submitted 4 weeks ago by [email protected] to c/[email protected]
top 12 comments
sorted by: hot top controversial new old
[-] [email protected] 1 points 3 weeks ago

Theoretical explanation of various types of encryption and cryptographic signing, as well as practice with some command line tools to carry out simple tasks.

[-] [email protected] 5 points 4 weeks ago* (last edited 4 weeks ago)

Something I often see missing from discussion on privacy is that it's not always about you, the listener. Sometimes it's about protecting the most vulnerable people around you. For example, someone escaping from domestic violence might have a different view on how their information is protected. People struggle to see the value in privacy because it's not been a big problem for them personally or because they think it's hopeless. An introduction to privacy in my view is all about teaching empathy, hope, and advocating for others.

Once they have that goal in mind, you can tie in how open source helps empower people to take back their privacy

[-] [email protected] 6 points 4 weeks ago* (last edited 4 weeks ago)

Start off with the basics of how to do threat modeling. Capability mapping.

Then use open source projects as examples of how to map out capabilities and how they fit into your illustrated threat models

Do a basic overview of how a computer works, or how a phone works would be more relevant nowadays I guess, what the different components of the phone are, what is microcode, what is BIOS, what goes into a driver, how a kernel works, all the privileges and threats involved. That is a very healthy exercise for people to be aware of the trade-offs of using something open source with closed source blobs in the kernel versus purely closed source etc

An illustrative example. When you send a sext which software, which drivers, which organizations, which code, gets access to the privileged and sensitive information all the way down the stack

[-] [email protected] 1 points 4 weeks ago

LibreOffice, Firefox (and how to use ublock origin), how to connect a printer to Linux, distinguishing trust worthy sources against false sources of information.

[-] [email protected] 3 points 4 weeks ago* (last edited 4 weeks ago)

How to connect printer to linux:

Step 1. Connect printer.

[-] [email protected] 2 points 4 weeks ago
[-] [email protected] 0 points 4 weeks ago* (last edited 4 weeks ago)

Step 3. sudo install printer

Error, command sudo install printer not found

sudo apt install printer

Error, command sudo apt install printer not found

sudo plshelp

Error, command sudo plshelp not found

Hshdjebrkfifiejrjrhejdjeoowwndbd fuuuuuuuuuuu

Error, command Hshdjebrkfifiejrjrhejdjeoowwndbd fuuuuuuuuuuu not found

[-] [email protected] 1 points 4 weeks ago

Lmao exactly

[-] [email protected] 18 points 4 weeks ago

I would split digital privacy from the foss and Linux discussions. They attract the same people, but are fundamentally different topics.

It also means you could get deeper into the digital privacy topic which is more useful to most people.

For the digital privacy one, ask for a volunteer (or do you!) ahead of time and get them to do GDPR requests for apple, Google, Microsoft, Meta etc. sanitizer anything they want to hide, but do a demo of what big tech actually knows about them.

Then go though how to prevent that and have a discussion on the pros and cons of that data collection. (Eg I don't care about Google data tracking as I find the Google location history really useful)

[-] [email protected] -3 points 4 weeks ago

vi, gcc, and LaTeX

Let them learn the hard way.

[-] [email protected] 3 points 4 weeks ago

"First of all what does FOSS mean ? Obviously it's not to clean your teeth. Although a bunch of you might need it. No, FOSS means Fear Of Sudden Success, of which none of you in this auditorium will ever be subjected to."

"Hi my name is Dr D. Znuts, and I'm a Master Baiter."

[-] [email protected] 7 points 4 weeks ago* (last edited 4 weeks ago)

How much time do I have? In very little:

-Fedora KDE/Linux Mint



-Only Office

-Blender and Krita


this post was submitted on 24 May 2024
46 points (97.9% liked)

Ask Lemmy

25078 readers
1431 users here now

A Fediverse community for open-ended, thought provoking questions

Rules: (interactive)

1) Be nice and; have funDoxxing, trolling, sealioning, racism, and toxicity are not welcomed in AskLemmy. Remember what your mother said: if you can't say something nice, don't say anything at all. In addition, the site-wide Lemmy.world terms of service also apply here. Please familiarize yourself with them

2) All posts must end with a '?'This is sort of like Jeopardy. Please phrase all post titles in the form of a proper question ending with ?

3) No spamPlease do not flood the community with nonsense. Actual suspected spammers will be banned on site. No astroturfing.

4) NSFW is okay, within reasonJust remember to tag posts with either a content warning or a [NSFW] tag. Overtly sexual posts are not allowed, please direct them to either [email protected] or [email protected]. NSFW comments should be restricted to posts tagged [NSFW].

5) This is not a support community.
It is not a place for 'how do I?', type questions. If you have any questions regarding the site itself or would like to report a community, please direct them to Lemmy.world Support or email [email protected]. For other questions check our partnered communities list, or use the search function.

Reminder: The terms of service apply here too.

Partnered Communities:

Tech Support

No Stupid Questions

You Should Know



Ask Ouija

Logo design credit goes to: tubbadu

founded 1 year ago