[14:13] http://richardhartmann.de/blog/posts/2015/08/24-Tor-enabled_Debian_mirror/ [14:43] I wonder how long it an apt-get upgrade would take over Tor. [16:14] depends how much there is to upgrade [16:30] True, but I was thinking relatively. :) a 2 min upgrade could turn into a 4 min upgrade. May not be much, but installing large packages could be tedious if one is already on a slower connection. It's a great option if you need it though. I don't mean to diminish the significance of the contribution. [16:50] bwmaker: also, running it as a two step at night wouldn't hurt [16:50] sudo apt-get update;sudo apt-get -d dist-upgrade [16:50] then come back in the am, run part two [16:50] sudo apt-get dist-upgrade [16:51] that'll make it feel faster, you'll be asleep on the download [16:53] I do see your point, but if you need every extra inch of security, couldn't hurt [16:54] personally I was using an https mirror over tor (keep in mind, the whole setup already is secured with gpg too, so it was triple secure) [16:54] Yeah, I don't know that I need to go that far. But then, I didn't think FDE was really necessary 2+ years ago. [16:54] I don't think it is for me, but I also try to keep my attack surfaces low [16:55] as much as I like absolutes, nothing is ever 100% [16:57] I see a benift when the hotspot doesn't know who I am, who I'm talking to, the services don't know who they're talking to [16:57] I agree. The effectiveness of FDE is purely contextual, as are many of the precautions. At least, that's my own perception. I've been wrong before. :) [16:57] they're talking securely with my gear, so nobody can easedrop [16:58] and nobody knows what's installed on my systems [16:58] Yeah, that's a really good point. [16:59] problem with FDE is, is it truely full disk [17:00] can I modify your boot code, snatch your password, upload it later in the boot process to somewhere and come back and use it [17:01] Can I migitate that attack, sure, I can two ways, never leave my laptop around, away from me [17:02] and never put my unencrypted /boot on the hard drive, use a flash drive and install there (also, make sure the MBR code goes to the flash drive too) [17:02] * cyberanger isn't paranoid, it's just that....well.... you see....everybody is out to get me....that's all [17:03] bwmaker: ^ [18:03] :-) I'm paranoid. I'll admit that. But I think it's reasonably so, if there is such a thing as a reasonable amount of paranoia. [18:07] But I do believe it's a mistake to believe one's digital life and belongings are completely secure. There's always a flaw in the system. [20:16] Indeed [20:54] https://firstlook.org/theintercept/2015/08/26/way-gchq-obliterated-guardians-laptops-revealed-intended/ [22:57] http://arstechnica.com/tech-policy/2015/08/uk-surveillance-worse-than-1984-says-new-un-privacy-chief/ [23:34] I hear a lot of people talking about tunneling certain programs thru ssh. I've read up on this but I'm not sure of the benefits. what are the benefits to installing openssh-server?