this post was submitted on 07 Feb 2026
-158 points (6.6% liked)
Open Source
44391 readers
27 users here now
All about open source! Feel free to ask questions, and share news, and interesting stuff!
Useful Links
- Open Source Initiative
- Free Software Foundation
- Electronic Frontier Foundation
- Software Freedom Conservancy
- It's FOSS
- Android FOSS Apps Megathread
Rules
- Posts must be relevant to the open source ideology
- No NSFW content
- No hate speech, bigotry, etc
Related Communities
- !libre_culture@lemmy.ml
- !libre_software@lemmy.ml
- !libre_hardware@lemmy.ml
- !linux@lemmy.ml
- !technology@lemmy.ml
Community icon from opensource.org, but we are not affiliated with them.
founded 6 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
This is more of a "be aware of your footprint" and less of a "security concern". This post is pressing hard on the fear of data getting stolen, however none of these things are major ways in which your data gets stolen.
It's phishing, social engineering, default configurations, weak passwords, no MFA, compromised online-services and supply-chain-attacks, and then, and only then are we even talking about actual CVEs in your local system and app environment. And usually we are talking old ones; for apps which you haven't updates in a while, as they are the most common.
What I'm saying is for your target audience, this is exactly the wrong thing to focus on. Tech savvy users might wanna look into this but they are very likely aware of all these things, and amateurs definitely should focus on basic security practices.
The problem with logs is that drive encryption is uselss in a Ross Ulbricht like situation where someone takes your laptop while ut is unlocked.
and what isn't... pretty sure in a Ross Ulbricht situation... there was more than enough stuff he needed to remain private currently open, and in the main files. Ulbright could have been on a live CD on a computer with no physical hard drive, and it wouldn't have helped him since they nailed him after he had logged into the silk road.
Yeah if you wanna go tht way you have to go etheral and memory only. That means either a VM with auto reset, or tails or something. However, this is not feasible for the average Linux user.