save the variable to. Keeps popping up with "failure writing sector 0x37338 to hd1." Thought maybe I fucked something up, so I'm trying another reinstall and now os-prober can't find windows and sbctl can't find my efi folder.I don't get what the issue with grub is..
Intel Management Engine. the spyware in your cpuDo tell, how is my "digital footprint" being skewed by having FDE?
It doesn’t, but it will definitely be considered highly suspicious if they ever want to touch your computer for another reason. No idea what that would be, but basically any time you tell a cop “no” they will take it personally.Do tell, how is my "digital footprint" being skewed by having FDE?
Not only is that retarded but I am not running a computer with the IME.Intel Management Engine. the spyware in your cpu
this is also fucking retarded. Right up there with the rest of the "if you have nothing to hide you have nothing to fear" faggots. I don't even know where to start. People in real countries are innocent until proven guilty. What do you even mean by validate in "that a digital forensics expert can't validate"? And this whole asinine story is just multiple absurd "well they could do this" statements. Yeah, anything could happen. I could wake up tomorrow every human except me has grown a 3rd arm.If you tunnel all your traffic through a VPN you could be suspected of doing something illegal and be investigated, and if they see your computers have uncrackable encryption that a digital forensics expert can't validate, they can assume you have been sharing CSAM. They likely can't arrest you on it, but they can hold you for a while and ruin your public image.
And speaking of fucking retarded, you have a google or apple phone with the mic always on near you all the time right? After all, you wouldn't want to stand out from the crowd.If you're doing what everyone else is doing then you will never stand out, and the bare minimum of caution and security is sufficient.
Some countries take nemo tenetur a lot more seriously than the US or UK. In Germany, for example, a defendant in a criminal case can't be legally compelled to give up his encryption keys, and refusal to do so can't be treated as evidence of guilt.Okay, now they are holding you in contempt of court until you provide it.
The issue with this is that if you (or an application) ever save a file temporarily outside the encrypted folder, it could be recoverable. Full-disk encryption protects you from that, as well as from things like passwords being scraped from your swapfile. You say “decrypt the entire disk”, but it really just decrypts files as it reads them, and modern processors integrate the hardware to do so, so the performance penalty is minimal or nonexistent.Something I recommend people look into is ecryptfs. You can encrypt your whole home with it if you want, but the reason I like it is you can just have one encrypted directory in your home dir, and you can keep things you want secured in that. And skip all of the down sides that come with having your root encrypted. In my opinion it's a lot more practical, and has the benefit of not being decrypted until you actually want to use it. Instead of your whole root being decrypted every time you use your computer, by the nature of it being your whole drive.
Another thread (Archive), another removed OP, but at least the comments have survived so far.Some drama in the Void Linux community brewing.





I'm actually surprised there is some push back because of all the weirdos involved in running Void Linux. Obviously, you are aware of Chimera's Linux enhanced CoC, right? They essentially admit they will stalk your social media to ensure you are compliant with their political slant. A bunch of tranny faggots larping as Stasi online.Except for the Chimera tranny.
Without the complication of LUKS, "single boot + LVM" is something I ran for a decade. It is fragile. I imagine LUKS makes it even moreso. You really want to lower the barrier to entry to your OS for the cases where you hit trouble, IME. My new approach is: "There must be at least one easily-accessible Linux install."On my desktop I've been running a system with a single boot partition and the rest as a LUKS/LVM setup. This worked great on my desktop when I had grub, and when I moved to systemd-boot it seemed fine with it, too. (I ran into a minor issue while setting up secure boot where sbctl couldn't find my boot folders, but that turned out to be because I hadn't flagged the partition properly).