this post was submitted on 24 May 2024
46 points (97.9% liked)

Ask Lemmy

25456 readers
1822 users here now

A Fediverse community for open-ended, thought provoking questions


Rules: (interactive)


1) Be nice and; have funDoxxing, trolling, sealioning, racism, and toxicity are not welcomed in AskLemmy. Remember what your mother said: if you can't say something nice, don't say anything at all. In addition, the site-wide Lemmy.world terms of service also apply here. Please familiarize yourself with them


2) All posts must end with a '?'This is sort of like Jeopardy. Please phrase all post titles in the form of a proper question ending with ?


3) No spamPlease do not flood the community with nonsense. Actual suspected spammers will be banned on site. No astroturfing.


4) NSFW is okay, within reasonJust remember to tag posts with either a content warning or a [NSFW] tag. Overtly sexual posts are not allowed, please direct them to either [email protected] or [email protected]. NSFW comments should be restricted to posts tagged [NSFW].


5) This is not a support community.
It is not a place for 'how do I?', type questions. If you have any questions regarding the site itself or would like to report a community, please direct them to Lemmy.world Support or email [email protected]. For other questions check our partnered communities list, or use the search function.


Reminder: The terms of service apply here too.

Partnered Communities:

Tech Support

No Stupid Questions

You Should Know

Reddit

Jokes

Ask Ouija


Logo design credit goes to: tubbadu


founded 1 year ago
MODERATORS
top 12 comments
sorted by: hot top controversial new old
[–] [email protected] 1 points 2 months ago

Theoretical explanation of various types of encryption and cryptographic signing, as well as practice with some command line tools to carry out simple tasks.

[–] [email protected] 5 points 2 months ago* (last edited 2 months ago)

Something I often see missing from discussion on privacy is that it's not always about you, the listener. Sometimes it's about protecting the most vulnerable people around you. For example, someone escaping from domestic violence might have a different view on how their information is protected. People struggle to see the value in privacy because it's not been a big problem for them personally or because they think it's hopeless. An introduction to privacy in my view is all about teaching empathy, hope, and advocating for others.

Once they have that goal in mind, you can tie in how open source helps empower people to take back their privacy

[–] [email protected] 6 points 2 months ago* (last edited 2 months ago)

Start off with the basics of how to do threat modeling. Capability mapping.

Then use open source projects as examples of how to map out capabilities and how they fit into your illustrated threat models

Do a basic overview of how a computer works, or how a phone works would be more relevant nowadays I guess, what the different components of the phone are, what is microcode, what is BIOS, what goes into a driver, how a kernel works, all the privileges and threats involved. That is a very healthy exercise for people to be aware of the trade-offs of using something open source with closed source blobs in the kernel versus purely closed source etc

An illustrative example. When you send a sext which software, which drivers, which organizations, which code, gets access to the privileged and sensitive information all the way down the stack

[–] [email protected] 1 points 2 months ago (1 children)

LibreOffice, Firefox (and how to use ublock origin), how to connect a printer to Linux, distinguishing trust worthy sources against false sources of information.

[–] [email protected] 3 points 2 months ago* (last edited 2 months ago) (1 children)

How to connect printer to linux:

Step 1. Connect printer.

[–] [email protected] 2 points 2 months ago (1 children)
[–] [email protected] 0 points 2 months ago* (last edited 2 months ago) (1 children)

Step 3. sudo install printer

Error, command sudo install printer not found

sudo apt install printer

Error, command sudo apt install printer not found

sudo plshelp

Error, command sudo plshelp not found

Hshdjebrkfifiejrjrhejdjeoowwndbd fuuuuuuuuuuu

Error, command Hshdjebrkfifiejrjrhejdjeoowwndbd fuuuuuuuuuuu not found

[–] [email protected] 1 points 2 months ago

Lmao exactly

[–] [email protected] 18 points 2 months ago

I would split digital privacy from the foss and Linux discussions. They attract the same people, but are fundamentally different topics.

It also means you could get deeper into the digital privacy topic which is more useful to most people.

For the digital privacy one, ask for a volunteer (or do you!) ahead of time and get them to do GDPR requests for apple, Google, Microsoft, Meta etc. sanitizer anything they want to hide, but do a demo of what big tech actually knows about them.

Then go though how to prevent that and have a discussion on the pros and cons of that data collection. (Eg I don't care about Google data tracking as I find the Google location history really useful)

[–] [email protected] -3 points 2 months ago

vi, gcc, and LaTeX

Let them learn the hard way.

[–] [email protected] 3 points 2 months ago

"First of all what does FOSS mean ? Obviously it's not to clean your teeth. Although a bunch of you might need it. No, FOSS means Fear Of Sudden Success, of which none of you in this auditorium will ever be subjected to."

"Hi my name is Dr D. Znuts, and I'm a Master Baiter."

[–] [email protected] 7 points 2 months ago* (last edited 2 months ago)

How much time do I have? In very little:

-Fedora KDE/Linux Mint

-Immich

-Firefox

-Only Office

-Blender and Krita

-Proton/Wine