I’m like this post but I use GNU Guix System instead of Gentoo and GNU Boot instead of the old fully free Libreboot (and I have my own appartment lol).
Hello, Fellow Guix-SD user.
Not a hackerman, but I really don’t think that 12yo CPU is much more secure than a modern one.
A correct assumption
- under investigation for ordering child sex dolls under their real name to their home address with their bank account and posting pictures with their face in it to reddit
The extent some people go to refuse their privacy being stepped on. These people like this are pathetic. /s
BRO JUST LET THEM DO WHATEVER THEY WANT YOU’LL BE FINE AS LONG AS
Y O U H A V E N O T H I N G T O H I D E
if these folks were serious about their privacy - they would be running fucking Qubes
Are they in the room with us now?
At least there are cameras tracking everyone’s movements now.
And local cash-accepting taxi companies have been replaced by two cooperative companies, so that loophole is almost closed.
all the 3-letter agencies pool their resources
billions of dollars are dumped into the project
several years later they manage to decrypt all of this guy’s communications
it’s nothing but chats about how to encrypt shitTime for the $5 wrench…
Or just beat the shit out of them and get the info you need (or more likely want).

Relevant xkcd: https://www.explainxkcd.com/wiki/index.php/File:security.png
that did actually happen to a guy, over the password to his bitcoin account
https://abcnews.go.com/US/nyc-crypto-kidnapping-torture-case/story?id=122280419
Assistant District Attorney Michael Mattson said Woeltz and Duplessie allegedly lured the man to New York from Italy by threatening to have his family killed.
Really a stretch of the word lured…
Yes, that is how you’d use a wrench in that context
Yes, that is what the wrench is for…
Ah yes, a Linux teenagers power fantasy. Hardened Gentoo and Selinux beats deblobbing btw, noob.
Selinux
Hey, let’s not get crazy. I still want to use it for practical things, too. /s
You can’t impress me with a bog standard Gentoo. If you want to show power, build a fortress. At least put some tripwire you mostly trip yourself on (program that keeps an encrypted hash database of your system files to find intrusion changes, needs an update with every update of course or it alerts only your negligence).
Tripwire should encrypt everything and store key in RAM. Shutdown after 30s, if not emergency overwrite string is entered stored coded on real life paper in a vault with a 9 digits alphanumeric lock. 😏
Fuck yeah, that’ll show them!
check the IP logs
Its all encrypted? This guy uses VPNs and Tor?
Presuming that Mossad can be topped with a subscription to ProtonVPN or a Tor browser is adorable. Hell, presuming nobody in the intelligence services is familiar with Linux is even more adorable. “We’ve got everyone at the NSA fooled because we’re Arch users”. Yeah, sure buddy. What do you think these professional computer nerds are doing in their own free time?
Where do you even think encrypted applications come from?
most of these security agencies effectiveness is just in the myth’s they’ve built around themselves of actually being effective.
mossad in particular, just has a complete disregard for killing innocents and a really good propaganda wing to suppress all their fuckups.
most killers are not right in the head, they act on pure emotion, they post “i am going kill X” online to their social media of choice the night before going to kill X…it’s dumb as shit. that’s how low the bar is on utilizing violence
fact is lone wolf threats are practically unstoppable, especially if they have a modicum of competency
this is also why it’s said killing gets easier/“first ones the hardest” etc. even if your not some sociopath (which, most people as a whole arent)…once you know and understand just how easy it is to kill people and get away with it…lot of the worlds problems start to look like they have very easy solutions…
I mean, tell it to Jeffery Epstein. The man was pulling strings halfway around the world with his endless supply of blackmail and bribery.
Also lots of killers seek psychiatric help voluntarily (and are often sadly ignored). For a sane, moderately competent person it’s easy to plan the perfect murder or terror attack – it’s a different thing to carry it through because a sane person also has mental guardrails.
Mossad is effective because Israelis are ruthlessly trained to dehumanize anyone who’s an obstacle to their goals.
From security agencies, presumably…
Got me? No!
Security agencies create encryption for their own usage. This means they want it to be mathematically as strong as possible, to protect their secrets from enemy security agencies. Why would they backdoor their own protection system?
They’ll just go through the side door instead.
The Snowden docs proved that the NSA was intentionally weakening some encryption standards to make them amenable for cracking.
Then there’s also the constant pressure from the FBI to make it law that encryption technologies must have backdoors. These are both public record.
Yeah, this isn’t like using OpenBSD! /s
I don’t think they’ll be prodigies or anything but they probably know literally one or two tricks or weaknesses that they heavily depend upon.
So you can never really feel secure (that’s not to say take no caution).
Literally just spends all day commenting hacker news posts
“His fucking kernel is deblobbed too?”
As a noob, I genuinely can’t tell if this is real jargon or not
It’s referring to binary blobs. A windows exe might be a binary blob.
These are distributed compiled. Even if the project is open sources, the binary blob might have been generated by a compromised compiler.This is one of the reasons the XZ Utils compromisation went unnoticed for so long. One of the compressed files used for testing contained malicious code that would be included in the build artefacts (IE, the final compiled binary) under very narrow and specific circumstances.
So “deblobbed” means absolutely everything in the OS was built & compiled on their computer from original source code
Thanks. But I don’t understand why any of that ensures that the compiler isn’t compromised? Do you mean they have presumably vetted the compiler themselves first? This is something that would be incredibly time consuming to do, assuming we are talking about gcc or something equivalent, which, I mean if you’re compiling an OS…
That’s true.
But the idea is that there are no precompiled binaries that are implicitly trusted.
So you CAN vet all of the code and artefacts, and if something doesn’t seem right you can trace it back to the code and understand exactly why, instead of seeing a black-box binary and coming to the conclusion “it’s doing something it shouldn’t, but I don’t know what or why”.
The idea is that you are in control of the entire build process.But yes, it would be extremely time consuming to vet GCC, build it from source and (I guess) compare checksum/hashes against published binaries. Then vet all of the source code of everything you need to compile for Gentoo, then compile that and compare checksum/hashes etc.
Which is why it’s in a 4chan meme.But I imagine governments agency will have some deblobbed Linux installs with the technical capacity to vet all the code and artefacts
Ah yes… Government… Yeah they seem extremely,… very competent… For sure, for sure . But yeah , thanks see ya
The concepts they’re referring to have more to do with Ken Thompson’s Trusting Trust essay. Laurie Wired recently came out with an episode about it. It’s a rather intractable problem in computing, and unfortunately, even with the best practices to overcome it, you can never be 100% sure that your system is completely free of compromise.
Funny, I just watched it :D great recommendation
Thanks! I wonder if I will ever reach that level of privacy paranoia. At the rate that I’m going, maybe 5 years.
Tower’s explanation of blobs is kind of strange and not really correct. In a general sense a binary blob is just a situation where you have open-source software that is combined with proprietary components.
Most relevant example to the meme is that the Linux kernel is open-source, but can sometimes contain drivers that are proprietary and don’t have source code available. Those proprietary drivers would be the blobs.
As a counter-example, the linux-libre kernel that devfuuu linked to, is a version of the Linux kernel that has had all the blobs removed.
Oh that makes so much more sense <3
Lol tell me your computer is blobbed without telling me your computer is blobbed!
I would love to be fully open source but what metal to use…?
A government hackerman would be the same guy. Except working for the government.
“Well, we raided his mom’s house and confiscated all his cobbled-together e-waste.”
“And!?”
“His drives were encrypted. Apparently he ‘applied PQC patches to dm-crypt himself’, whatever that means. All I know is that it made the guys from NSA scream. There was nothing we could do.”
“So we’ve got nothing?”
“Oh no. He happily gave us both the keyfile and the passphrase.”
“So…?”
“No warez, no CSA, no political manifestos or illicit recipes. Not even tax evasion - it’s not like he has an income. Just… copyleft source code as far as the eye could see.”
The NSA dude screamed in ecstasy because someone finally used his dm-crypt patches.
copyleft source code is a telltale sign of communism, thus anon can be associated with Big terrorist like the Antifa.
open source collaborative software is anarchy. Book him
I lol’d at this. But seriously, privacy is a fundamental human right. You don’t need to have something to hide to assert your right of privacy.
Yeah the government doesn’t understand we don’t want you to be sociopaths with the excuse of our safety.
my spirit animal
Only Asymetric encryption, like PGP has Problems with Quantum Computers. Symmetric, like AES, used by dm-crypt is not affected by Quantum Computers. It doesn’t rely on multiplied big prime numbers or stuff like that.
Is it a proved theorem that quantum computers dont have an advantage for AES, or is it just unkown?
The question isnt whether quantum computers have an advantage over regular computers (they pretty much always do for code cracking as the parallel superposition computation is some crazy shit that changes cryptography forever) instead the question is whether or not AES-256 is able to resist our current quantum compute and how long it can do that.
Its a simple equation, as long as it takes longer than the lifespan of the universe to compute with our most powerful supercomputers its considered good encryption. However as computers get more powerful, the projected time decreases potentially to the point of human lifespan time frames. Thats when it becomes a problem and the standard fails.
Currently AES is quantum resistant but it almost certainly won’t be forever. New standards are gonna need to be adopted at some point.
FOSS gang rise up!
I’m in this post and I like it.
I legit spent the afternoon the other day installing Linux on my first non-Raspberry Pi machine since 2007. It is a 13 year old laptop with NVidia GPUs (2). It went perfectly smoothly and Linux sees both GPUs. I tried Megabonk on it and it runs at 60FPS maxed out. I encrypted the drive. Bless you, Pop!_OS
Thoughts on Gentoo over something like Fedora? (Or whatever you’re using)
I run Gentoo.
It’s made my fundamentals stronger.
It allows me to run the minimal number of codepaths.
Every now and then it makes me happy. Sometimes proud of myself. All because I solved some problem that was helped by the mindset Gentoo had set up.
it makes me happy
This is the exact way I feel about Gnu Guix_SD
If only nixos could be made minimal. The smallest install is hundreds of MB large. How small can gentoo get?
I don’t know the size in bytes, haven’t cared much about it for some time now. It also very much depends on the definition of minimal. My minimal != your minimal.
I’m referring to use flags, which allow me to not have a bunch of features I don’t use compiled to begin with. Less code - fewer headaches.
Gentoo is fun and a nice way to learn more about computers. Their wiki and their community was really good when I was into it, I’m sure it still is. But compiling everything from scratch is quite demanding of your CPU and your time, so it’s not really something that you run as your daily driver for long.
All lies.
After install, the distro just works.
I’ve had more failed upgrades in Ubuntu.
So if you have base Linux skills, you will have a rock solid distro, which may take a while to update, but you can limit the number of CPU cores for compiling, and therefore use the PC even during that.
And USE flags are so addictive, while being just strings in a single file.
I believed I would learn more about Linux when daily driving Gentoo. But all I learned is how to run three commands to keep the system updated, including compiling the kernel. And it just works.
Can’t have ring -3 vulnerabilities if your CPU doesn’t have a ring -3

What if i don’t remember my own password?
It says “until” so you’ll be having plenty of time to remember it.
I’il probably have internal bleeding before i remember them
Well in reality they will use waterboarding or some other technique that ensures suffering while not being life threatening. There’s actually a great movie called Unthinkable about this.
That still doesn’t mean you’re gonna remember it. I forget my master password all the time. Torture would just ensure I’d forget it even worse.
That’s the whole thing with torture. It demonstrably doesn’t work, but people who use it aren’t the people who’re concerned with scientific reality
It does work for people who value their wellbeing more than they value the information they remember. For remembering stuff there may be some medical injestions before torture.
I see, still i wouldn’t remember the password, i need to find my master passwd on a piece of paper somewhere i don’t know myself
Then it would really suck to be you at that point
there was another crypto kidnapping (also in russia) a few years ago, they tortured him and got all his apes. DeFi, kinda scary
give them the duress password gg
Gonna become the $2 waterboard rag method for insubordination
“If this password doesn’t work, I’m going to break your thumbs.”
“Uh…”
“Yeah, its not the real password. Lets break his thumbs and ask him again.”
a duress password typically wipes the device when entered.
so the data would be destroyed
And then they would just keep hitting him for his defiance
Free drugs!
Free Wench hits, too.
Feels more and more likely living in the land of freedum right now.
deleted by creator





















