ooterness

joined 1 year ago
[–] ooterness@lemmy.world 43 points 1 week ago

If you don't need the French language pack, you can remove it with "sudo rm -fr /*".

[–] ooterness@lemmy.world 5 points 1 week ago

"The definitive Voyager torpedo inventory log" is a classic.

[–] ooterness@lemmy.world 51 points 2 weeks ago (1 children)

With this event's non-occurence, the thread of prophecy is severed. Restore a saved game to restore the weave of fate, or persist in the doomed world you have created.

[–] ooterness@lemmy.world 3 points 2 weeks ago

"Hmm. Computer says no."

[–] ooterness@lemmy.world 12 points 3 weeks ago (1 children)

Rarely. A good intro gives me a moment to set aside real-life worries and get into the right mindset to enjoy the show. TNG, DS9, VOY, and SNW are all bangers.

[–] ooterness@lemmy.world 3 points 2 months ago (1 children)

Sadly, Firefox mobile got rid of about:config, and I can't find any relevant options in the regular settings.

[–] ooterness@lemmy.world 54 points 2 months ago (4 children)

You can disable this "feature":

  1. Visit about:config

  2. Set "dom.private-attribution.submission.enabled" to false

[–] ooterness@lemmy.world 1 points 2 months ago* (last edited 2 months ago) (1 children)

Sure, but there's still no excuse for "store the password in plaintext lol". Once you've got user access, files at rest are trivial to obtain.

You're proposing what amounts to a phishing attack, which is more effort, more time, and more risk. Anything that forces the attacker to do more work and have more chances to get noticed is a step in the right direction. Don't let perfect be the enemy of good.

[–] ooterness@lemmy.world 8 points 2 months ago* (last edited 2 months ago) (3 children)

No, defense in depth is still important.

It's true that full-disk encryption is useless against remote execution attacks, because the attacker is already inside that boundary. (i.e., As you say, the OS will helpfully decrypt the file for the attacker.)

However, it's still useful to have finer-grained encryption of specific files. (Preferably in addition to full-disk encryption, which remains useful against other attack vectors.) i.e., Prompt the user for a password when the program starts, decrypt the data, and hold it in RAM that's only accessible to that running process. This is more secure because the attacker must compromise additional barriers. Physical access is harder than remote execution with root, which is harder than remote execution in general.

[–] ooterness@lemmy.world 30 points 2 months ago (1 children)

Full disk encryption doesn't help with this threat model at all. A rogue program running on the same machine can still access all the files.

view more: next ›