Skip Navigation

Posts
2
Comments
313
Joined
2 yr. ago

  • They can also hijack the connection of a connected box (ethernet over hdmi) or via a connected phone (bluetooth & chromecast iirc)

  • Yes. Separate or single disks makes no difference, it writes changes to the efi partition that bios references to boot.

    I don't know whether fedora is impacted, the article specifies the following as documented impacts

    " The reports indicate that multiple distributions, including Debian, Ubuntu, Linux Mint, Zorin OS, and Puppy Linux, are all affected."

    And I also note that at least 2 arch implementations are impacted in addition to that list (i first saw it on arch forums).

    I would suggest you definitely DON'T assume fedora is unaffected until you check your install, fedora participates in safeboot so given all the article listed distros also do (and arch has a method for it)

    Odds are they're impacted, M$ has done a scattergun on this, the only ones you can be sure are unaffected are those still bios booting rather than uefi

  • Wtf ? On what planet is the BBC "left centre" it is as establishment as it gets

  • To suspend Hungary (your first point) legally requires unanimity of all EU countries aside from the one to be censured. (Article7)

    Unfortunately Slovakia has recently elected a pro putin govt who will now block any attempt to deal with Orban.

    There was a short window between the end of the Polish far right PiS being in power and Slovakia changing leadership when it could have been done. Unsurprisingly Orban was very compliant during that period and as soon as he regained an ally is back to his old tricks.

    There is no legal way to do what you suggest

    Edit, missed a word

  • Disappointing tgat we arent when you put it that way

  • I can't work out if this is well intentioned ignorance or trolling, so I'll give it the benefit of the doubt and a serious answer.

    The first point is there are a huge number of threats to privacy and your online and data security from connecting to the internet even in western countries.

    VPNs are not just for protection from govt abuse, in fact their efficacy there is far lower than for several other use cases.

    If you're in the US (for example) and with one of the biggest ISPs then every DNS request being made is (was anyway, I assume still is) logged and your internet usage is then sold off to data brokers to profile you.

    So yeah, dont trust your ISP, and if you're dealing with a VPN that wants all that info then find a better one (proton or mullvad for exampke, you can pay with monero or bitcoin or even cash by snail mail)

  • I have considerably more characters than 6 at lloyds

  • Most common reason is running out of disk space. Boot from USB and have a check as to whether the update filled up the disk

  • Am lawyer, "beyond reasonable doubt" is for criminal charges. "Balance of probabilities" is for civil cases ie where jail is not a penalty option.

    Defamation is civil.

  • At that age cpu it's almost certainly a hard drive not ssd.

    My guess is 1-2 days. 4gb RAM is going to thrash like hell

  • Could be worth asking on selfhosted (how do I link a sub on lemmy ?) They probably have more relevant experience at this sort of thing.

    Edit

    Does this work ?

    https://lemmy.world/c/selfhosted

  • This post crashes me if I scroll down

  • What is the difference between type 1 & 2 please ?

  • The NHS is on its knees due to 14 years of deliberate Tory underfunding and sabotage. Asking for a reasonable wage is not a unreasonable act.

  • Simless phones can make emergency calls because the towers are configured to accept a request for an emergency call to any device that handshakes sufficiently (in Europe and most of Asia anyway, I assume also true of USA because it does work).

    The phone is able to contact the nearest tower and initiate a call because it scans for the nearest towers in the boot process in order to go to the next step (check sim details and connect to configured provider). In the process of determining available towers it provides the IMEI to each of them.

    If you live in a country where you have to provide ID to buy a handset then this definitely isn't anonymous, but even if you are in a country that doesnt, all the manufacturers track where every IMEI is shipped, and sku numbers on POS will easily allow determination of exactly when the device was sold. Even if you paid cash there will be CCTV footage of the purchase.

    TL;DR this will work mostly until you make a mistake against corporate tracking but will absolutely not protect you from three-letter-acronyms and law enforcement.

    Consider your threat model carefully before relying on it