Skip Navigation
Disk imaging
  • Definitely ddrescue. Unlike traditional dd, it can deal with failing drives, it's operation is resumable, and has some other features that's helpful. I would recommend using it even if your drive is fine.
    What it produces is a byte for byte copy just like dd.

  • Mounting External Drives on Linux without root from the terminal
  • If you want to invent and maintain your wheel then go ahead.. but I think we have better things to do than maintaining half the code of an operating system.

    Udisksctl has a variety of relevant features, and it works good, kind of.

  • Benefits of resolutions beyond 1080p
  • The benefit of the higher resolution shouldn't be about the colors, but that with bigger screens the movie does not start to get blurry.

    For desktop use on a desktop display, I don't see the benefit either. Even less on a phone, that is totally unnecessary.

  • Windows 11 24H2 will enable BitLocker encryption for everyone — happens on both clean installs and reinstalls
  • If you’re at that point of not trusting a company, the best practice would be to avoid using their devices or connecting them to your network.

    Yes, that would be the best practice. However there are a lot of best practices that cannot be followed for one reason or another.

  • How Do I Prepare My Phone for a Protest?
  • visiting only known websites is not a scaleable option

    On the regular day to day use, that's right. But on a protest you really should be careful, more than usual.

    but every other important one

    Is that universally true for all phones?

  • Encrypted services Apple, Proton and Wire helped Spanish police identify activist | TechCrunch
  • if you need smth anonymous Proton is not for you.

    Oh it is for you, but you have to be careful. Proton won't try to find out info you didn't give them, but they can't pretend that they don't have info that they actually have. They run an onion service, and account recovery is made possible without a recovery contact.

  • Windows 11 24H2 will enable BitLocker encryption for everyone — happens on both clean installs and reinstalls
  • Or if you don't trust Microsoft to begin with, just use Veracrypt, it won't upload your recovery key anywhere, but will help to make a recovery usb stick.

    Additionally, the problem above was not some kind of "unhealthy paranoia", but disliking Microsoft and then still creating an account for some reason, one that they deemed to be a throwaway account. Question is why did they do that (oh, because Microsoft made it hard* to skip registering an account? That can't be! Microsoft is trustworthy and anyone thinking else is just unhealthily paranoid, right?), but also how should have the user known that this was a dangerous thing to do? Don't tell me they should have read the dozens of pages of dry legal text.

    *Yes, it's hard if it's not an option in the installer. How the fuck you look it up when you don't have your computer?

  • Windows 11 24H2 will enable BitLocker encryption for everyone — happens on both clean installs and reinstalls
  • And you slowly figure out that every photo, every document, everything critical to you is now protected from you and you can’t get it back.

    How fortunate that onedrive auto uploads those to Microsoft. That is, until you run out of your quota..

  • How Do I Prepare My Phone for a Protest?
  • But what if you get it back? Or if you just keep it?

    There is a chance that you have Pegasus on there, and I wouldnt want a phone without the detection of this.

    You attempt to flash your full backup to it. And maybe then read it back if you can for verification that it was actually written to memory, but that probably won't be possible when using fastboot. That's all you can do that's reliable, to some extent.

  • How Do I Prepare My Phone for a Protest?
  • Not sure if VPN eliminates all risks with 2G and 3G, maybe it does.

    It doesn't, but probably even on modern phones it only does if you explicitly set it to only use 4G but nothing below that.

    Mull has no process isolation at all, but support for UBO and Noscript. Bad situation

    If you only visit known reputable websites it's probably not really a problem, but also, I think there are chromium browsers that have addons. Not sure though if there's one that besides that also has the security patches.

    These cannot be written without TPM verification or stuff

    I doubt that it couldn't be written, I believe TPM can only verify its contents and make the phone refuse to boot if it doesn't agree on the authenticity of the partition contents.
    However it's also a question which partitions are checked that way: only the system partition? Or more? Probably not all, because they can't verify e.g. the main user data partition, because it's ever changing contents were never signed by the manufacturer. There's a few dozens of partitions usually so this is not trivial to answer.

    the verification will not be done inside the OS, that would be totally flawed.

    Yes, verification is done by one of the bootloaders. At least partly, the OS and maybe other layers must be doing it too, just remember why Magisk had a feature to hide it's processes and the controlling app itself from select system services and other apps.

    Reading data has nothing to do with that. They likely can, but that doesnt matter.

    Didn't mean that. I meant writing data that is later being read by other important system software that is vulnerable to specially crafted quirks in that data.

  • Why people don't talk about Google Maps' privacy issues
  • Water does not think, it flows where it can.
    People while driving cannot know which route isn't clogged, because cars are not flowing like water. If that would be the case all the small streets around main roads would be full too. If a street is clogged, and the driver sees it, they can decide to go on a different route, but in waze if they are using it to plan a route, it'll try actively to avoid roads that are too busy.

  • HDMI stream live processing?
  • in order to be able to modify the stream in real-time and send it back out...

    It doesn't need to modify. What it needs is detection, and then either blacking it out, or replacing with a simple progesssbar-like screen on a black background.

  • Hello, world! You, me, and The Matrix.org Foundation
    matrix.org Hello, world! You, me, and The Matrix.org Foundation

    Matrix, the open protocol for secure decentralised communications

    Hello, world! You, me, and The Matrix.org Foundation

    Introduction of the first Managing Director

    1
    Why does Ruby Gem 3 install gems to Ruby 2 directories?

    I have just installed the tmuxinator 3.0.5 ruby gem with gem 3.2.5 and the --user-install parameter, and to my surprise the gem was installed to ~/.gem/ruby/2.7.0/bin/.

    Is this a misconfiguration? Will it bite me in the future? I had a quick look at the environment and haven't found a variable that could have done this. Or did I just misunderstand something? I assume that the version of gem goes in tandem with the version of ruby, at least regarding the major version number, but I might be wrong, as I'm not familiar with it.

    I have checked the version of gem by running gem --version. This is on a Debian Bullseye based distribution.

    1
    Google's Web Environment Integrity made me remember this video
    vimeo.com Trusted Computing

    "Trusted Computing" - ever heard of it? This motion graphic style documentary explains what the term "trust" has in common with "Trusted…

    Trusted Computing

    The video is a short documentary on Trusted Computing and what it means to us, the users.

    If you like it and you are worried, please show it to others. If you are not the kind to post on forums, adding it to your Bio on Lemmy and other sites, in your messaging app, or in your email/forum signature may also be a way to raise awareness.

    5
    InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)RE
    ReversalHatchery @beehaw.org

    Computers and the internet gave you freedom. Trusted Computing would take your freedom. Learn why: https://vimeo.com/5168045

    Posts 3
    Comments 905