Message from @Tervy

Discord ID: 543074550380756992


2019-02-07 08:28:47 UTC  

most current AMD cards work on Mac

2019-02-07 08:28:51 UTC  

so why not future ones?

2019-02-07 09:22:03 UTC  

i wonder when first countries state by law that _any_ device manufacturer sold inside said country needs to provide security updates for 10+ years or something

2019-02-07 09:41:13 UTC  

didn't EU already force 18 months?

2019-02-07 09:44:30 UTC  

note sure, sadly 18 months aint nothing really

2019-02-07 10:25:28 UTC  

18 months ain't shit

2019-02-07 10:47:12 UTC  

>not buying a new phone every 12 months

2019-02-07 10:47:20 UTC  

are you guys poor?

2019-02-07 12:17:36 UTC  

Itoddlers BTFO

2019-02-07 12:41:42 UTC  

https://cdn.discordapp.com/attachments/527849695020580866/543048714147725322/AMD_Radeon_VII_przetestowany.png

2019-02-07 12:41:46 UTC  

based polish people

2019-02-07 12:41:59 UTC  

https://cdn.discordapp.com/attachments/527849695020580866/543048783530033163/AMD_Radeon_VII_przetestowany.png

2019-02-07 12:42:13 UTC  

https://cdn.discordapp.com/attachments/527849695020580866/543048841390456844/AMD_Radeon_VII_przetestowany.png

2019-02-07 12:42:50 UTC  

but apparently thats pretty much copy and paste from AMDs own benchmarks

2019-02-07 12:44:21 UTC  

so realworld tests still keep us waiting

2019-02-07 13:03:06 UTC  

Link to article?

2019-02-07 14:14:23 UTC  

Is it possible to determine, when a LUKS encrypted system has been successfully decrypted and booted the last time, if you are unable to decrypt it yourself?

The question in essence is: if you have two encrypted Linux systems installed on two SSDs and you are asked to hand over the decryption keys by the authorities, can you give the password of one of them to the authorities, and plausibly deny to remember the other one because "its an old system that I haven't used in a long time"?

2019-02-07 14:20:52 UTC  

as long as all log files are within encrypted container.. i doubt ?

2019-02-07 14:24:22 UTC  

mm actualy probly depens on system

2019-02-07 14:25:29 UTC  

if Grub2/uefi/whateverbootmanager is a snitch and keeps logs

2019-02-07 14:25:32 UTC  

then yes @Deleted User

2019-02-07 14:26:24 UTC  

but boot managereless login ??should not ?? write logs to anywhere but inside the containers once you have given password

2019-02-07 14:28:10 UTC  

but if you need such deniability, you better of using something else than luks

2019-02-07 14:31:26 UTC  

such scenarios are when the "destroy on password2" bundled with "destroy if copied" step in

2019-02-07 14:32:02 UTC  

later needing quite bit tinkering with the controller board of hdd

2019-02-07 14:32:50 UTC  

this is why you never store anything of negative value on your computers

2019-02-07 14:33:06 UTC  

I am not storing anything that incriminating but wouldn't that be even less plausible to deny?

2019-02-07 14:33:22 UTC  

They can inspect the broken hard drive and figure out

2019-02-07 14:33:37 UTC  

yes but they would not have any proof

2019-02-07 14:33:54 UTC  

only that you had such setup there

2019-02-07 14:34:15 UTC  

And that you deliberately gave password 2 which hindered investigations

2019-02-07 14:34:26 UTC  

Which would bring you right into even more trouble

2019-02-07 14:34:51 UTC  

not really no

2019-02-07 14:34:58 UTC  

you just make the password2 = password2

2019-02-07 14:35:06 UTC  

or 1234

2019-02-07 14:35:22 UTC  

or your wifes name

2019-02-07 14:35:35 UTC  

when they try to passguess they end up destroying it themself

2019-02-07 14:35:40 UTC  

you had nothing to do with it at that point

2019-02-07 14:38:37 UTC  

as always you have right to be silent