bsergay

joined 2 months ago
[–] [email protected] 2 points 1 day ago (1 children)

Is this eduroam?

[–] [email protected] 2 points 2 days ago

To me, Endless OS seems to be the best fit for you; install it once and you never ever have to give it a second glance for troubleshooting or whatsoever. It achieves this through using "a read-only root file system managed by OSTree with apps installed using Flatpak.". This translates to:

  • The most important system-related files being protected from change by yourself and others.
  • Ensurance that your base installation is exactly the same as the one tested and used by its developers. And thus an (in-)direct quality control and maintenance by the very people that work on it.
  • As the base system is not changing beyond what is provided by the devs, installation of applications is relegated to flatpaks (see Flathub for the App Store).
    • Flatpak is a packaging format that doesn't interact with the base system to install software; think of it like how applications are installed on your phone. With this, you can still install software you need without compromising changes to the base system.
[–] [email protected] 1 points 1 week ago

filesystem based encryption is really cool.

Can't agree more.

[–] [email protected] 5 points 1 week ago (1 children)

Sorry to be that guy, but you should just sit down and go over Qubes OS' documentation. Some specific entries that might prove useful:

If you ask me, read a lot more beyond these. But if you really got no time, then at least suffice with the aforementioned.

Wish ya good luck!

[–] [email protected] 3 points 1 week ago

Mandatory read on the subject for the curious (also goes over Secure Boot, Boot Guard etc):

Trusted Boot (Anti-Evil-Maid, Heads, and PureBoot)

[–] [email protected] 9 points 2 weeks ago

The pursuit of Freedom led me to Linux.

[–] [email protected] 3 points 2 weeks ago

Are you referring to Qubes OS? If so, what do you mean exactly with hardware support?

[–] [email protected] 7 points 3 weeks ago

IIRC, it stops working whenever you disable JavaScript.

[–] [email protected] 1 points 3 weeks ago (1 children)

I think we’ve probably already spoken on the matter.

That's definitely possible. Unfortunately, I don't recall it 😅.

Indeed, Lemmy has a serious dearth of users interested and using secure distros over the averages.

It's definitely better at this than the platform that starts with an "R" and rhymes with "shit".

Thanks for your efforts; I do not know how to follow users on Lemmy but if I did I’d follow you. Do you have a blog/any other forum you’re more active on?

That's such a compliment. This is definitely one of the nicest things I've read on Lemmy. I really appreciate it.

Unfortunately, I'm only somewhat active on Lemmy. FWIW, consider checking out the following places if you haven't yet:

  • dataswamp.org/~solene
  • privsec.dev
  • tech.michaelaltfield.net/

And, of course, Qubes OS' forums.

Personally, I find it difficult to justify the time to learn Secureblue (especially the immutable part) or NixOS on Qubes because custom DispVMs with curated salt states work so well already. I’m interested in use-cases that will improve my security but I haven’t found any dialogue on this yet. If you do have opinions on this and know where I can look, I would greatly appreciate it!

As I've previously alluded to, I don't have any hands-on experience with Qubes OS yet. So, I don't think I can contribute meaningfully in this discussion. However, IIRC, there are some discussions found on the forums/discussions page for Qubes OS.

[–] [email protected] 2 points 3 weeks ago

Aight. I'm glad to hear that that has been resolved. I'd love to hear about your experiences on secureblue, so consider to report back. Finally, note that as a hardened distro, some things might work differently from what you'd expect. So be prepared to relearn a thing or two 😉.

[–] [email protected] 3 points 3 weeks ago (1 children)

Currently I got no time to go over this in more length. So apologies*. However, I still want to offer/provide a brief and concise answer. I will (hopefully tomorrow) return at this in more length.

Now i already setup my container & install some packages in it but the shortcut is missing from application launcher (a.k.a start menu), how i can link the shortcut from package inside toolbox to host application launcher ?

Short answer is that Toolbx for a long time (and perhaps still) didn't really support this feature. Sure, you could make it work, but it was a bit hacky. If this is a concern of yours, consider switching over to Distrobox. With distrobox, it's as easy as (while inside the container) distrobox-export --app <name app>. I will return at this tomorrow with the Toolbx way to do the same. I will also explore how Distrobox fares compared to Toolbx etc.

If i made a file (ex text file) from inside container will it show in Home directory ?

Yes if you've saved it in the Home directory to begin with.

If something crashed inside container will it also crashed my host system ?

Nope.

Why some packages doesn’t work inside container like Wine, Lutris, or Bottles ?

Interesting. I don't recall ever experiencing problems with either Wine or Lutris inside a Toolbx/Distrobox container. I'm also confident that Bottles should work.

Does it’s need special dependencies to make it work ?

This is definitely something that might be at play. Consider reporting the terminal output whenever you try to work with Wine, Lutris and Bottles.

Furthermore, expect some containerized solutions tomorrow for these 😉.

Can packages that modifying system (ex green tunnel, vmware, or QEMU, & hblock ) work fine ?

I'm not familiar with all of them. Though, you may expect troubles. I do recall I had to resort to rpm-ostree in order to make QEMU work. However, it's a fast moving space, so I wouldn't be surprised if Toolbx/Distrobox-based solutions exist for this. For example, since relatively recently, it has been possible to have a functioning Waydroid within Distrobox. I will also more exhaustively go over this matter tomorrow.

18
submitted 1 month ago* (last edited 1 month ago) by [email protected] to c/[email protected]
 

The Linux ecosystem is vast and diverse, offering a multitude of distributions to suit every need and preference. With hundreds of distros to choose from, it’s a pity that most are rarely mentioned while the popular ones are constantly being regurgitated.

This thread aims to celebrate this diversity and shine a light on smaller projects with passionate developers. I invite you to pitch your favorite underappreciated distro and share your experiences with those lesser-known Linux distributions that deserve more attention.

While there are no strict rules or banlists, I encourage you to focus on truly niche or exotic distributions rather than the more commonly discussed ones. Consider touching upon what makes your chosen distro unique:

  • What features or philosophies set it apart?
  • Why do you favor it over other distros, including the popular ones? (Beyond “It just works.”)
  • In what situations would you recommend it to others?

Whether it’s a specialized distro for a particular use case or a general-purpose OS with a unique twist, let’s explore the road less traveled in the Linux landscape. Your insights could introduce fellow enthusiasts to their next favorite distribution!

 

The Linux ecosystem is vast and diverse, offering a multitude of distributions to suit every need and preference. With hundreds of distros to choose from, it's a pity that most are rarely mentioned while the popular ones are constantly being regurgitated.

This thread aims to celebrate this diversity and shine a light on smaller projects with passionate developers. I invite you to pitch your favorite underappreciated distro and share your experiences with those lesser-known Linux distributions that deserve more attention.

While there are no strict rules or banlists, I encourage you to focus on truly niche or exotic distributions rather than the more commonly discussed ones. Consider touching upon what makes your chosen distro unique:

  • What features or philosophies set it apart?
  • Why do you favor it over other distros, including the popular ones? (Beyond "It just works.")
  • In what situations would you recommend it to others?

Whether it's a specialized distro for a particular use case or a general-purpose OS with a unique twist, let's explore the road less traveled in the Linux landscape. Your insights could introduce fellow enthusiasts to their next favorite distribution!

 
Leaked Docs Show What Phones Cellebrite Can (and Can’t) Unlock

The leaked April 2024 documents, obtained and verified by 404 Media, show Cellebrite could not unlock a large chunk of modern iPhones.

Cellebrite, the well-known mobile forensics company, was unable to unlock a sizable chunk of modern iPhones available on the market as of April 2024, according to leaked documents verified by 404 Media.

The documents, which also show what various Android handsets and operating system versions Cellebrite can access, provide granular insight into the very recent state of mobile forensic technology. Mobile forensics companies typically do not release details on what specific models their tools can or cannot penetrate, instead using vague terms in marketing materials. The documents obtained by 404 Media, which are given to customers but not published publicly, show how fluid and fast moving the success, or failure, of mobile forensic tools can be, and highlights the constant cat and mouse game between hardware and operating manufacturers like Apple and Google, and the hacking companies looking for vulnerabilities to exploit.

Analysis of the documents also comes after the FBI announced it had successfully gained access to the mobile phone used by Thomas Matthew Crooks, the suspected shooter in the attempted assassination of former President Donald Trump. The FBI has not released details on what brand of phone Crooks used, and it has not said how it was able to unlock his phone.

The documents are titled “Cellebrite iOS Support Matrix” and “Cellebrite Android Support Matrix” respectively. An anonymous source recently sent the full PDFs to 404 Media, who said they obtained them from a Cellebrite customer. GrapheneOS, a privacy and security focused Android-based operating system, previously published screenshots of the same documents online in May, but the material did not receive wider attention beyond the mobile forensics community.

For all locked iPhones able to run 17.4 or newer, the Cellebrite document says “In Research,” meaning they cannot necessarily be unlocked with Cellebrite’s tools. For previous iterations of iOS 17, stretching from 17.1 to 17.3.1, Cellebrite says it does support the iPhone XR and iPhone 11 series. Specifically, the document says Cellebrite recently added support to those models for its Supersonic BF [brute force] capability, which claims to gain access to phones quickly. But for the iPhone 12 and up running those operating systems, Cellebrite says support is “Coming soon.”

A SECTION OF THE IOS DOCUMENT. IMAGE: 404 MEDIA.

The iPhone 11 was released in 2019. The iPhone 12 was launched the following year. In other words, Cellebrite was only able to unlock iPhones running the penultimate version of iOS that were released nearly five years ago.

The most recent version of iOS in April 2024 was 17.4.1, which was released in March 2024. Apple then released 17.5.1 in May. According to Apple’s own publicly released data from June, the vast majority of iPhone users have upgraded to iOS 17, with the operating system being installed on 77 percent of all iPhones, and 87 percent of iPhones introduced in the last four years. The data does not break what percentage of those users are on each iteration of iOS 17, though.

Cellebrite offers a variety of mobile forensics tools. That includes the UFED, a hardware device that can extract data from a physically connected mobile phone. The UFED is a common sight in police departments across the country and world, and is sometimes used outside of law enforcement too. Cellebrite also sells Cellebrite Premium, a service that either gives the client’s UFED more capabilities, is handled in Cellebrite’s own cloud, or comes as an “offline turnkey solution,” according to a video on Cellebrite’s website.

That video says that Cellebrite Premium is capable of obtaining the passcode for “nearly all of today’s mobile devices, including the latest iOS and Android versions.”

That claim does not appear to be reflected in the leaked documents, which show that, as of April, Cellebrite could not access from locked iOS phones running 17.4.

The second document shows that Cellebrite does not have blanket coverage of locked Android devices either, although it covers most of those listed. Cellebrite cannot, for example, brute force a Google Pixel 6, 7, or 8 that has been turned off to get the users’ data, according to the document. The most recent version of Android at the time of the Cellebrite documents was Android 14, released October 2023. The Pixel 6 was released in 2021.

A SECTION OF THE ANDROID DOCUMENT. IMAGE: 404 MEDIA.

Cellebrite confirmed the authenticity of the documents in an emailed statement to 404 Media. “Similar to any other software company, the documents are designed to help our customers understand Cellebrite’s technology capabilities as they conduct ethical, legally sanctioned investigations—bound by the confines of a search warrant or an owner’s consent to search. The reason we do not openly advertise our updates is so that bad actors are not privy to information that could further their criminal activity,” Victor Ryan Cooper, senior director of corporate communications and content at Cellebrite, wrote.

“Cellebrite does not sell to countries sanctioned by the U.S., EU, UK or Israeli governments or those on the Financial Action Task Force (FATF) blacklist. We only work with and pursue customers who we believe will act lawfully and not in a manner incompatible with privacy rights or human rights,” the email added. In 2021 Al Jazeera and Haaretz reported that a paramilitary force in Bangladesh was trained to use Cellebrite’s technology.

Cellebrite is not the only mobile forensics company targeting iOS devices. Grayshift makes a product called the GrayKey, which originally was focused on iOS devices before expanding to Android phones too. It is not clear what the GrayKey’s current capabilities are. Magnet Forensics, which merged with Grayshift in 2023, did not immediately respond to a request for comment.

Cellebrite’s Android-focused document also explicitly mentions GrapheneOS in two tables. As well as being an operating system that the privacy-conscious might use, 404 Media has spoken to multiple people in the underground industry selling secure phones to drug traffickers who said some of their clients have moved to using GrapheneOS in recent years.

Daniel Micay, founder of GrapheneOS, told 404 Media that GrapheneOS joined a Discord server whose members include law enforcement officials and which is dedicated to discussions around mobile forensics. “We joined and they approved us, with our official GrapheneOS account, but it seems some cops got really mad and got a mod to ban us even though we didn't post anything off topic or do anything bad,” Micay said.

There is intense secrecy around the community of mobile forensics experts that discuss the latest unlocking tricks and shortcomings with their peers. In 2018 at Motherboard, I reported that law enforcement officials were trying to hide their emails about phone unlocking tools. At the time, I was receiving leaks of emails and documents from inside mobile forensics groups. In an attempt to obtain more information, I sent public records requests for more emails.

“Just a heads up, my department received two public records request[s] from a Joseph Cox at Motherboard.com requesting 2 years of my emails,” a law enforcement official wrote in one email to other members. I learned of this through a subsequent leak of that email. (404 Media continues to receive leaks, including a recent set of screenshots from a mobile forensics Discord group).

Google did not respond to a request for comment. Apple declined to comment.

1
Linux Myths (linux-myths.pages.dev)
submitted 1 month ago* (last edited 1 month ago) by [email protected] to c/[email protected]
 
Linux Myths

A compilation of linux myths and misconceptions, busted and explained

Purpose

To catalog and provide useful responses to common linux misconceptions and myths. To serve as a useful reference for new and old users alike.


I'm not affiliated with the website or its creator(s).

4
Linux Myths (linux-myths.pages.dev)
submitted 1 month ago* (last edited 1 month ago) by [email protected] to c/[email protected]
 
Linux Myths

A compilation of linux myths and misconceptions, busted and explained

Purpose

To catalog and provide useful responses to common linux misconceptions and myths. To serve as a useful reference for new and old users alike.


I'm not affiliated with the website or its creator(s).

43
Linux Myths (linux-myths.pages.dev)
submitted 1 month ago* (last edited 1 month ago) by [email protected] to c/[email protected]
 
Linux Myths

A compilation of linux myths and misconceptions, busted and explained

Purpose

To catalog and provide useful responses to common linux misconceptions and myths. To serve as a useful reference for new and old users alike.


I'm not affiliated with the website or its creator(s).

 

NixOS' influence and importance at pushing Linux forward into the (previously) unexplored landscape of configuring your complete system through a single config file is undeniable. It's been a wild ride, but it was well worth it.

And although it has only been relatively recently that it has lost its niche status, the recent influx of so-called 'immutable' distros springing up like mushrooms is undeniably linked to and inspired by NixOS.

However, unfortunately, while this should have been very exciting times for what's yet to come, the recent drama surrounding the project has definitely tarnished how the project is perceived.

NixOS' ideas will definitely live on regardless. But how do you envision NixOS' own future? Any ETA's for when this drama will end? Which lessons have we learned (so far) from this drama? Are there any winners as a result of this drama? Could something like this happen to any distro?


In case you're out of the loop. Though, there's a lot that has transpired since but which hasn't been rigorously documented at a single place; like how 4 out of 5 NixOS board members have quit over the last 2 months or so.

view more: next ›