deleted by creator
- 0 Posts
- 194 Comments
Yep that’s how my desktops and servers are set up. I only recently started adding the TPM PIN to my laptops for a bit of extra protection from cold boot / evil maid attacks.
given that Secure Boot prevents any modification of your computer’s boot chain
Secure Boot does no such thing. All it does it require that everything in the boot chain is signed by a trusted cert.
Binding TPM PCR7 to FDE (or more brittle options like 0+2+4) is really what protects against boot chain modifications but that’s another topic.
Disabling SB to install the distro, then re-enabling it once installed with either maintainer-signed shim or self-signed UKI/bootloader is perfectly fine.
You need both FDE and Secure Boot, ideally with FDE using a TPM with PIN and PCR 7+15=0. FDE without SB can be trivially boot-kitted and obviously SB without FDE is mostly pointless. Maybe for a server/desktop behind locked doors you don’t worry as much, but for a laptop you absolutely should. Also it’s really easy in Arch to resign the UKI with sbctl via a pacman hook whenever the kernel is updated so there’s no good reason not to use it.
If you’re relying on a LUKS password only, it can be brute-forced. To protect against that you need a decently long password which is annoying to type every boot. A short TPM PIN sealed by SB protecting LUKS is both more convent and more secure.
Finally, if an attacker or malware gets root, FDE isn’t protecting you either.
Yeah this is an issue but not a big one. Most distro’s installation media don’t use shim so you have to disable SB during install anyway.
And installing the 2023 KEK and db certs can be done via firmware without much trouble or you can use
sbctlin setup mode which I believe has both the 2011 and 2023 keys.If you dual boot Windows you’ll want to update it to the new bootmgr signed with the 2023 keys and add the 2011 certs to dbx to protect against BlackLotus or let Windows do it via patches+regfixes.
Also know that any changes to PK, KEK, dB, or dbx will change the PCR 7 measurement so handle that accordingly if you use TPM unlock for FDE.
IHawkMike@lemmy.worldto
Mildly Infuriating@lemmy.world•Every last one of these questions is terribleEnglish
19·5 months agoIt’s unlikely since it uses the field ID and not the text, so it wouldn’t know which question went with which answer.
It’s so rarely needed to actually use these anyway, that it’s a non-issue IMO. You should never opt to use security questions as they are terrible from a security standpoint. This is just for when they are required by stupid websites.
IHawkMike@lemmy.worldto
Selfhosted@lemmy.world•[Help please] Identify process that is calling a domainEnglish
3·5 months agoMost DNS queries are UDP.
I’d do a modified scream test and change old.domain to something like 1.2.3.4. Then run sudo netstat or ss with -tpn, grepping for 1.2.3.4.
Or something like grep -r old.domain /etc.
While I’m not 100% certain it’s not just confusing perspective, it does appear that the slope rise is shorter than the run, suggesting that this is from the top of the stairs.

IHawkMike@lemmy.worldto
No Stupid Questions@lemmy.world•Why was file search much faster in Windows XP than in subsequent versions?
1·5 months agoYou definitely should still check this, but even with proper indexing settings Windows is still garbage at search and has been since XP.
And this is coming from one of the only people who ever defends MS on Lemmy.
Yep, that would work fine for the first line of defense. Eventually, you can expand it to copy, replicate, or drive swap the onprem backups offsite somewhere (e.g., cloud, office, or family member) if you want to protect your data from site loss (e.g., house fire).
The only thing missing is a good backup.
If you are storing anything important – especially Immich and Vaultwarden data – you should have a good offsite protection strategy. And even the HASS config should be backed up with versioning because rebuilding from scratch could be painful once you get deep into it.
I’ll let others chime in on possible good backup options because I use Veeam and Azure, which really isn’t in the spirit of this community, and I’d be interested in good open source options myself.
Also, RAID (mirroring) is NOT a backup.
I read a lot of reviews before buying mine saying things like, “so heavy you could kill an intruder,” but still wasn’t prepared for just how heavy it was.
Definitely worth it.
Also the pupper is adorable. 😍
IHawkMike@lemmy.worldto
politics @lemmy.world•Trump says Iran and Israel agree to a ceasefire
2·5 months agoThat just the summary aggregated from multiple sources. Below it you should be able to drill into the actual published articles.
IHawkMike@lemmy.worldto
politics @lemmy.world•Walmart’s Billionaire Heiress Buys Full-Page Ad Urging People To ‘Mobilize’ At June 14 Anti-Trump Protests
110·6 months agoTotally not disagreeing, but for some more context she married into the Walton family, inherited a 1.9% stake in the company when her husband died in 2005, and has never had a role in the organization.
IHawkMike@lemmy.worldto
Technology@lemmy.world•What the actual hell, Microsoft?English
74·6 months agoLol Microsoft is not even close to a walled garden. This is just them removing the password manager feature that nobody used from their authenticator app.
IHawkMike@lemmy.worldto
RetroGaming@lemmy.world•Apparently it was in the manual, but I'm just learning it now.English
18·7 months agoAlso it was black on red to make it harder to photocopy. I remember my mom being proud that she’d used the filters on the fancy copier she had at work to copy this sheet.
Hard disagree. It only applies for things you cannot change but should try to accept rather than stressing over it.
If you say “it is what it is,” in reference to things you could change but choose not to, well that’s on you.





I’m really loving Octopi. Especially on the Fold since I can have multiple layouts. The stackable widgets are really nice too.
https://play.google.com/store/apps/details?id=com.otp.octopilauncher