• mika_mika@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      9 days ago

      It’s cute that anyone thinks situation 2 would be necessary and that encryption couldn’t be broken with the press of a button if someone seriously wanted your info.

      Fantasy land.

      Privacy is a human right, but our rights were eroded long ago.

      • UnderpantsWeevil@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        10 days ago

        “If this password doesn’t work, I’m going to break your thumbs.”

        “Uh…”

        “Yeah, its not the real password. Lets break his thumbs and ask him again.”

    • Maxxie@piefed.blahaj.zone
      link
      fedilink
      English
      arrow-up
      0
      ·
      10 days ago

      yes

      there was another crypto kidnapping (also in russia) a few years ago, they tortured him and got all his apes. DeFi, kinda scary

          • pressanykeynow@lemmy.world
            link
            fedilink
            arrow-up
            0
            ·
            10 days ago

            Well in reality they will use waterboarding or some other technique that ensures suffering while not being life threatening. There’s actually a great movie called Unthinkable about this.

            • Axolotl@feddit.it
              link
              fedilink
              arrow-up
              0
              ·
              10 days ago

              I see, still i wouldn’t remember the password, i need to find my master passwd on a piece of paper somewhere i don’t know myself

            • tyler@programming.dev
              link
              fedilink
              arrow-up
              0
              ·
              10 days ago

              That still doesn’t mean you’re gonna remember it. I forget my master password all the time. Torture would just ensure I’d forget it even worse.

              • Nalivai@lemmy.world
                link
                fedilink
                arrow-up
                0
                ·
                10 days ago

                That’s the whole thing with torture. It demonstrably doesn’t work, but people who use it aren’t the people who’re concerned with scientific reality

                • pressanykeynow@lemmy.world
                  link
                  fedilink
                  arrow-up
                  0
                  ·
                  10 days ago

                  It does work for people who value their wellbeing more than they value the information they remember. For remembering stuff there may be some medical injestions before torture.

  • xxce2AAb@feddit.dk
    link
    fedilink
    arrow-up
    0
    ·
    10 days ago

    “Well, we raided his mom’s house and confiscated all his cobbled-together e-waste.”

    “And!?”

    “His drives were encrypted. Apparently he ‘applied PQC patches to dm-crypt himself’, whatever that means. All I know is that it made the guys from NSA scream. There was nothing we could do.”

    “So we’ve got nothing?”

    “Oh no. He happily gave us both the keyfile and the passphrase.”

    “So…?”

    “No warez, no CSA, no political manifestos or illicit recipes. Not even tax evasion - it’s not like he has an income. Just… copyleft source code as far as the eye could see.”

    • serenissi@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      10 days ago

      copyleft source code is a telltale sign of communism, thus anon can be associated with Big terrorist like the Antifa.

    • rirus@feddit.org
      link
      fedilink
      English
      arrow-up
      0
      ·
      10 days ago

      Only Asymetric encryption, like PGP has Problems with Quantum Computers. Symmetric, like AES, used by dm-crypt is not affected by Quantum Computers. It doesn’t rely on multiplied big prime numbers or stuff like that.

      • zeca@lemmy.ml
        link
        fedilink
        arrow-up
        0
        ·
        9 days ago

        Is it a proved theorem that quantum computers dont have an advantage for AES, or is it just unkown?

        • SmokeyDope@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          9 days ago

          The question isnt whether quantum computers have an advantage over regular computers (they pretty much always do for code cracking as the parallel superposition computation is some crazy shit that changes cryptography forever) instead the question is whether or not AES-256 is able to resist our current quantum compute and how long it can do that.

          Its a simple equation, as long as it takes longer than the lifespan of the universe to compute with our most powerful supercomputers its considered good encryption. However as computers get more powerful, the projected time decreases potentially to the point of human lifespan time frames. Thats when it becomes a problem and the standard fails.

          Currently AES is quantum resistant but it almost certainly won’t be forever. New standards are gonna need to be adopted at some point.

    • piyuv@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      10 days ago

      I lol’d at this. But seriously, privacy is a fundamental human right. You don’t need to have something to hide to assert your right of privacy.

    • socsa@piefed.social
      link
      fedilink
      English
      arrow-up
      0
      ·
      10 days ago

      The NSA dude screamed in ecstasy because someone finally used his dm-crypt patches.

  • tuckerm@feddit.online
    link
    fedilink
    English
    arrow-up
    0
    ·
    10 days ago

    Linux nerds literally only want one thing and it’s fucking the idea that your full disk encryption will pay off one day.

    • SorryQuick@lemmy.ca
      link
      fedilink
      arrow-up
      0
      ·
      10 days ago

      Is there any reason to do full disk encryption, vs encrypting a single partiton or a folder with eCryptfs? It’s not like your /usr/bin, etc… needs to be encrypted, but encrypting it reduces performance.

      • CrackedLinuxISO@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        0
        ·
        10 days ago

        Suppose you’re in some hypothetical country where torrenting is illegal. The presence of /usr/bin/qbittorrent on your disk could be enough to face charges. Unencrypted /var/log? Maybe they can see you’ve been running a cryptocurrency miner. There could be plenty of data outside of $HOME on your computer which a cop might try to use against you.

        In the most paranoid hypothetical scenario, someone could mount your unencrypted /usr/bin and replace openssl with a compromised version.

        • SorryQuick@lemmy.ca
          link
          fedilink
          arrow-up
          0
          ·
          9 days ago

          /var/log and the likes aren’t really issues, I just have mine as a link to the real one in an eCryptfs folder. Though I guess you’d be right about qbittorrent, this is something pretty rare.

          In the most paranoid hypothetical scenario, someone could mount your unencrypted /usr/bin and replace openssl with a compromised version.

          I suppose if you’re in this situation, you have way more important things to deal with. That would imply someone has physical access to your computer, at that point if they really want to know what you’re doing they might as well setup a camera.

          • CrackedLinuxISO@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            0
            ·
            9 days ago

            What I’m getting at is that for people using FDE, any performance hit is worth it compared to worrying that you’ve covered every angle.

            • SorryQuick@lemmy.ca
              link
              fedilink
              arrow-up
              0
              ·
              9 days ago

              By default, most FDE have horrible performance hits and require significant tweaking, configuring and benchmarking to get it right depending on hardware, use cases, conditions… I’m sure there are quite a bunch of people out there who don’t want to do any tweaking while still having the performance they paid for.

              • ganryuu@lemmy.ca
                link
                fedilink
                arrow-up
                0
                ·
                9 days ago

                Unless what you are doing is heavily I/O dependant (mostly heavy database workloads), that’s not really true anymore, especially with a modern CPU and say, LUKS encryption. Phoronix has a recent review of FDE using LUKS, and apart from synthetic I/O tests, the difference isn’t really observable.

                Try cryptsetup benchmark on your pc and look at the results for aes-xts for example.

      • darklamer@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        0
        ·
        10 days ago

        Is there any reason to do full disk encryption, vs encrypting a single partiton or a folder with eCryptfs?

        One obvious reason is that it just is very simple to encrypt the entire disk and be done with it.

    • UnderpantsWeevil@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      10 days ago

      your full disk encryption will pay off one day

      They day you fuck up your password one too many times and lock yourself out of your own computer.

    • chloroken@lemmy.ml
      link
      fedilink
      English
      arrow-up
      0
      ·
      10 days ago

      That’s the best part, it can never really “pay off.” It can only mitigate. Hardly seems worth it to me. Alas.

        • chloroken@lemmy.ml
          link
          fedilink
          English
          arrow-up
          0
          ·
          10 days ago

          I personally am only worried about data loss, not data theft. But I do take privacy relatively seriously nonetheless.

          • RaivoKulli@sopuli.xyz
            link
            fedilink
            arrow-up
            0
            ·
            10 days ago

            I use different methods for both. Encryption so all of my logins and personal stuff isn’t lost if my laptop is stolen and backups to safeguars the important data.

    • devfuuu@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      10 days ago

      It pays off the moment someone steals my bag with the laptop when I leave the office or coffe shop.

    • bdonvr@thelemmy.club
      link
      fedilink
      arrow-up
      0
      ·
      10 days ago

      It can, but most likely it only would if you’re doing illegal shit and get caught. They’d search your place for evidence and FDE could keep them from discovering some things.

      But uh, if they got that far into investigating you then you’re probably already screwed.

      • communism@lemmy.ml
        link
        fedilink
        arrow-up
        0
        ·
        10 days ago

        Not true at all. Governments regularly raid political dissidents. It’s a disciplinary tactic in and of itself. I’ve been raided for plenty of shit and never been convicted of any crime.

          • communism@lemmy.ml
            link
            fedilink
            arrow-up
            0
            ·
            10 days ago

            My point is that raids are for the purpose of gathering evidence. The way it usually works is that the state decides they want to criminalise you for something so they search your place for anything they can use to incriminate you—not vice versa, ie they dont already have enough evidence to incriminate you when they plan the raid.

            I don’t know about a majority of people, but with the rise of the far-right across many countries I think it is a significant number of people who are at risk of this, and I think it’s rather short-sighted to assume only a small number of “cool people” are affected (thank you though). Like I am a nobody, I’m not famous, and there are lots of political organisers and militants like me you’ve never heard of being targeted for their political activities. You don’t need to be a Snowden to have some degree of state interest in you, and most state repression (raids, incarceration, arrests, etc) is relatively cheap to dish out willy-nilly.

            • mlg@lemmy.world
              link
              fedilink
              English
              arrow-up
              0
              ·
              10 days ago

              I think he’s over blowing the 5 dollar wrench method.

              Unless you live in a place where human rights are disregarded like every possible moment, they’d probably only resort to torturing you to gain access if they believe you are somehow connected or have ancillary evidence that points to you. IE that darkweb dude they tortured in Turkey to gain access to his encrypted laptop containing incriminating evidence.

              Otherwise they’ll just do a preemptive raid hoping that it leads to new information.

              Like right now border patrol has been forcing foreigners to show data on their mobile devices to see if you have any roasted vance memes so they can turn you away. But in many cases, it has been done because they already had you flagged as posting or sharing roasted vance memes online.

              Of course you could also always be in a craphole country where they’ll torture you anyway, regardless if they have any reason to believe you are connected to something, but simply due to the fact that you opted to use FDE or any practical security scheme.

          • MummysLittleBloodSlut@lemmy.blahaj.zone
            link
            fedilink
            English
            arrow-up
            0
            ·
            10 days ago

            I know a nice middle aged mum whose house was raided by whatever the Australian SWAT team calls themselves at 2am. She’s basically considered a public enemy by the government. And the worst she’s ever been accused of is blocking traffic and using water-soluble spray chalk on buildings.

      • kalapala@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        0
        ·
        10 days ago

        Doesn’t need to be a government but just common thiefs getting your computer and selling it to someone who knows what to look for.

  • mech@feddit.org
    link
    fedilink
    arrow-up
    0
    ·
    10 days ago

    all the 3-letter agencies pool their resources
    billions of dollars are dumped into the project
    several years later they manage to decrypt all of this guy’s communications
    it’s nothing but chats about how to encrypt shit

  • chi-chan~@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    10 days ago

    This is cute and all, but I’ll bet that <country-s-intel-agency> would have other ways to get into your computer.

    ​ edit: wrong ending bracket

    /rant: can we get angle brackets back for god sake?

      • Illecors@lemmy.cafe
        link
        fedilink
        English
        arrow-up
        0
        ·
        10 days ago

        I run Gentoo.

        It’s made my fundamentals stronger.

        It allows me to run the minimal number of codepaths.

        Every now and then it makes me happy. Sometimes proud of myself. All because I solved some problem that was helped by the mindset Gentoo had set up.

          • Illecors@lemmy.cafe
            link
            fedilink
            English
            arrow-up
            0
            ·
            10 days ago

            I don’t know the size in bytes, haven’t cared much about it for some time now. It also very much depends on the definition of minimal. My minimal != your minimal.

            I’m referring to use flags, which allow me to not have a bunch of features I don’t use compiled to begin with. Less code - fewer headaches.

      • mirshafie@europe.pub
        link
        fedilink
        arrow-up
        0
        ·
        10 days ago

        Gentoo is fun and a nice way to learn more about computers. Their wiki and their community was really good when I was into it, I’m sure it still is. But compiling everything from scratch is quite demanding of your CPU and your time, so it’s not really something that you run as your daily driver for long.

        • msage@programming.dev
          link
          fedilink
          arrow-up
          0
          ·
          9 days ago

          All lies.

          After install, the distro just works.

          I’ve had more failed upgrades in Ubuntu.

          So if you have base Linux skills, you will have a rock solid distro, which may take a while to update, but you can limit the number of CPU cores for compiling, and therefore use the PC even during that.

          And USE flags are so addictive, while being just strings in a single file.

          I believed I would learn more about Linux when daily driving Gentoo. But all I learned is how to run three commands to keep the system updated, including compiling the kernel. And it just works.

    • Rai@lemmy.dbzer0.com
      link
      fedilink
      arrow-up
      0
      ·
      10 days ago

      I legit spent the afternoon the other day installing Linux on my first non-Raspberry Pi machine since 2007. It is a 13 year old laptop with NVidia GPUs (2). It went perfectly smoothly and Linux sees both GPUs. I tried Megabonk on it and it runs at 60FPS maxed out. I encrypted the drive. Bless you, Pop!_OS

  • SCmSTR@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    0
    ·
    9 days ago

    The extent some people go to refuse their privacy being stepped on. These people like this are pathetic. /s

    BRO JUST LET THEM DO WHATEVER THEY WANT YOU’LL BE FINE AS LONG AS

    Y O U H A V E N O T H I N G T O H I D E

    • Melvin_Ferd@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      9 days ago

      For me it’s because you all never went far enough. It’s not about data privacy. It was always about data scarcity. You all wanted content creators to get paid while also using that same platform to keep your stuff private. Except the way content creators get paid is working for websites and corporations that steal your data and create profiles that information brokers can trade amongst themselves to build larger profiles where they don’t even need you to use any of their systems just to build your profile. But you like random bearded guy that makes cat comics. We should have always been hostile to anyone using the internet to create content in order to sell it.

    • humorlessrepost@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      9 days ago

      At least there are cameras tracking everyone’s movements now.

      And local cash-accepting taxi companies have been replaced by two cooperative companies, so that loophole is almost closed.

    • waspentalive@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      9 days ago

      Ah, the call of the total information warrior - “If you have done nothing wrong, you have nothing to hide”: do they track your phone wherever you drive? Ever drive past a crime in progress unknowingly? Can you prove you were not participating in the crime? Even if it is the dead of night in the warehouse district on your way home from work?

    • Dragonstaff@leminal.space
      link
      fedilink
      English
      arrow-up
      0
      ·
      9 days ago

      Frankly, I think the people with more to hide are more virtuous than I. Labor organizers, activists, etc. If you’re working to overthrow my country, awesome. Best of luck to you.

      But it’s also fair to say most of us will not truly benefit from writing a custom boot loader and after a certain point this is just a hobby.