• 0 Posts
  • 39 Comments
Joined 1 year ago
cake
Cake day: August 12th, 2024

help-circle




  • groet@feddit.orgtolinuxmemes@lemmy.worldThe end is near
    link
    fedilink
    arrow-up
    2
    arrow-down
    1
    ·
    2 months ago

    Yes. But none of that is in the way of “the Linux desktop”. A more unified system with less modules and components (you know, like systemd being a solution to everything) is actually beneficial for wide spread adoption.

    People hate systemd for design and philosophy but not because it keeps new people from adopting Linux.



  • wg-quick creates a systemd service for each wireguard config you have. So if you set up a tunel called wg0, you should be able to run ‘sudo systemctl enable wg-quick@wg0’ This will make your tunnel connect on every boot. I have the same setup on my proxmox, so i can reach certain services of my homelab proxied through a root server (the other end of the wireguard tunnel)


  • I dont know enough about electronics to say for certain but I think Holding down the key doesn’t work from a technical standpoint. If you press it down before the relevant stage of the boot process is running there might not actually run any code to even detect the key press. And holding down a key doesn’t continuously send new keypresses. Only “key down” and “key released”.

    But 100% agree on the standardised key. And it should be something that ia on every keyboard and not behind an alternative funktion! No alt/shift/fn. Just make it enter or something!


  • Decryption is not related to root permission.

    If the ENCRYPTED drive is mounted to the container, then the container can decrypt it.

    If the DECRYPTED drive is mounted to the container, then the container never knows it was encrypted in the first place.

    Second case is easier BTW. Just mount the drive on your host, type in the encryption password and you get a new, unencrypted drive. Specify this new drive in your docker compose/docker file.





  • You can install packages from other places and create your own (and then install them). The distro maintainers have one (or multiple) list of “approved” software but you can add as many lists as you want to your package manager. Often software developers will have their own package list that contains only their own software and if you install it you have to add that list to your package managers trusted software locations. In that sense it isn’t really better than going to the developers website and downloading an installer on windows but it is quite rare you have to do that


  • There is a big difference between “not keeping logs” and “dont have a way to check what you are doing right now”.

    No logs just means they can’t check what you did last week but they can always check the traffic you are producing in that moment. If they see traffic from a torrent protocol they know you are torrenting.

    Edit: they do claim they do “No Monitoring” so yeah by their own words they should not be able to tell you are torrenting.

    No Monitoring

    We don’t monitor your activity and have no way of seeing what sites you are visiting. We do store when you last used Windscribe as well as the total amount of data used in a 30 day period (to enforce free account limitations and to prevent abuse).






  • groet@feddit.orgtoNo Stupid Questions@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    13
    arrow-down
    1
    ·
    6 months ago

    If you want to calculate the cipher on paper everything that works on binary will be a huge overhead and basically require you to write stuff down for the calculations. So you need to burn sheets of paper for every en/decryption. So no XOR or anything.

    I would go for a stream-caesar-cipher. Find a mathematical formula that you can calculate in your head and that gives you a numbers between 1-35 (or something similar depending on how many different characters you need). The formula must be pseudo random so f(x)=5, f(x+1)=1, f(x+2)=28, … and not loop for a looooong time. Calculate a new value FOR EVERY LETTER OF YOUR TEXT!!! and use that as your Caesar cipher for that letter only (x is the position of the character in the text)

    You need to keep track which letter in your cipher text was encoded with which x (write the x of the first letter of each page down) and keep the formula a secret. Never ever under any circumstance reuse an x. So you need to keep x going for every page/message and can’t restart at 1 each time.

    If x becomes to large and the calculations to complicated, its better to change the formula than to restart x. Never ever ever ever reuse the same cipher because then you get all the drawbacks of Caesar ciphers (probability of letters, length of words (position of the space character) etc).