• 2 Posts
  • 5 Comments
Joined 2 months ago
cake
Cake day: September 16th, 2024

help-circle


  • Why do you think it’s a low risk? And even if it was a low 0.1% risk, the consequence is your entire digital life compromised and at the attackers mercy.

    I actually had someone who pretended to be a friend do this to me before when I used to be naive and didn’t think about these stuff. I think the risk is decent if you go to tech or crypto events or really anywhere there is money there is going to be black hat hackers looking for a naive victim. And it’s not too difficult to be a black hat hacker with all the open source hacking tools available. And most people have 0 security, not even disk encryption.

    The more you announce yourself as a target the higher the risk. And if you are putting a lot of effort into securing your computer that will make all kinds of adversaries very curious about what you are “hiding” even tho you aren’t actually hiding anything, you just want privacy which is a human right. But this will make all those adversaries try to gather info on you and look for a way “in” just because you are standing out from everyone by having so much digital security and privacy.


  • That doesnt delete your data. Now they have right to keep it forever for their “legitimate” reasons to protect them from a user who break their ToS. All you accomplish is give up the little rights you have.

    Corporations could actually do this anyway because there are so many vague rules in ToS and they can bend them however they want and without any user knowing you could all be flagged as a malicious users just so they have “legitimate” reason to do lots of nasty things with your data such as sharing them with networks who work together to prevent “malicious” users and “russian troll farms” etc. The whole system is rigged and just an illusion of protections for consumers/people.


  • Great questions but I’m not experienced enough to answer them. I hope someone does, I’m also noting them down to do my own research on them later.

    About SRTM, I’m not an expert at that neither but you can start by reading this FAQ it gives a good little intro/summary about SRTM and DRTM: https://trenchboot.org/FAQ/

    AEM uses DRTM (intel TXT) which is started by Trusted Boot. Trenchedboot doesn’t use Trusted Boot, their team worked with Xen and Grub to make some modifications so Trusted Boot isn’t necessary.

    SRTM is good. I’ve read the devs of Trenchboot saying the best is to have both SRTM and DRTM instead of only one of those techs. I could say some more stuff but I could easily mislead and say something wrong because I’m not so experienced so start by checking that FAQ i linked to and hope someone more experienced can answer.