Skip Navigation

Posts
1
Comments
617
Joined
2 yr. ago

  • Always install Windows first. Mint should be able to find your Windows install and have it as a bootable selection.

    A quick fix you could try is to boot into Mint and reinstall the kernel. Itll run through the mkinitcpio and os-prober process and potentially add your Windows disk to the boot selection.

  • Where did you get violent extremism from?

    Wikipedia for radicalization

  • Not everyone wants to feel like they need to take violent extremist action to fight back against them. What actions have you taken to fight back?

  • TBD. Apparently he's not happy about the state of things. Not just his project, but the development community as a whole hasn't been able to nail it down.

  • Feel free to commit a pull request. Don't talk about it. Be about it.

  • No, i meant granular controls through a parental account that is set on a child account, like how most parental controls are for services. Its just a funny thought.

    "My kid can only watch a certain genre!"

  • Need more Challenger explosions

  • Nah, they should rush it

  • Per the arch wiki for Secure Boot:

    Secure Boot is a security feature found in the UEFIstandard, designed to add a layer of protection to the pre-boot process: by maintaining a cryptographically signed list of binaries authorized or forbidden to run at boot, it helps in improving the confidence that the machine core boot components (boot manager, kernel, initramfs) have not been tampered with.

    As such it can be seen as a continuation or complement to the efforts in securing one's computing environment, reducing the attack surface that other software security solutions such as system encryption cannot easily cover, while being totally distinct and not dependent on them. Secure Boot just stands on its own as a component of current security practices, with its own set of pros and cons.

    Note: For a deeper overview about Secure Boot in Linux, see Rodsbooks' Secure Boot article and other online resources.


    Per arch wiki for TPM:

    Trusted Platform Module (TPM) is an international standard for a secure cryptoprocessor, which is a dedicated microprocessor designed to secure hardware by integrating cryptographic keys into devices.

    In practice a TPM can be used for various different security applications such as secure boot, key storage and random number generation.

    TPM is naturally supported only on devices that have TPM hardware support. If your hardware has TPM support but it is not showing up, it might need to be enabled in the BIOS settings.

    Note: There are two very different TPM specifications: 2.0 and 1.2, which also use different software stacks.


    All that to say this is still not as secure as it could be (since it lacks some decent remote attestation), but security is best in layers, so a Secure Boot setup can be a great way to protect your pre-boot process.

  • Depends on your distros documentation, but essentially it verifies your UEFI, OS kernel, and other boot processes haven't been tampered with based on cryptographic signatures. Its really a neat setup.

  • Even on Linux, it's probably a good idea to set up SecureBoot with your TPM. Very few distros will automatically set this up for you, but I know for sure that Ubuntu and Fedora do this by default.

  • The internet archive is a thing tho. Once its on the internet, consider it forever.

  • w3 nE3d tO dEp0rT tHeSe mOnSt3eRs!!¡!¡! aNd gEt rId oF aLI mIliTaRy!!¡! aNd oNlY hAvE GeStApO!!¡!!

  • Did they also donate to Bidens inauguration?

  • Breath of the Wild. Enjoying it so far