• 4 Posts
  • 146 Comments
Joined 10 months ago
cake
Cake day: March 19th, 2024

help-circle
  • I don’t do deniable encryption on my root drives, just on external drives, and store the headers on my (non-deniably encrypted) computers. But if you want to deniably encrypt your root drive, Arch Wiki has some info:

    https://wiki.archlinux.org/title/Dm-crypt/Specialties#Encrypted_system_using_a_detached_LUKS_header

    You would still ultimately need an unencrypted header somewhere in order to boot your computer, so if it’s your main daily computer you’d likely carry around the USB stick all day and therefore it wouldn’t work against a state adversary who would obtain the USB stick with your header when they arrest you, if it’s on your person.

    Also, it’s much more plausible that an external drive is genuinely just random data with no encrypted contents than that the drive installed into a computer has no data. I do have some USB sticks etc with genuinely nothing on them because I wiped them with /dev/urandom at some point, and they’re lying around waiting for me to need an unused USB drive. The average person doesn’t have an “unused computer” with nothing on it, just random data on the drive. Especially if you are an activist/organiser, if the state finds your computer with just pure random data on it and no encryption header I think they will assume it is deniably encrypted.


  • Ah lol sure. It depends on what level of state repression you’re looking at. Regular cops will just not bother trying to decrypt a drive if they don’t have the password and you don’t freely give it up (you have the right to refuse to provide a password here, it’s under the same kind of principle as having the right to not incriminate yourself), but I’m sure military intelligence etc will go to the wrench technique. Also deniable encryption for anything particularly sensitive is good for the old wrench technique.




  • I encrypt all my drives. Me and the people I know get occasionally raided by the police. Plus I guess also provides protection for nosy civilians who get their hands on my devices. Unlike most security measures, there is hardly any downside to encrypting your drives—a minor performance hit, not noticeable on modern hardware, and having to type in a password upon boot, which you normally have to do anyway.



  • Afraid I don’t have a /dev/sr0. Tbh I built this PC yonks ago, I don’t remember how I plugged in my optical drive. I assume SATA would be the sensible and most likely option.

    I’m on Artix Linux with runit if that matters at all?

    I mean, it doesn’t matter to me whether or not I can eject my optical drive with a command, but at this point I’m just curious as to where the drive is on the filesystem lol

    Edit: I tried loading sr_mod with modprobe sr_mod (which wasn’t loaded for me) but still not seeing any sr* or cdrom in /dev. Again, not too bothered about this, but I’m kinda curious.






  • I prefer to do it clean and manually transfer files, because I usually don’t want a copy paste of my previous setup. For files that are just, for lack of a better way of putting it, personal storage (ie the files that are not dotfiles in my home directory, eg pictures and documents etc), they are on a Nextcloud.





  • configuring vim from blank state is an art itself and requires quite some time and dedication.

    Not really sure where you got this from. It’s quite simple to me. The default vim config works completely fine for me if I’m eg in a VM and I don’t want to copy all my vimrc and plugins over, if it’s a machine I’ll be using more long-term then it’s quite quick to configure a few settings to be how I prefer them to be. Main changes I make to a default config is enabling line numbers (idk anyone who wouldn’t want line numbers tbh) and setting them to be relative, set scrolloff=9999, use 4 spaces for indent, enable line and column highlighting, set a theme, and a couple odd scripts, but again the default is perfectly usable and the tweaks in my vimrc are just to my personal taste.


  • That’s why Nintendo wants to serve his family members cause they probably know he’s at one of them…and once he’s been served they’re responsible to send it to him or else they will be held accountable

    That’s not true. Nintendo wants to serve to family members because they (officially) haven’t been able to get through to him yet, and his family members may be able to contact him where Nintendo has not been able to.

    I also doubt the family members have any legal requirement to serve the papers to him. That would be a bit ridiculous. Imagine if some lawyer could hand you random court summons and now you’re legally required to find this person and serve the papers. You may say that it’s not the same situation because they’re related, but at what point are you related enough to a person where you can have this legal duty thrust upon you, especially given how most people have family members they’re not in direct contact with? He’s not criminally wanted; they wouldn’t be hiding a fugitive or whatever if they refuse to serve (assuming they even know where he is, which it’s perfectly plausible they don’t).

    In any case, it shouldn’t really matter. The streamer has demonstrated publicly that he’s aware of the lawsuit and at some point that will probably be deemed sufficient notice, possibly for the case to continue in his absence if he continues to be unresponsive.