• 1 Post
  • 26 Comments
Joined 1 year ago
cake
Cake day: July 12th, 2023

help-circle
  • Because DoD isn’t concerned with the regular internet or unclassified machines as much as with the classified computers - those set up by Information Technician ratings and the Security Managers to handle SIPR and JWICS access. The Admirals, Generals, and O-6s are also often tech illiterate old men, and those just beneath that, and the E-7+ crowd, are often just as tech illiterate. Microsoft also has a lot of multi decade DoD contracts, which they get billions for. Microsoft can’t sell the secure version because that just lets foreign adversaries reverse engineer all the possible vulnerabilities. Microsoft only cares about security as far as they get paid for it and can get away with. In the consumer market, that’s pretty much zero concern - not profitable enough.


  • Really depends on your use case. Like @[email protected] said, casual users that use the OS as a browser and email client can use practically any distro. Users that do a bit more, like casual gaming on gold-rated Steam games, generally do fine with something like Pop!_OS or Linux Mint.

    It’s when you start going towards the more hardcore users, like really hardcore gamers that play obscure titles or have unsupported Windows-specific hardware, artists that need very specific unsupported programs for editing or recording, engineers who need to do CAD specifically in a Windows-specific proprietary software, or a tinkerer that’s used to the Windows environment, that “become a sysadmin” starts being a reasonable complaint.



  • It’s an always-on AI that sits directly on your device inside a built-in Neural Processing Unit, or NPU, which takes screenshots every 5 seconds and scans the screenshots for information - including passwords, banking information, and other forms of PII. It then stores all of that information completely unencrypted, in a format that has been proven almost immediately after the beta preview to be able to be exfiltrated within seconds, easily, by a very simple piece of malware. The company claims that all the information is only stored locally, and after the backlash, that the AI would be opt-in only, but we’ve seen what Microsoft does with their “promises” before.


  • Did you make sure that you opened the terminal inside the folder where your iso and txt files are, or at least navigated to that folder after opening the terminal? Basically, it’ll say “file not found” if you run the CertUtil command while not “inside” the folder containing both the iso and the txt files. Same with running the gpg command.

    Usually, if you just open cmd.exe by itself from the searchbar, you’ll see something like this:

    PS C:\Users\your_username>

    If you instead opened the terminal inside the folder, you’ll instead see this:

    PS C:\Users\your_username\Downloads\ISO>

    Or whichever folder your iso and txt files are located in.

    CertUtil and gpg are pretty tunnel-visioned - they can only see stuff that’s in the same folder as they’re being run in, unless you give them specific directions to get to a different location. That’s why it’s easiest and best to have everything in a single folder and open the terminal “inside” that folder.

    Again - all this verification stuff with the terminal is, in my opinion, optional as long as you downloaded from one of the mirrors on the website. But since you still want to do it, this is the easiest way to go about it.

    All the directions are here: https://forums.linuxmint.com/viewtopic.php?f=42&t=291093







  • Have you tried Linux Mint? That’s pretty user-friendly. As long as it’s a .deb, you can double-click install through a GUI, no terminal needed. There’s an “app store” with most of your standard apps, like Discord, Slack, Teams, Skype or VLC, and it has an office suite pre-installed along with an email client. The first time you start, there’s a welcome screen that helps you through setting up the firewall, appearance (you can make it look like XP if you want), backups, NVIDIA drivers, and update manager you can ignore or manually update or automatically update. I don’t know your system, but it’s pretty intuitive for Windows users (I use a Windows 10 theme). I’d encourage you to give it one more try, if you’re still open to it.





  • https://cdn.netzpolitik.org/wp-upload/2024/06/2024-05-22-Recommendation-HLG-Going-Dark-c.pdf

    1. Implementing lawful access by design in all relevant technologies in line with the needs expressed by law enforcement, ensuring at the same time strong security and cybersecurity and providing for the full respect of legal obligations on lawful access. According to the HLG, law enforcement authorities should contribute to the definition of requirements, but it should not be their role to impose specific solutions on companies so that they can provide lawful access to data for criminal investigative purposes without compromising security. To that end, experts recommend developing a technology roadmap that brings together technology, cybersecurity, privacy, standardisation and security experts and ensures adequate coordination e.g. potentially through a permanent structure.
    2. Ensuring that possible new obligations, a new legal instrument and/or standards do not lead, directly or indirectly, to obligations for the providers to weaken the security of communications by generally undermining or weakening E2EE. Therefore, potential new rules on access to data in clear would need to undergo a cautious assessment based on stateof-the-art technological solutions (which should in turn consider the challenges of encryption). When ensuring the possibility of lawful access by design as provided by law, manufacturers or service providers should do so in a way that it has no negative impact on the security posture of their hardware or software architectures.
    3. Enhancing EU coordination and support to address situations where technical solutions exist to enable lawful interception but are not implemented by providers of Electronic Communications Services. In such cases, for example when home-routing agreements or when specific implementation of Rich Communication System (RCS) do not allow lawful interception capabilities, clear guidance and a dialogue facilitated at EU level would improve the cooperation with Electronic Communications Services.
    4. Conducting a comprehensive mapping of the current legislation in Member States to detail the legal responsibilities of digital hardware and software manufacturers to comply with data requests from law enforcement. It would also take into account specific scenarios and requirements that compel companies to access devices, in compliance also with CJEU caselaw and case law of the European Court of Human Rights. The goal should be to develop an EU-level handbook on that basis, and depending on the aforementioned mapping, to promote the approximation of legislation within this area, and to develop binding industry standards for devices brought to market in the EU, to integrate lawful access.
    5. Establishing a research group to assess the technical feasibility of built-in lawful access obligations (including for accessing encrypted data) for digital devices, while maintaining and without compromising the security of devices and the privacy of information for all users as well as without weakening or undermining the security of communications. Recommendations from the High-Level Group on Access to Data for Effective Law Enforcement, Council of the European Union, 22 May 2024, pp. 23-24.