• 0 Posts
  • 68 Comments
Joined 2 years ago
cake
Cake day: June 26th, 2023

help-circle

  • Never. There’s always more to do. Once you can produce food, shelter and entertainment with zero effort

    We’ve been able to do that for about 100 years now. All of humanity’s technological problems have been solved - on paper - for generations. There’s unfortunately never been a magical consolidation period where all the hungry were fed and all the exposed were sheltered. That’s not something that automatically happens.

    The technology and production capacity to raise Somalia to the same literacy, living standard and life expectancy as Denmark exists. It would just require surplus growth and production capacity to go to Somalia and not Denmark for a few generations. Example nations are arbitrary, adjust as needed.



  • Thanks, I didn’t know most any of that stuff!

    So the bootloader also gets updated, and new versions of the bootloader need to get signed. So if the BIOS is responsible for signing the bootloader, then how does the operating system update the bootloader?

    Does that happen often? I had, apparently incorrectly, assumed those things were more or less fire and forget.

    Kinda. The problem here, IMO, is that Secure boot conflates two usecases/threat models into one.

    Huh, I think that might indeed be the central problem, good call.

    You must explicitly ask for this setup from the Linux distro installers (at least, all the one’s I’ve used). By default, /boot, where the kernel and drivers are stored, is stored unencrypted in another external partition, and not in the LUKS encrypted partition.

    Wait what, that just seems like home directory encryption with extra steps 🤦 I guess I’ll go back to Veracrypt then.



  • But this breaks automatic updates without entering the BIOS

    Maybe I’m misunderstanding a technical aspect here, but wouldn’t only the bootloader need to be signed? To my understanding a tamper-proof system already assumes full disk-encryption anyway, so any kinds of automatic updates would be happening in a black box anyway, wouldn’t it?

    and is just not feasible except for the PC on your desk at home

    That’s probably a different and more value-based discussion and I’m quite sure you didn’t intend it that way, but it’s hard for me to put into words how much this sentence structure offends me 😅
    A benefit to the users in front of their personal computers can never be an exception, it is (… ought to be) always the point of everything, the end goal. Having a solution that benefits end users and puts other entities at a disadvantage is always preferable over a solution that puts end users at a disadvantage for the benefit of other entities.


  • As almost always the answer is “it depends”.
    From a security perspective you want to make sure that what your system boots is trusted and not tampered with by a third party. If your threat model includes people with physical access or malicious software (root kits) manipulating your operating system, then secure boot can help mitigating if you set it up correctly.
    If that’s none of your concern, then you probably shouldn’t bother with it.

    It’s such a silly system. Could have just had it in a way that automatically trusts only whatever system(s) is/are installed while the BIOS is unlocked so any user benefits from secure boot as soon as they set a BIOS password.













  • Driving a car and doing it regularly is the most dangerous task most anyone living in any number of western societies with service-based economies will ever undertake. There is nothing wrong with treating it accordingly - with awe, care and a healthy portion of respect and fear.
    But whether the decision not to do it is a good one depends on your life circumstances. Do you live or plan on living in a big European city? Yeah, you don’t need a car in your life, good riddance. Do you live in a North American suburb or rural area? Er… not using a car is probably not an option unless you relocate.

    I had a pretty bad car accident due to failing to yield the right of way (I struggle with multitasking)

    Maybe I’m misunderstanding something here. It should go without saying that when one is driving, one’s attention should ideally be focused on nothing else and multitasking therefore shouldn’t be a factor.


  • How do you know? Statistics reported by websites… which are recording user agent strings?

    If you randomly stopped people in the streets and asked them what a user agent was, you’d get a certain percentage of folks that give you the correct answer. That percentage is the upper ceiling for any possible error margin that websites recording user agent strings have in attributing those strings to actual browsers, since nobody unaware of that term will know how or be interested in changing their user agent.

    Do you think it likely that this percentage is going to be in any way, shape or form… impactful, considering that most people won’t be able to tell you what a browser is? 😜