• 8 Posts
  • 15 Comments
Joined 5 months ago
cake
Cake day: May 5th, 2024

help-circle



  • Thanks for much detailed comment. That helped me alot and answered all of the questions from my head. Eventually, I am not a criminal or activist. Looks like its secure and private enough. At least there is some eyes as Meta, Google etc. I will mind self-hosting. Thank you again for your labor. Goodbye.


  • bitahcold@lemmy.worldOPtoArch Linux@lemmy.mlISO verification
    link
    fedilink
    arrow-up
    1
    arrow-down
    1
    ·
    4 months ago

    I mean fail as error. Like, I did something wrong at commands. I haven’t verificated the iso about its valid or not. That’s the thing I’m worried about. I asked can I verify with other ways without the iso. But I decided to do clean re-install. Thanks for comment. Goodbye.




  • bitahcold@lemmy.worldOPtoArch Linux@lemmy.mlISO verification
    link
    fedilink
    arrow-up
    1
    ·
    edit-2
    4 months ago

    Oh, I didn’t know that. I just downloaded iso and iso.sig then used gpg commands. The thing I’m worried about is, maliciousy chance of the iso. I probably used German or French mirror to download the iso. Then, failed the verification. I am using unverificated iso’s Arch Linux now. Can I know if I had any tracker, keylogger or mining software etc. ? Usage is normal and smooth as how it have to be. But idk… Just worried. I still have the same bootable USB that the iso was extracted into. I have a FreeDOS unnecessary PC. Can I verificate the bootable by executing any verification command while I’m at the installation process? Or, can I verify or check my operating system’s originality at post-installation era of my main PC? Thanks for comment.







  • Thanks for reply! I have a Samsung phone that De-Googled %100~ (exclude some important Android depencies based on Google). I restored GMS for auth in Signal. After the auth, I uninstalled it back. There is no Youtube, no Google - Chrome, no Spotify etc. Just FOSSed and de-Googled phone. Do I still using Google Services indirect ways because of Signal? Is it possible to be another third-party sharing except phone verification?





  • I understood clearly what you said. Thanks for detailed text. The protocol uses end-to-end encryption, yes. But, I didn’t understand what type of information is being leaked. Do you mean e-mails, phone numbers, profile pics etc. as metadata? If I use another server or self-hosted server, can I avoid the leak. And not only matrix.org, Element uses same types of informations. Element’s permissions was a bit high in Android, Flatpak etc. I’m using Element on my GNU desktop and not on phone. No phone number, no profile pic, no e-mail; only username, server and password. Do I still give information?