Message from @Tervy
Discord ID: 543049381494915072
nobody cares about mac
apple has put amd gpus in their iMac Pros
somebody's gonna care
AMD cards will probably be
most current AMD cards work on Mac
so why not future ones?
i wonder when first countries state by law that _any_ device manufacturer sold inside said country needs to provide security updates for 10+ years or something
didn't EU already force 18 months?
note sure, sadly 18 months aint nothing really
18 months ain't shit
>not buying a new phone every 12 months
are you guys poor?
Itoddlers BTFO
based polish people
but apparently thats pretty much copy and paste from AMDs own benchmarks
Link to article?
Is it possible to determine, when a LUKS encrypted system has been successfully decrypted and booted the last time, if you are unable to decrypt it yourself?
The question in essence is: if you have two encrypted Linux systems installed on two SSDs and you are asked to hand over the decryption keys by the authorities, can you give the password of one of them to the authorities, and plausibly deny to remember the other one because "its an old system that I haven't used in a long time"?
as long as all log files are within encrypted container.. i doubt ?
mm actualy probly depens on system
if Grub2/uefi/whateverbootmanager is a snitch and keeps logs
then yes @Deleted User
but boot managereless login ??should not ?? write logs to anywhere but inside the containers once you have given password
but if you need such deniability, you better of using something else than luks
such scenarios are when the "destroy on password2" bundled with "destroy if copied" step in
later needing quite bit tinkering with the controller board of hdd
this is why you never store anything of negative value on your computers
I am not storing anything that incriminating but wouldn't that be even less plausible to deny?
They can inspect the broken hard drive and figure out
yes but they would not have any proof
only that you had such setup there
And that you deliberately gave password 2 which hindered investigations
Which would bring you right into even more trouble
not really no
you just make the password2 = password2
or 1234