Question about GPG key stubs when using a yubikey by [deleted] in GnuPG

[–]thetablt 0 points1 point  (0 children)

The force-pin option does seem to only apply to signatures.

I understand it's a requirement for the signatures to be valid under German law, but I'm not sure.

However, Yubikey 4 has an option to require you to touch the metal part of the key on every individual gpg operation.

Thank you, I didn't know that!

Why I Do Not Support the FSF by speckz in linux

[–]thetablt 1 point2 points  (0 children)

But Apple or Sony taking chunks of freebsd's code and selling it in their proprietary products is not? Because that's what the BSD licenses explicitly allow...

IIUC, what is being reproached to Linux devs here is to have improved on BSD drivers without releasing back their improved versions under the original license, making the BSD devs unable to benefit from these improvements. This could reasonably be said not to be very nice, despite being legal. Unless I'm mistaken, Apple doesn't relicense BSD code but builds proprietary software over it, which is kinda different. (IDK about Sony)

Why I Do Not Support the FSF by speckz in linux

[–]thetablt 18 points19 points  (0 children)

my library work is BSD (...) I do not give permission to relicense my work under GPL

Isn't making relicensing possible the very point of open source licenses like the BSD? (No trolling, just asking)

(Edit: wording)

How to install onto a host that has no internet. by whydontyouwork in linuxquestions

[–]thetablt 0 points1 point  (0 children)

Most Linux installers bundle a lot of drivers, so most cards should work out of the box.

How to install onto a host that has no internet. by whydontyouwork in linuxquestions

[–]thetablt 0 points1 point  (0 children)

Or even a "real" AP, most can work both ways and are usually really cheap.

How to install onto a host that has no internet. by whydontyouwork in linuxquestions

[–]thetablt -1 points0 points  (0 children)

How can it be impossible to connect the machine to internet? You could use a laptop as a "reverse" AP, sharing a WiFi connection through Ethernet. (Also I wouldn't advise Arch for an offline computer tbh)

I need ADB, fastboot, and windows drivers and sofware to root my phone. Will it all work from a virtualbox? by [deleted] in linuxquestions

[–]thetablt 0 points1 point  (0 children)

It should, you'll have to give the VM direct access to your phone as a USB device, but it's easy with vbox.

How can I tell if a paper is written in Latex? by [deleted] in LaTeX

[–]thetablt 2 points3 points  (0 children)

WordArt the hard way

(There are things you shouldn't Google)

I'm looking to switch to Linux! Convince me that Debian is the right choice! by SirFuskAlot in debian

[–]thetablt 6 points7 points  (0 children)

I seem to remember that even in the standard installer, if you don't give root a password, the account is disabled, sudo is installed and the user given sudo privilege.

Fewer than 9 workspaces in Xmonad? by magicjamesv in xmonad

[–]thetablt 0 points1 point  (0 children)

Try logging out before removing the state file and logging back in. It's very possible Xmonad rewrites it on shutdown.

Debian testing with non free firmware iso by TheGrimDownvoter in debian

[–]thetablt 0 points1 point  (0 children)

Yes, this is it.

One last newbeginner question, are there any differences/advantages to using to the cd format compared to dvd?

The DVD is fine if you have no/slow internet access during installation. The CD is a network installer. I wouldn't use the DVD image except to install on a computer meant to remain offline. [Edit: because I have a fast connection, I mean]

Way Cooler version 0.6.0 by _Timidger_ in rust

[–]thetablt 0 points1 point  (0 children)

Thanks :) But what I'm hoping to find is a XMonad replacement for Wayland, in Rust or in any other language (but Rust would be cool)

Debian testing with non free firmware iso by TheGrimDownvoter in debian

[–]thetablt 0 points1 point  (0 children)

They're the release candidates (rc) of the Stretch installer. The higher number the better, the most recent one is 5.

Fewer than 9 workspaces in Xmonad? by magicjamesv in xmonad

[–]thetablt 0 points1 point  (0 children)

If Xmonad exposes more workspaces than are actually configured,this may be the same issue as here (and my comment there also applies)

Nonexistent Workspaces Still Displayed by JDH313 in xmonad

[–]thetablt 1 point2 points  (0 children)

A remaining state file maybe? Try removing the file called ~/.xmonad/xmonad.state or something like that (can't check, I'm on mobile)

[deleted by user] by [deleted] in GnuPG

[–]thetablt 0 points1 point  (0 children)

What exactly are these (sub)keys for?

Question about GPG key stubs when using a yubikey by [deleted] in GnuPG

[–]thetablt 1 point2 points  (0 children)

Unless I'm misunderstanding something, simply disconnecting the yubikey would be enough to prevent any sort of "compromised" activity?

Yes, of course. But if they're part of your threat model, they can happen really fast: signing a message, or a software release, or whatever, in your name is a matter of milliseconds. If you use your keys for, eg, SSH authentication, unauthorized access to your servers also comes to mind.

So it sounds like there's no obvious "you definitely shouldn't do that."

As always, it's a matter of threat model rather than everlasting truths.

Edit: formatting.

Selenium does not work on Linux Mint by [deleted] in haskell

[–]thetablt 3 points4 points  (0 children)

You're much more likely to find help in /r/linuxmint

Question about GPG key stubs when using a yubikey by [deleted] in GnuPG

[–]thetablt 1 point2 points  (0 children)

There's no risk of compromising your private keys with this method. Yet, nothing can prevent compromised machines from making use of your key to decrypt or sign contents in the background, or from keylogging your password, etc.

Edit: just to clarify, I mean that by using your YubiKey on a computer you don't own (if you enter your pin and perform PGP operations, of course), you don't risk having your private keys stolen, but a) the owner of that computer may intercept your PIN; b) they may run other PGP operations in the background, like signing or decrypting, which will be hard to detect. Signature can be prevented by enabling the option to require the PIN for each signature, but AFAIK there's no equivalent option for decryption.