• 1 Post
  • 27 Comments
Joined 4 months ago
cake
Cake day: March 19th, 2024

help-circle

  • For most casual users, it is a deal-breaker. And it’s hard to get everyday people to use your software with roadblocks like that.

    That’s fair enough, but the way the mobile app works is that you can opt in to having encryption at rest with a passphrase, so if you want to leave your signal database unencrypted you can.

    You must not get email very often, this is absolutely a non-starter for me.

    Once you open it you can leave it open if you need notifications. Sometimes I leave it open, sometimes I just want to check my emails and then close it. Idk, I really think typing in a password for authentication/decryption regularly is such a non-issue, like for instance do you not regularly type in a password when you run a command with sudo? Again, if it’s opt-in I also don’t see the issue, except for the issue of allowing people to not encrypt their Signal data thus potentially compromising the people they’re messaging, but obviously that issue is currently universal for Signal desktop.




  • Obviously there is the disk encryption passphrase at boot, adding another one for signal would in my case be redundant.

    I also have full disk encryption, but I still have some databases on my disk encrypted because I decrypt my disk when I boot my computer. But yeah if you have Signal open (& its db decrypted) all the time it would probably be minimal. I don’t have Signal open all the time though, only when I want to check messages or am actively using it

    I don’t think it does much on the typical desktop, be it windows or linux, where there are so many ways to escalate or persist privilege for anyone that has user-level access.

    The point would be encryption, even the root user wouldn’t be able to read encrypted data if they don’t have the passphrase







  • More specifically, it’s the name used by the attacker. Could well be multiple people, or if it’s one person (still almost certainly state-funded, but the state can fund one person), a fake name nevertheless. We have no info about this person’s real life identity. They used a VPN in Singapore, and some people have looked at the times of the commits to try guess a timezone, though that’s not foolproof as they could’ve just been a nocturnal person, or even tried to schedule commits to happen at a time to suggest they’re in a different timezone, though I think the latter is unlikely and overkill.




  • Yeah afaik any AMD card should work out of the box with the Linux kernel, which includes AMD drivers. Never had any problems with my AMD card. Even on Nvidia it worked, admittedly proprietary Nvidia graphics driver updates frequently broke my graphics but downgrading (in a tty or even a chroot if I can’t do it graphically, I think I only ever needed a tty though I don’t think I ever needed to chroot because of an nvidia update) fixed it, and using outdated Nvidia drivers was not too big of a deal, I didn’t notice game performance issues.

    And gaming on Linux is completely fine if you don’t have any kind of funky setup (like musl or whatever). The majority of my steam library has native linux versions, those that don’t play fine with Wine/Proton.




  • communism@lemmy.mltolinuxmemes@lemmy.worldBackdoors
    link
    fedilink
    arrow-up
    1
    ·
    edit-2
    3 months ago

    It’s a safe bet that there are others (in FOSS) that remain undiscovered.

    I agree, but I don’t think that image (about survivors’ bias) applies to the op meme then, as that would imply that it only seems like open source backdoors are convoluted because we’ve not found the simple/obvious ones