Avatar

vector_zero

vector_zero@lemmy.world
Joined
0 posts • 10 comments
Direct message

IMO it’s not even about something making sense, we’re just very accustomed to fahrenheit, so it feels more natural to us.

I’ll be the first to admit that I have no idea about what’s warm and cold in Celsius. I know 0 is quite cold, 20 is room temperature, and 100 is near instant death.

permalink
report
parent
reply

You’d be surprised how inept some people can be. Back when I worked in defense, we heard a story about a guy who, while preparing to exfiltrate sensitive data, named the file “data_to_exfiltrate.zip”. What a moron.

permalink
report
parent
reply

old

Old doesn’t mean bad

broken

Is it?

unmaintained

Is it?

I use Wayland personally, but I’ve had almost zero issues with X in the last decade, maybe with the exception of minor screen tearing several years back.

permalink
report
parent
reply

Though after a point rubber hose cryptanalysis will become the more pragmatic option for an attacker.

permalink
report
parent
reply

That doesn’t sound trivial at all.

permalink
report
parent
reply

Once that key is loaded in memory anyone with 10 minutes and access to google could trivially unlock your computer in several different ways. It is virtually exactly like having no security whatsoever.

I highly doubt it.

If you have any tips for how I can personally bypass my computer’s encryption in 10 minutes without being able to login, I’d love to try my hand at it.

permalink
report
parent
reply

The idea behind it is that the files are stored encrypted at rest, which is really what you want, because once a system is booted, you have to play by the computer’s rules (respect file permissions, policies, etc.).

The TPM provides a secure mechanism to provide a decryption key to the computer during boot, eliminating the need for direct interaction.

Could it be compromised? Probably, but it would take considerably more effort than a man-in-the-middle on your keyboard via a logic analyzer.

permalink
report
parent
reply

I ended up scoring a free lifetime membership years ago, but is their stuff open source? I never fully trusted it, so I didn’t end up using it for anything

permalink
report
parent
reply

I second this.

Full disk encryption is entirely practical for everyday use. If you don’t already have a dedicated TPM, your motherboard/CPU may provide a software TPM (fTPM?). If so, you don’t even have to interact with the machine during boot. It’s just a bit slower to start up (by a few seconds), which really isn’t a big issue for your average user.

permalink
report
parent
reply