×
Login Register an account
Top Submissions Explore Upgoat Search Random Subverse Random Post Colorize! Site Rules
1

Sheepish Goy on Reddit Ask Obvious Question in Linux Forum - Misinformation Ensues

submitted by Dingo to Linux 3 weeksApr 28, 2024 09:28:46 ago (+1/-0)     (libreddit.bus-hit.me)

https://libreddit.bus-hit.me/r/linuxquestions/comments/1cf0blg/is_linux_infiltrated_by_cia/

This is a good example of how the conversation is controlled. Look at the downvotes and crap answers that get all the traction and upvotes. Obvious who the "bots" (accounts run by an "agenda" rather than a "person") are in this case.

The question is about the (((CIA))) control of Linux and the user gives an example. Linux goats must know at this point that systemd, elogind, wayland, and these new package delivery systems (snaps, flatpak) all attack vectors on the linux userspace security. On top of that, who the hell knows what's deep in the kernel code itself (this Rust language for example is another "progressive" hack) and let's not get started about the obvious hardware backdoors.

The Link does not go directly to reddit but another place to obfuscate social media information and tracking.

@Kozel @iSnark


4 comments block


[ - ] Kozel 1 point 2 weeksApr 28, 2024 15:47:06 ago (+1/-0)

Artix relies on elogind, and doesn't seem like there's a way to get rid of it. :(

its over bros the linux has fallen


Top comment

If you are scared of the cia don’t install Ubuntu. Mint is a great alternative

🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣

[ - ] Dingo [op] 0 points 2 weeksApr 28, 2024 15:59:31 ago (+0/-0)

The elogind issue is a huge fight between the Obarun and Artix guys actually. It's another piece of systemd, if I recall. This is the primary reason I moved the last two Artix machines to Obarun (a more generic Arch experience with 66-init). I do like what the Artix dev's are doing from an init perspective though.

Here's an interesting article on the elogind issue. https://sysdfree.wordpress.com/2022/12/22/364/

There is another philosophy soaking in though, you may find this interesting: http://harmful.cat-v.org/software/

[ - ] Kozel 1 point 2 weeksApr 28, 2024 16:05:53 ago (+1/-0)

What's the easiest way to move to obarun? Or do you just start from scratch?

I've never heard of it before, and its not listed on https://nosystemd.org for some reason.

[ - ] Dingo [op] 0 points 2 weeksApr 28, 2024 16:23:53 ago (+0/-0)

For Obarun, I just started from scratch (wiped the drive and whatnot). The Obarun installer is a little "heavy", requires an internet connection and text based. They only offer a JWM desktop with no login manager. I changed the xinitrc line from "exec /usr/bin/jwm" to "exec /usr/bin/YOURDESKTOPMANAGEREXE". I log in in the TTy prompt and it takes me to the xwindows desktop (I'm on herbstluftwm).

Obarun and Jobarun are in the list here (along with the links).

https://sysdfree.wordpress.com/2023/09/25/363/

On a hunch here, I see you're using open-rc. Alpine is a contender (and uses open-rc), but you have to do some things to not have the elogind and other stuff installed. Alpine is my main daily driver now but I had to compile a few programs (learning how to tap into git has been AWESOME). Stuff comes through their repo faster than gentoos even.

That all said, I think you could probably fix your Artix install a little to carve out any offending bits like elogind if you don't want to re-install.

For example, there is another program called seatd which is a non-problematic (as far as I know) version of what elogind does. Essentially, it's the program that you can give access to HW like the x-windows screen, sound card, etc. The security idea is to give root access to a PROGRAM that can be controlled and programmed safely to no f-up your hardware if you get hacked.

Personally, I just adjust the user permissions and turn everything off. I don't even use seatd, dbus, or any of that. I'm basically a mid-90s linux desktop but with 30 years of refinements and programs that I add in. It's hard to hack a system service if the service isn't even running. I suspect you could find the offending app (the one that wants elogind) and shoe horn out the dependencies. Most likely it's your login manager.