• BlackLaZoR@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    ·
    7 hours ago

    Another reason to install Linux and be done with this shit.

    I recommend starting with Fedora KDE, and delving to anything else later…

  • yesman@lemmy.world
    link
    fedilink
    English
    arrow-up
    104
    arrow-down
    2
    ·
    1 day ago

    I’ve never trusted full disk encryption because I understand the person most likely to get locked out of my data is me.

    I can see the use case for laptops, but my security policy is “if you have physical access, you win”.

    • Appoxo@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      1
      ·
      7 hours ago

      At best a virtual rncrypted disk on the unencrypted drive.
      If you (not you OP) are doing that secretive work, maybe you shouldnt do that on this OS and instead on Tails or other temporary distros

      • Hanrahan@slrpnk.net
        link
        fedilink
        English
        arrow-up
        10
        ·
        18 hours ago

        yes, and then i forget the encryption password as i don’t use the laptops that much these days and now have it written on the lid

        kidding :) or am I :(

    • peacefulpixel@lemmy.world
      link
      fedilink
      English
      arrow-up
      21
      ·
      1 day ago

      well i suppose it depends on how deep your personal security goes. are your passwords stored on your device? are they stored securely? do you have a password manager? do you have a standalone app for your password manager and not a browser extension? is the master password for your password manager stored on any of your devices? do you have any settings that automatically locks your PC upon inactivity? is the pin for your PC related to you personally in any way? i get what you’re saying because at the end of the day physical access IS pretty hard to mitigate. but you’d be surprised how far simple steps can take you.

  • Brkdncr@lemmy.world
    link
    fedilink
    English
    arrow-up
    20
    arrow-down
    2
    ·
    edit-2
    1 day ago

    I’m not sure what the problem is. His account is locked, but it’s not like he can’t still sign code and distribute it even if that means using a new account.

    Edit: other articles point out that his company failed certification, and he’s not been able to reach support to find out why.

    • Voroxpete@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      6
      ·
      10 hours ago

      The answer to your question was in the article;

      Because Microsoft requires developer accounts like his to re-verify the security of their software, Idrassi said that many devices running VeraCrypt will soon be unable to boot if the issue is not resolved.

  • krigo666@lemmy.world
    link
    fedilink
    English
    arrow-up
    20
    arrow-down
    5
    ·
    1 day ago

    And this why Secure Boot can’t be trusted. It is Micro$lop that signs and issues the keys.

      • Grass@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        3
        ·
        19 hours ago

        wasn’t there some dumb shit like every linux distro using fedora keys which were from microsoft?

        • Hugging Stars@programming.dev
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          11 hours ago

          Microsoft signs Red Hat certs then Red Hat signs everyone’s certs, so the only thing Microsoft can do is to revoke Linux as a whole.

          It’s the solution that requires minimal user effort since most computers are designed for Windows.

          • Appoxo@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            1
            ·
            7 hours ago

            And MS probably won’t do it willy-nilly because their stack is peobably using it to some degree and many more of those Fortune-X00 are very likely something RHEL. So fucking that over will crash their stock like it did with CrowdStrike but much much worse.

            • Masterkraft0r@discuss.tchncs.de
              link
              fedilink
              English
              arrow-up
              1
              ·
              7 hours ago

              not only likely… i read somewhere that make more money with linux stuff on azure than with anything else they do can’t find the source rn tho

        • sorter_plainview@lemmy.today
          link
          fedilink
          English
          arrow-up
          1
          ·
          15 hours ago

          I think it is just chain of trust. Many used Microslop as the trust authority (may be due to convenience? I have no idea). Debian has a nice page on Secure boot and how it works.

    • 9tr6gyp3@lemmy.world
      link
      fedilink
      English
      arrow-up
      15
      ·
      edit-2
      1 day ago

      You can use custom keys with secure boot. Any PC newer than 2015 should give you that option.

      You don’t have to use Microsoft’s keys.

      This isn’t a secure boot issue. This is a bootloader issue.

  • Optional@lemmy.world
    link
    fedilink
    English
    arrow-up
    21
    arrow-down
    5
    ·
    1 day ago

    In Idrassi’s case, he said he is able to push new updates to Linux and macOS users unhindered, but the majority of his users that run Windows cannot currently receive updates.

    So, no problem then.