Nope, I’m not doing that. If they want that, they can do it themselves.
- 6 Posts
- 39 Comments
chevy9294@monero.townto Technology@lemmy.world•Found in the wild: The world’s first unkillable UEFI bootkit for LinuxEnglish1·9 months agoThey are stored behind luks and I think they are readable only by root. But bootkit can probably only infect UEFI from Linux that is running on that machine. And to interact to UEFI you probably have to be root, right?
I’ll look into more options, either store keys on a seperate luks usb key or on a hardware securety key like Nitrokey. For
sbctl
there is already a roadmap feature for hardware security keys, I hope this comes soon :)
chevy9294@monero.townto Technology@lemmy.world•Found in the wild: The world’s first unkillable UEFI bootkit for LinuxEnglish5·9 months agoWell… if you have your own keys (like I do) you have to store them somewhere. That somewhere is probably somewhere on a computer where they are used so you can update the kernel. If you have private keys, you can probably bypass secure boot.
Is there a way to have private keys stored on a nitrokey that has to be plugged in for every kernel update?
chevy9294@monero.townto Technology@lemmy.world•ISPs say their “excellent customer service” is why users don’t switch providersEnglish42·9 months agoWe can switch ISP???
chevy9294@monero.townto Fediverse@lemmy.world•Millenials and Zoomers experience decision fatigue differently (And what it means for Lemmy)English7·9 months agoI always open settings on every app or website to see what I can change. This gives me feeling like this is something made just for me and I will use it for longer. Except KDE, this has way too many settings.
chevy9294@monero.townto Linux@lemmy.ml•TOR browser User Agent in Linux increases fingerprintingEnglish1·9 months agoYes, Tor recently made a change to that. This does increase fingerprinting but not by much. A lot of Tor users are using Linux rather than Windows.
chevy9294@monero.townto Technology@lemmy.world•Hackers breach Andrew Tate's online university, leak data on 800,000 usersEnglish9·9 months agoThats the important part ;)
chevy9294@monero.townto Technology@lemmy.world•Cybersecurity, Ethical Hacker Operating System PollEnglish41·10 months agoArch, you can fully customize it to your needs, and has access to AUR for more hacking tools.
chevy9294@monero.townto Technology@lemmy.world•Stract: Independent and Open SearchEnglish3·10 months agoI like it but it seems they have to crawl a bit more.
chevy9294@monero.townto Technology@lemmy.world•Sweden, Norway rethink plans for cashless societies over fears that fully digital payment systems would leave them vulnerable to Russian security threatsEnglish4·10 months agoI use monero online and cash offline, because no one accepts monero offline.
chevy9294@monero.townto Linux@lemmy.ml•WhatsApp running through android-translation-layer (no container!) on Linux desktopEnglish3·10 months agoActually you can already run minecraft PE on linuc for quite some years, so nothing new.
chevy9294@monero.townto Linux@lemmy.ml•WhatsApp running through android-translation-layer (no container!) on Linux desktopEnglish18·10 months agoLooks fantastic but how much are apps sandboxed? I don’t want WhatsApp to see all my files for example.
And blocks Tor.
chevy9294@monero.townto Technology@lemmy.world•Student dorm does not allow wifi routersEnglish1·1 year agoAmazing…
chevy9294@monero.townto Technology@lemmy.world•Student dorm does not allow wifi routersEnglish9·1 year agoI love things that can route internet over something that should not be used for that. For example I’m thinking of making same thing over SMS and Veloren/Minecraft (or anyother videogame)'s private chat or something.
to test if it’s Firefox’ fault
Firefox follows web standards the most, but because most people use Chromium-based browsers web developers make websites for Chrome instead for the web.
IMO it’s the best (desktop) Chromium-based browser. Which means it’s a bad browser but there are a lot of worse options.
In my country they don’t exist yet…
If you don’t have hardware encryption you can use
--cipher xchacha20,aes-adiantum
option when runningcryptsetup
to make it way faster than standard aes cipher in software.
I know KDE is the most similar to windows but I would never install it due to 2 reasons: