I thought it would use molten salt instead of steam \s
I thought it would use molten salt instead of steam \s
I see you already got the answer. But if you are new to Linux I’d suggest to play overtwire bandit. This will significantly improve your Linux command knowledge.
I’m using .md
If you are going to spend it on mundane and legal stuff and assuming you live in mostly free country use a trustworthy exchange even if it requires KYC and spend it normally.
Keep in mind once you buy monero even from a KYC exchange they can’t track it afterwards. And this will be the safest option no real risk of getting scammed or stabbed.
If you are thinking about grey area then keep in mind that the moment something touches real world no matter whether you were using Tor, I2P or something else. It can be traced back to you. And if you are a worthwhile target LEA will spend resources to track you down.
There are ways to avoid that like using local monero and all but keep in mind those also involve different set of risks.
#NotAFinancialAdvice #NotALegalAdvice.
Do your homework and don’t get scammed or stabbed.
Other than crypto or cash based prepaid debit cards. There is no other service that will allow you to do financial transactions without doing basic KYC and keeping a record of your transactions required by law in almost all countries. They may claim it’s for legal reasons only and they don’t sell it but can you trust them? And how much do you trust your government to respect your privacy and not subpoena those transactions because they deem them to be unlawful.
Touch Grass maybe
2TiB ram is good enough if you are running ZFS but just make sure it has ECC.
FBI OPEN UP!!!
Neither did I. Wow dead before arrival.
OK make a graph of swear words used by Linus and all others against Linus’s age. I’ve a theory.
There are countries where a government ID is needed from opening a bank account to buying even prepaid Sim cards to LPG, electricity connection and everything in between and this ID requires you to give your all 10 fingerprints, iris scan and photo from all 3 angles. And to top it all off this data is leaked multiple times.
OK First thing GOS team is currently assuming that Pixel 10+ won’t meet their requirements. But for older Pixels it’s tough. Google just stopped sharing vendor blob, device tree, and instead of openly developing AOSP now it is fully behind close doors only releasing source later with full update. But I have hope. I’ve been daily driving custom ROMs for 10+ years and before I could afford Pixel I had cheap phones which also didn’t share any of these things but custom ROMs were very much thriving and they will always. Yes there may be a little more delay for new devices. All the new features may take longer but GOS already has a lot of security and privacy stuff figured out.
I think we should all support however we can to not just GOS but also other Custom ROMs. Because there will always be those who’ll stop society from progressing and all we can do is fight back with donations, our time, and resources.
There are only 2 types of people. Who hate systemd and those who don’t know what systemd is. \s
We were fucked a long time ago it’s just the effects showing now. But I hope the rebels at Graphene OS and other custom ROMs will find a way.
From technical point of view it is possible. eBPF already has almost everything needed for doing that. And I think it can be done with a simple LKM but if they want it included in the main tree I’m sure they’ll get some colorful email from Linus.
OK there are 2 completely opposite thoughts on shredding SSDs
All SSDs have a trim functionality so any unused data gets set to 0 automatically by the os or in some cases by ssd controller
Even if trim sets it to zero there is always some deviation from the original zero and a very very sophisticated attacker can find the actual data. And simply using shred or /dev/zero doesn’t help because SSD controller always writes to different physical location even for same file. And the only real way to ensure data can’t be recovered is to smash it
Pick and choose depending on your threat model. If you’re just selling it to someone or you know that no nation state actors are after your data then just do normal delete and then do the trim. If you think someone with capabilities is after your data and that they are willing to spend few hundred thousand dollars or even few million for whatever data is in your SSD then just microwave it and then smash with hammer. No need to shred or zero.
You might wanna rephrase that or some feds are gonna have a field day.
Using basic things like Graphene OS and keepass shouldn’t be considered privacy activist
How do you know?