Win / Conspiracies
Conspiracies
Communities Topics Log In Sign Up
Sign In
Hot
All Posts
Settings
All
Profile
Saved
Upvoted
Hidden
Messages

Your Communities

General
AskWin
Funny
Technology
Animals
Sports
Gaming
DIY
Health
Positive
Privacy
News
Changelogs

More Communities

frenworld
OhTwitter
MillionDollarExtreme
NoNewNormal
Ladies
Conspiracies
GreatAwakening
IP2Always
GameDev
ParallelSociety
Privacy Policy
Terms of Service
Content Policy
DEFAULT COMMUNITIES • All General AskWin Funny Technology Animals Sports Gaming DIY Health Positive Privacy
Conspiracies Conspiracy Theories & Facts
hot new rising top

Sign In or Create an Account

23
()
posted 4 years ago by pkvi 4 years ago by pkvi +25 / -2
25 comments share
25 comments share save hide report block hide replies
You're viewing a single comment thread. View all comments, or full comment thread.
Comments (25)
sorted by:
▲ 1 ▼
– Torrvarpen 1 point 4 years ago +2 / -1

It's possible to update the microcode firmware via OS. Linux does this by default nowadays with open source microcode: https://wiki.archlinux.org/title/Microcode. I'm sure windows does it too, or NSA via Windows built in back-doors, only difference is that their firmware is proprietary and full of shady stuff.

permalink save report block reply
▲ 1 ▼
– yeldarb1983 1 point 4 years ago +1 / -0

With the understanding that "secure" is a relative term, how secure am I using Fedora 33 on an Core 15 chip? (I'll look up the exact chip if it helps.)

permalink parent save report block reply
▲ 3 ▼
– Torrvarpen 3 points 4 years ago +3 / -0

Depends on yourself, humans with too much privileges are the biggest threat to any secure system. A clean fresh installation of Fedora 33 should overwrite the CPU microcode before even starting the system and decrypting your drive.

You can check this in the boot menu, fist thing you see after start where it says "Fedora" and "Advanced options for Fedora" or similar. Press E and you should see the whole boot command which will run in sequence. First it loads the microcode, then the kernel and then (if you have full disk encryption enabled) the prompt comes up, or whatever mechanism you use to decrypt on boot.

So relatively secure is the best answer I guess. Just make sure that nobody else ever gets physical access to your device. Make sure to never run shady proprietary software, stick to open source and verify that there are no back doors. That way, chances are very low that someone could ever spy on you or steal your data.

But if you wanna be really secure, you might wanna use Qubes OS. A Linux distro designed with security in mind. Every program runs in it's own vm, and it's not the standard type of vm's, these are completely isolated from each others, giving you full control over everything that runs in your system.

It's not the most convenient solution tho, for instance if you want to plug in a usb device and let a software use it, you need to explicitly allow that in the systems task manager since the usb firmware run in it's own isolated box too. It's a bit of al earning curve, but worth it if you really want perfect security.

permalink parent save report block reply
▲ 3 ▼
– yeldarb1983 3 points 4 years ago +3 / -0

It's not the most convenient solution tho, for instance if you want to plug in a usb device and let a software use it, you need to explicitly allow that in the systems task manager since the usb firmware run in it's own isolated box too. It's a bit of al earning curve, but worth it if you really want perfect security.

and I imagine it gives things like OBS all kinds of headaches, lmao.

Thanks for not treating me like an idiot =D

permalink parent save report block reply

GIFs

Conspiracies Wiki & Links

Conspiracies Book List

External Digital Book Libraries

Mod Logs

Honor Roll

Conspiracies.win: This is a forum for free thinking and for discussing issues which have captured your imagination. Please respect other views and opinions, and keep an open mind. Our goal is to create a fairer and more transparent world for a better future.

Community Rules: <click this link for a detailed explanation of the rules

Rule 1: Be respectful. Attack the argument, not the person.

Rule 2: Don't abuse the report function.

Rule 3: No excessive, unnecessary and/or bullying "meta" posts.

To prevent SPAM, posts from accounts younger than 4 days old, and/or with <50 points, wont appear in the feed until approved by a mod.

Disclaimer: Submissions/comments of exceptionally low quality, trolling, stalking, spam, and those submissions/comments determined to be intentionally misleading, calls to violence and/or abuse of other users here, may all be removed at moderator's discretion.

Moderators

  • Doggos
  • axolotl_peyotl
  • trinadin
  • PutinLovesCats
  • clemaneuverers
  • C
Message the Moderators

Terms of Service | Privacy Policy

2025.03.01 - lf7fw (status)

Copyright © 2024.

Terms of Service | Privacy Policy