• 0 Posts
  • 30 Comments
Joined 10 months ago
cake
Cake day: February 17th, 2025

help-circle
  • So, I’m not allowed to ask you for proof of your statement? And if its unrelated, then why did you post it? Its unrelated. Also, you’re saying you have an absence of evidence, ergo you have no evidence. Having no evidence does not qualify as evidence

    Asking for evidence wasn’t the issue, believing that the truth relies solely upon a discussion providing such evidence is.

    I think you are confusing having an option with something being mandatory.

    You misunderstood. Some of your own statements say it matters and is used. Mandatory wasn’t mentioned nor implied.

    And Tor nodes are not the same thing as VPN multi-hop.

    I just realized you think that Tor is built using multi-hop.

    I didn’t state they were the same. Tor uses “multiple hops” (you can find that string the the link I posted earlier). It is critical to the limiting of information seen by any single entity.

    And again, if you connected your Firefox browser to Tor, we could still track you. You’d get cookied or localStorage() tracked. When you disconnect from Tor, that stuff is still present in your browser. Almost like the number of hops you take or the IP address used doesn’t seem to really matter, huh?

    All that state can be removed. And the server might not be tracking that. Situations vary, adversaries vary. If you cannot imagine a scenario in which hops or IP address would matter, I would suggest doing some research.

    Its a real life Dunning-Kruger effect! I’ve never encountered this. You are going to do something really stupid and end up in prison.

    Personal swipes mark the end of this discussion. I would suggest you to leave those out next time as It detracts focus from constructive learning.

    This will be my last reply. You can also reply if you want (but I won’t see it).








  • Yeah, multi-hop is pointless for tracking.

    The logic to it is crazy too. People think VPNs make them anonymous (they don’t), but they also think multi-hop makes them MORE anonymous.

    Whether multi-hop matters to tracking is far and away a different discussion than whether multi-hop “makes you anonymous”.

    I too disagree with the original comment, but also believe the pendulum swung too far the other direction in your replies.

    Situations differ. Threat models differ. More hops can, from direct personal experience, make the difference in tracking. Your claim of “…multi-hop is pointless for tracking.” has too broad of a scope to be correct.





  • The solution is to have stronger privacy laws.

    Many people have the power to make certain privacy attacks impossible right now. I consider making that change better for those people than adding a law which can’t stop the behavior, but just adds a negative incentive.

    I wouldn’t wait around for the law to prosecute MITM attacks, I would use end to end encryption.

    Choosing an esoteric system for yourself is a good way for a free people to protect their privacy, but it won’t scale.

    If this is referencing using a barely-used system as a privacy or security protection, then I would regard that as bad protection.

    Everyone using GrapheneOS would be a net security upgrade. All the protections in place wouldn’t just fade away now that Facebook wants to spy on that OS. They’re still in place; Facebook’s job is still harder than it otherwise would be.



  • A threat model in which you don’t trust the Linux Foundation and volunteers but do trust Microsoft.

    Its all about what you want to protect. If a security breach is worse for you on Linux than it is on Windows because of which party has the data, then for you, Windows might be more secure.

    Some people get confused because they think there is some objective measurable security rating one can apply to a system for every person. There isn’t. We may use the same systems but have different threat models and thus rate the security different.


  • Privilege escalations always have to be granted by an upper-privilege process to a lower-privilege process.

    There is one general way this happens.

    Ex: root opens up a line of communication between it and a user, the user sends input to root, root mishandles it, it causes undesired behavior within the root process and can lead to bad things happening.

    All privilege escalation is two different privilege levels having some form of interaction. Crossing the security boundary. If you wish to limit this, you need to find the parts of the system that cross that boundary, like sudo[1], and remove those from your system.

    [1]: sudo is an SUID binary. That means, when you run it, it runs as root. This is a problem, because you as a process have some influence on code that executes within the program (code running as root).


  • unhrpetby@sh.itjust.workstoLinux@lemmy.mlComprehensive guide to hardening RHEL clones?
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    1
    ·
    edit-2
    8 months ago

    secureblue is about as secure as Linux can get…

    Unless you have an unusual threat model, this statement is utter nonsense. I can run a kconfig stripped kernel with zero kernel modules and one userspace process that is completely audited and trusted, without the ability to spawn even other processes or talk to network (because the kernel lacks support for the IP stack).

    Secureblue might offer something significant when compared to other popular and easily usable tools, but if you compare it to the theoretical limit of Linux security, its not even comparable.

    I examined Secureblue’s kernel parameters and turned multiple of them off because some were mitigations for something that was unnecessary. IE: The kernel would make the analysis that your hardware is not affected by a vulnerability, and thus there is no need to enable a specific mitigation. But they would override this and force the mitigation, so you take a performance hit, for what I understand to be, no security gain. Not sure why they did that, a mistake? Or did they simply not trust the kernel’s analysis for some reason? Who knows.