bitahcold

joined 6 months ago
 

Hello everyone, I'm an user of Piped and Libretube for Youtube. I love being de-Googled. But what's the major difference (excluding metadata) about using Youtube only from browser (with Security-Privacy oriented browser, auto-deleted cookies per tab, without account) vs using Piped?

Thanks.

 

Hello everybody! I can say I'm a newbie at Linux. Wanted to ask about Linux' task viewers. On the famous task viewers such as bpytop, htop etc., can viruses hide from them? Excluding the injected codes, can virus & tracker/logger softwares hide from classic task viewers of Linux? Do they show all kinds of services and running tasks?

[–] [email protected] 1 points 5 months ago

Thanks for much detailed comment. That helped me alot and answered all of the questions from my head. Eventually, I am not a criminal or activist. Looks like its secure and private enough. At least there is some eyes as Meta, Google etc. I will mind self-hosting. Thank you again for your labor. Goodbye.

[–] [email protected] 0 points 5 months ago

I mean fail as error. Like, I did something wrong at commands. I haven't verificated the iso about its valid or not. That's the thing I'm worried about. I asked can I verify with other ways without the iso. But I decided to do clean re-install. Thanks for comment. Goodbye.

[–] [email protected] 1 points 5 months ago

Better guarantee it haha. I did nothing except using unnecessary documents and surfing on the net. And maybe some games. I used archinstall for it but now, I will set it up customized and nonscript. Maybe fresh restart would be better. Thanks for the help again. Goodbye!

[–] [email protected] 1 points 5 months ago* (last edited 5 months ago) (2 children)

So sorry for labor. There is a lacking information by me. I created the bootable at my previous OS, so there is no same .iso file. Only extracted version on my USB and installed version that is running on my PC. Can I see the mirror source from the extracted version?

[–] [email protected] 1 points 5 months ago* (last edited 5 months ago) (5 children)

Oh, I didn't know that. I just downloaded iso and iso.sig then used gpg commands. The thing I'm worried about is, maliciousy chance of the iso. I probably used German or French mirror to download the iso. Then, failed the verification. I am using unverificated iso's Arch Linux now. Can I know if I had any tracker, keylogger or mining software etc. ? Usage is normal and smooth as how it have to be. But idk.. Just worried. I still have the same bootable USB that the iso was extracted into. I have a FreeDOS unnecessary PC. Can I verificate the bootable by executing any verification command while I'm at the installation process? Or, can I verify or check my operating system's originality at post-installation era of my main PC? Thanks for comment.

[–] [email protected] 1 points 5 months ago

I did download and set the bootable at my previous OS, Fedora. Now the iso is not reachable and I forgot the mirror that I downloaded from. I still have the usb card I used for installation. Can I do any verification over it? Thanks for reply and relaxing info.

 

Hello guys, I'm using Arch as a newbie. Learning about it. But worried about a thing. When I was creating the bootable media for install it, I downloaded the .iso and .iso.sig from any mirror that is near. I followed the things about verification of .iso but I got some errors and gave up. Just used the iso I didn't verificated. I am using the OS that iso installed. There is nothing wrong with usage. I can access all the things about Arch, not had any problems and any performance issues. No special internet usage, no broken things etc. but I'm a bit worried about is there any malicious software such as keyloggers, mining softwares... Can I verify my Arch after the installation? Can I see if there is any software malicious via htop-bpytop? Should I create the bootable media again with verification and reinstall my Arch?

[–] [email protected] 0 points 5 months ago (1 children)

Thanks for reply! I have a Samsung phone that De-Googled %100~ (exclude some important Android depencies based on Google). I restored GMS for auth in Signal. After the auth, I uninstalled it back. There is no Youtube, no Google - Chrome, no Spotify etc. Just FOSSed and de-Googled phone. Do I still using Google Services indirect ways because of Signal? Is it possible to be another third-party sharing except phone verification?

[–] [email protected] 3 points 5 months ago (1 children)

Most sane CS player.

 

"Third Parties. We work with third parties to provide some of our Services. For example, our Third-Party Providers send a verification code to your phone number when you register for our Services. These providers are bound by their Privacy Policies to safeguard that information. If you use other Third-Party Services like YouTube, Spotify, Giphy, etc. in connection with our Services, their Terms and Privacy Policies govern your use of those services."

We work with third parties to provide some of our Services.

What type of Services? And do Signal use our contacts or something private like that for third-parties?

[–] [email protected] 1 points 5 months ago

Thanks for information. I was thinking about self-hosting nowadays, that will make it quick. Goodbye.

[–] [email protected] 2 points 5 months ago (2 children)

I understood clearly what you said. Thanks for detailed text. The protocol uses end-to-end encryption, yes. But, I didn't understand what type of information is being leaked. Do you mean e-mails, phone numbers, profile pics etc. as metadata? If I use another server or self-hosted server, can I avoid the leak. And not only matrix.org, Element uses same types of informations. Element's permissions was a bit high in Android, Flatpak etc. I'm using Element on my GNU desktop and not on phone. No phone number, no profile pic, no e-mail; only username, server and password. Do I still give information?

 

Hi guys, I was looking for matrix.org's and Element Client's privacy policies and I saw something that says Matrix and Element shares data with AWS (Amazon Web Service), Cloudflare, Mythic Beasts, UpCloud. Is it safe to use? The matrix.org has good features as FOSS, decentralized etc. But this seem a lil bad. Any experts about prviacy?

[–] [email protected] 2 points 5 months ago

Thanks to previous comments, understood the thing I was wrong and decided to use Arch relaxedly. Now I'm using Arch. Thanks. Have a nice day.

[–] [email protected] 1 points 5 months ago (2 children)

I can say I don't have enough experince to say anything about different distros. Its my first year and I didn't changed OSs too much. I want to get new experiences and different types of things. And I liked that labor-needy and fully-controlable vibe of Arch. And just decided to Arch but I was worried about sths. Thanks to previous replies, I understood what I have to. Thanks. Have a good day.

 

I was Nobara user, then I am using Fedora right now. I want to use things like Hyprland etc. and ya know, Its damn cool to say I am using arch btw. So I've decided to use Arch Linux. But everyone says its always breaking and gives problems. That's because of users, not OS.. right? I love to deal with problems but I don't want to waste my time. Is Arch really problemful OS? Should I use it? I know what to do with setup/ usage, the hardness of Arch is not problem for me but I am just concerned about the mindset "Arch always gets broken".

 

I was Nobara user, then I am using Fedora right now. I want to use things like Hyprland etc. and ya know, Its damn cool to say I am using arch btw. So I've decided to use Arch Linux. But everyone says its always breaking and gives problems. That's because of users, not OS.. right? I love to deal with problems but I don't want to waste my time. Is Arch really problemful OS? Should I use it? I know what to do with setup/ usage, the hardness of Arch is not problem for me but I am just concerned about the mindset "Arch always gets broken".

view more: next ›