• 1 Post
  • 110 Comments
Joined 3 years ago
cake
Cake day: July 31st, 2023

help-circle

  • I’m reading this post as a well-intended PSA for those who might not know that their computers keep logs, and I appreciate the poster for that. But also I got a laugh from it sounding kind of like this:

    If you want to avoid providing incriminating evidence during a possible police interrogation, you must disable your brain’s long-term memory functions by lobotomizing yourself



  • Your email is the root of your digital identity, and pretty much everything in your digital life is tied to it. If your email is provided by Big Email, they own your digital identity and it exists at their whim, with no recourse if it gets taken away, compromised, or abused.

    If you own your domain and pay for mail hosting, you can at least move your email between providers if something goes wrong, and have some recourse with those providers since you’re a customer instead of a product.








  • Podman/docker leave behind old images, image layers, and containers that need to be cleaned up occasionally. podman system prune will do so.

    If 8TB was taken up quickly or unexpectedly, it might be something like a container failing to start and being recreated over and over, leaving each failed container behind as it goes. podman ps --all will list all containers, running or stopped. Before doing the system prune run that and podman image ls --all to see if anything looks amiss.




  • This isn’t about the user being treated as untrustworthy or as less than an adult, it’s about the security model GrapheneOS is based on. The team explains it well in this thread: https://discuss.grapheneos.org/d/18953-why-the-stigma-against-rooting

    If you want to trade away the benefits of that security model to be able to tinker with things and feel more in control of your phone, you can use something else that lets you do that by default, or patch and build a rootful Graphene yourself. Ironically, the risk there is of giving full control of your phone and privacy to a potential malicious third party anyways, but different threat models may deem that acceptable or low-risk enough.

    but desktop OSes function fine giving users root abilities.

    Again, threat models. They may function fine for most people, and for most people the risk is low, but the linux desktop world is a security nightmare.