literature.cafe

521 readers
11 users here now
(and anyone else, really)

This is a general special interest lemmy instance focusing on lovers of all things pertaining to reading and writing and all of the people that enjoy it as well as fandoms and niches that exist within reading circles. We federate with other instances, with our local communities being focused primarily on the above.

If you want to federate a new community, go to lemmyverse.net and copy a link to a community and paste it into the search bar. Be patient!

Also, consider installing instance assistant to better navigate lemmy and find communities better! Find links to download them here: firefox, chrome, edge


Instance Rules
  1. Keep it cozy. (No -isms, bigotry, gatekeeping, or general disrespect. Just be nice!)
  2. Please, no visual porn. (Smut and discussion of smut is OK as long as it is tagged as NSFW.)
  3. No spam.
  4. Be mindful of other instance rules.
  5. Keep self-promo to a minimum.
  6. Tag AI generated content as such.
  7. Please avoid piracy.

Server Info

Registration is open with human approval, just to make sure there's no bots afoot. Approval should take less than a day (and are sometimes near instant)

Please check your spam folder for an email from noreply@literature.cafe if you are having difficulty finding email confirmation.

Community creation is enabled. When creating new communities please be mindful of the instance focus.

If you have any issues or concerns, please message an admin

Fediseer Guarantees


For those visiting from other instances, we have a community directory to make finding communities easier: !411@literature.cafe


We also have alternative lemmy UIs to use for those who want them.

A familiar UI - old.literature.cafe

Photon - ph.literature.cafe

Tesseract (photon fork with more multimedia focused features) - t.literature.cafe


Donations are greatly appreciated and go entirely to server costs but are not required.

List of Patrons Daily Uptime Ratio Weekly Uptime Ratio Average Response Time

founded 1 year ago
ADMINS
1
 
 

Full Disk Encryption is planned to be introduced in the forthcoming release candidate of the Aeon Desktop to enhance data security for its users.
The feature is expected to be included in the upcoming Release Candidate 3 (RC3).

Full Disk Encryption is designed to protect data in cases of device loss, theft or unauthorized booting into an alternative operating system.
Depending on the hardware configuration of a system, Aeon's encryption will be set up in one of two modes: Default or Fallback.

Default Mode

The Default Mode is the preferred method of encryption provided the system has the required hardware. This mode utilizes the Trusted Platform Module(TPM) 2.0 chipset with PolicyAuthorizeNV support (TPM 2.0 version 1.38 or newer). In this mode, Aeon Desktop measures several aspects of the system's integrity. These including:

  • UEFI Firmware
  • Secure Boot state (enabled or disabled)
  • Partition Table
  • Boot loader and drivers
  • Kernel and initrd (including kernel command line parameters)

These measurements are stored in the system's TPM. During startup, the current state is compared with the stored measurements. If these match, the system boots normally. If discrepancies are found, users are prompted to enter a Recovery Key provided during installation. This safeguard ensures that unauthorized changes or tampering attempts are flagged.

Fallback Mode

The Fallback Mode is employed when the necessary hardware for Default Mode is not detected. This mode requires users to enter a passphrase each time the system starts. While it does not check system integrity as comprehensively as Default Mode, Secure Boot is strongly recommended to ensure some level of security, confirming that the bootloader and kernel have not been tampered with.

Contrary to initial concerns, Default Mode is not less secure than Fallback Mode despite not requiring a passphrase at startup. The strong integrity checks in Default Mode protect against attacks that could bypass normal authentication methods. For example, it can detect changes to the kernel command line that could otherwise allow unauthorized access. Furthermore, it safeguards against modifications to initrd thereby preventing potential passphrase capture in Fallback Mode.

Secure Boot, while optional in Default Mode due to the comprehensive integrity checks, is critical in Fallback Mode to maintain system security. Disabling Secure Boot in Fallback Mode increases vulnerability to tampering and attacks aimed at capturing the passphrase.

Aeon's implementation of Full Disk Encryption provides robust security options tailored to the capabilities of users' hardware. By offering both Default and Fallback modes, Aeon ensures that all users can benefit from enhanced data protection.

The inclusion of this feature in RC3 marks a significant step forward in safeguarding user data against potential threats.
Aeon users are encouraged to read and bookmark the Aeon Encryption Guide.

More Information about openSUSE:

Official

Fediverse

(Image made with DALL-E)

2
 
 

OpenSuse leading the development in regards to boot security, an area in which Linux Distros are lagging behind other operating systems.

Full Disk Encryption is designed to protect data in cases of device loss, theft or unauthorized booting into an alternative operating system. Depending on the hardware configuration of a system, Aeon’s encryption will be set up in one of two modes: Default or Fallback.

Default Mode:

This mode utilizes the Trusted Platform Module(TPM) 2.0 chipset […], Aeon Desktop measures several aspects of the system’s integrity. These including:

  • UEFI Firmware
  • Secure Boot state (enabled or disabled)
  • Partition Table
  • Boot loader and drivers
  • Kernel and initrd (including kernel command line parameters)

These measurements are stored in the system’s TPM. During startup, the current state is compared with the stored measurements. If these match, the system boots normally.

view more: next ›