• 0 Posts
  • 17 Comments
Joined 2 months ago
cake
Cake day: August 22nd, 2025

help-circle


  • Yes most “communist systems” have not been very communist. They are almost entirely conservative, even if they have a few token progressive issues, and tend to be authoritarian instead of democratic and anarchistic. Also it’s hard to call a country communist if they don’t even have the freedom to speak and assemble without the states permission.

    What usually happens is the people go communist, and the world powers implement an authoritarian regime that calls itself communist, but isn’t even remotely. Also socialism is better than communism.





  • Might as well reinstall at this point and for future reference. You shouldn’t just delete your network connection and firewall and throw stuff at the wall to fix it. A lot of this stuff is set up by a script during install and it only runs once so if you break it, you are going to need much deeper knowledge to fix it without a reinstall. You likely made new problems which makes finding your actual issue nearly impossible now. If you have a single issue it’s easier to find. If you have two issues there is no way to know if anything you did actually fixed it unless you get lucky and fix both issues at once.

    This sounds obvious but I recently didn’t realize that you had to click on the network connections and actually click, connect, to get it to connect on Ethernet in my distro. This is a quirk that I didn’t realize that Linux had. Windows just automatically connects to Ethernet, Linux probably doesn’t do this because it’s a security risk.

    This seems like the type of issue that chatGPT could really help with. With a few console commands you could verify that the system is seeing the network adapter and is communicating with it properly and try to list the networks directly, giving you a better clue as to where the chain is broken.

    Either way might as well reinstall at this point.


  • It’s an excellent first choice if you are a bit of a noob on Linux and are primarily or even moderately interested in gaming. I tried many Linux distros in the past, but bazzite was the one where I finally settled into Linux long term. I’ve been on Linux for nearly 4 years now and I’m finally getting my first Linux phone. There are many other great OSes of course but they often don’t include the proprietary drivers needed to get good gaming performance on Nvidia, and they don’t come with the whole environment set up for gaming out of the box.

    Other cool options are, Alpine, for a really tiny Linux system with a light c lib, Debian for a really simple Linux system, cachey which can give you a few percentage points more performance which could be useful in certain contexts like heavy data processing or gaming on a potato, Ubuntu if you like their stuff which is meant to be a bit more user friendly. Mint is supposed to be more familiar to windows users, but I like bazzite with KDE. I have such a hard time setting Linux up to do what I want, like play games. I love valve in general, they are a single good company in an ocean of shit. Linux in general has a real issue with people making shell apps but not going the extra mile to make a user interface, and bazzite just skips most of this for you to be sort of a windows XP of Linux. My brain just does not work that way. I’m partially deaf so to me the whole world is visual not logical. Shell tools work better for people who are more blind and dream in language and stuff. Language is a bit unintuitive to me, but spatial things are very natural to me. I really suck with shells and setting up environments, but I’m good at modeling and even writing really clever code in a mathematical and geometric sense, just not understanding shell stuff. I always recommend bazzite as a first distro because it mostly just works out of the box without needing to go full hackerman on it for 72 hours only to break it because you don’t understand Linux yet.



  • What would actually happen is a bios level rootkit that installs a nearly invisible tiny rootkit on your device everytime it starts, but this is only if you are an important target. Most police departments can also just pay a private hacking company to steal your keys by using undisclosed exploits. Encryption can work well for other things but anything you wouldn’t want state or corporations seeing, you are better off just not ever putting it on your machine.

    You can be private somewhat through obscurity. Using free software that doesn’t log you, not using any machine that’s in anyway tied to you to do stuff, setting up your own point to point connection to use someone else machine as your access point. Never having a microphone or camera anywhere near your hacking machine. I’m not really that type of hacker, more of a programmer/hardware person, but it can be done somewhat safely if you take every effort to protect your identity.

    This is what I would do if I want ed to do something on the internet that might actually really piss off the FBI and NSA. Something like releasing the Epstein files to dozens of independent journalists around the world or something.

    I’d get cash, and leave my phone at home, go to a thrift store and buy an old laptop. Wait a couple of months, and never power it on. I download dozens of Linux distros a year before this, something as small as possible, and lightweight as possible. Nothing network, maybe even tails.

    Then I’d have it sitting on a thumb drive for many months before I dropped the files. One day before a lot of rain was coming in, I’d walk, not drive or anything, without my cell phone, using the tree cover to avoid spy satellite rewind surveillance, to a location where there is open wifi or an Ethernet jack.

    Then I’d use several layers of proxying and VPNs, although this would be slow as shit. All on fresh accounts. Using nested VMs, each carrying an additional layer of VPNs. I’d use this as my set up my own network, by exploiting some random machines in the wild to get my last couple layers of VPNs.

    Being careful to only type one word per second and not misspelling anything or in anyway aiding in any type of correlation attack, I’d first upload it in an encrypted format to a web host to speed up the next part, then I’d copy it to many places. I would then send it to as many people as possible, probably using a script to hit many emails addresses at once. As soon as the files hit the drive, I would assume I had about 5 minutes before the black helicopters showed up. At 5 mines I’d take a super strong magnet and start destroying the laptop, then I’d run away, find another safe spot, and then incinerate it.

    Then I’d never tell anyone, go home, take a nap, wake up, talk to chatGPT about my amazing nap that I overslept on, and carve out some hidden spaces at abandoned houses and stuff to stash the actual drives with the info.

    If you do anything less then this, you will probably get caught. Legal evidence is one thing, but you should never underestimate the numerous surveillance technologies they employ for unconstitutional surveillance. You n leed to be mindful of fingerprinting, (using only a throw away device and destroying it afterwards in a way that it’s not obvious that it was you) nothing that has ever touched your network or any files that that came from your PC or anything. It needs to exist in a totally separate universe. No connection whatsoever) you need to be mindful of cameras, license plate scanners, cellular modem surveillance, spy satellites which can see back in time to follow someone’s footsteps back through time. Correlation attacks, common word usage that can denote your region, common misspellings that you do, the particular way you type, root kits, assume every device is compromised and if you buy a device with a camera, don’t even open it until it’s been sitting for months and then remove the cameras and microphones, and never power it up anywhere near your house.

    Another thing to be mindful of is fingerprinting your downloads, don’t download something on your PC and use it on your device.

    Be wary of your footprints, this is why I said you would want to do this before a storm but perhaps maybe you would even tie wood to your shoes.

    If you did this you could leak something like the Epstein files and probably get away with it, but if you are one of the few people who live in a neighborhood who is a hacker, I would expect that you’d have dozens of FBI agents watching every move you do and combing through your past to find any infraction that they could try to blackmail you with.

    Never ever, trust an electronic device is better advice.







  • I haven’t received it yet but apparently not good. It’s a $200 phone. I mostly want it because it runs Linux natively, has a regular unlocked bootloader that isn’t designed to be frustrating like android phones, and can send display over USB-C so it’s like a regular computer. You can run anything like emulating windows apps, you could install steam on it technically by putting it in an emulation container, but the chipset is very old at this point, and so you aren’t going to be emulating anything remotely modern on it. It is just a PC in your pocket though. You have a package manager, you can install many different Linux distros on it. You can get a LoRa radio mesh case for it, a physical keyboard/battery case, which I will probably get eventually. I think it’s worth the 200 dollars. I really want to get away from android. It’s hard because everything from Arm CPUs to the modems are completely proprietary. The only reason this device exists is because the design docs got leaked.

    It does have phone, sms, and your standard phone stuff. You can get several different desktop environments like plasma mobile or gnome mobile and several others. It has 3 GBs of ram, and the OS usually takes up around 500 MB. It has dip switches to disable the hardware like the camera, cell modem, wifi, bt, etc. It would be a great device for taking to defcon.


  • I just ordered a pinephone, haven’t received it yet. The pinephone is the best native option in the U.S right now but you can get some unlocked smartphones with better hardware and install Linux it’s just a bit of a headache.

    The general consensus is that it’s pretty low power, being one of the only chipsets that has publicly available design docs for it. It’s a mid tier 2015 era chipset. It a bit slow but works as a phone. You can probably emulate android apps in it.