-
A lot of software uses
systemd-journaldto log errors, -
The bash shell saves everything you type into the terminal,
-
wtmp, btmp, utmp all track exactly who is logged in and when,
-
The package manager logs all software you install and keeps the logs after uninstallation,
-
And the kernel writes part of the RAM which may contain sensitive information to the disk when your PC crashes.
While the OS isn’t sending these logs to Microsoft or Google, anyone who gets into your PC while you are logged in and your data is unencrypted can see much of what you have been doing.
If you want to be private, you must disable them.
I got reports on this. I’m personally not of a mind to remove it, but it does feel irrelevant to open source. It’s more a Linux sysadmin type thing.
I will say, cut down the spam. Any repeated similar musings within a week would be low value and I’d probably remove.
I personally don’t agree with your points and this wouldn’t be relevant to most peoples risk profile.
Worth reflecting on what others have said here. I think you’re worrying too much about something that will never be expolitable in standard usage and this is from someone who worries a lot about privacy.
Maybe if this is really important to you check out Tails OS which as far as I’m aware focusses on running in RAM and leaving minimal persistent state.
REALITY IS NOT PRIVATE OUT OF THE BOX.
EVERY PHYSICAL INTERACTION IS BASED ON CAUSE AND CONSEQUENCE.
IF A DEMON COULD KNOW THE MOMENTUM AND POSITION OF EVERY PARTICLE, THEY COULD LOG EVERY ACTION AND THOUGHT YOU’VE EVER HAD.
WHILE NATURE ISN’T SENDING THESE LOGS TO A DIVINE CREATOR, ANY INTELLECT VAST ENOUGH TO SUBMIT THESE DATA TO ANALYSIS WOULD SEE THE FUTURE, AS THE PAST, PRESENT TO ITS EYES.
IF YOU WANT TO BE PRIVATE, YOU MUST CEASE TO EXIST
caps lock detected. Legibility level = 0
skipping
If someone gets into your PC, you have much bigger problems than them reading the system logs.
The other day I was writing in my notebook and then I opened it later to check, and everything that I wrote was there! If someone could get their hands on my notebook, they could read all my notes!
I don’t think you know what private is.
Let me put it this way, maybe you’ll get it: being naked in your home with the blinds down and no one else knowing about it, is privacy. Even is everyone else doing it. Being in your home fully dressed with blinds down and no one else knowing about it is still privacy but you can’t claim you have more privacy than the rest because you have clothes on.
I understand that, but if a hacker gets into your PC or someone takes it from you while it is logged in then that is like someone walking into your house and seeing you naked because the door has to be unlocked to get in the house.
Drive encryption is only one step towards a peivate and secure system. You can choose a middle ground such as limiting logs to 3 days if you prefer.
Pretty sure drive encryption doesn’t give you privacy, it gives you security at physical access.
Logs in the other hand, yes.
“If someone gains access to your computer, they could view the log files on it”
My dude, they could view everything on it? The answer is full disk encryption, not turning off log files.
Terrible advice. Don’t disable those.
If physical security is a worry, enable full disk encryption and have a good password.
Why is this post so stupid?
Looks inside: “China bad”
Ah, that explains it.
You posted this same silly thing about 3 days ago.
anyway why isn’t the advice “encrypt your drives” instead of “disable all logging”.
I mean your own examples are like the least serious problem.
Who is logged in and when? So we’re talking a multi user system that’s clearly hosting a lot… that’s kind of important for an administrator to be able to track who is logging in when, to know if something goes wrong.
Package manager logs what’s installed. well duh, what’s the scenerio that this is even a factor? I don’t want big government to know I had, qbittorrent or whatever? There’s no program that’s likely installed via apt that’s illegal to have.
So yeah in short, stuff that’s vital if you ever need to troubleshoot, useful in general, almost unthinkable to imagine situations where this is a problem (at least in situations in which someone has your user account, or root access to your system for these to be the high priority.
On the whole the idea there is like.
“If someone steals your car… they could also steal the car users manual”.
The data is not sent to any service (at least not without asking you). It is your private data on your private computer. Collecting information and configuration on your PC does not make it less private. A different user on the system can’t access your private data. Private means, that all your private data is not accessible by others (unless you allow to). So yes, most Linux distributions are in fact private out of the box.
If someone takes your laptop while it is unlocked rhey can see the logs. It is dangerous to keep them on if you are somewhere like China and use your laptop in a public space.
somewhere like china? where theft is incredibly rare? fuck off with your chauvinist BS
But that is a specifically crafted scenario and has nothing to do if the system is private or not. I mean at home you have privacy. Just because someone could break into it does not mean its never private. The Linux PC is private out of the box and by default, because no one else has access to it. You just created a scenario that is not out of the box, but compromised or stolen.
I understand the issue you bring up here, but the chosen language you use is wrong in my opinion. That is why the misunderstandings and why people don’t agree with your statements. I think you are thinking in terms of “Private mode in a browser”.
I think you are right. My post is simply a PSA to let people know that clicking forget on a Wi-Fi network or uninstalling a Flatpak does not remove all traces.
My scenario is also not specifically crafted; it is what happened to Ross Ulbricht.





