[00:45] <a___> join
[00:45] <a___> hel
[00:45] <a___> help
[00:45] <a___> hello
[05:19] <cdoublejj_> i wonder if any one knows if there will be a ppc version yet as it's such a new and fresh launch, maybe once things settle down, there might be a better idea?
[15:22] <darsie> Where can I get cdimage.ubuntu.com/lubuntu/releases/bionic/release/SHA256SUMS over a secure channel? Or is there a trusted GPG signature for it?
[15:28] <krytarik> darsie: Yes, look besides it: http://cdimage.ubuntu.com/lubuntu/releases/bionic/release/
[15:29] <darsie> ahh, right.
[15:29] <darsie> thx
[15:36] <darsie> Can someone please verify 46181433FBB75451 is the Ubuntu CD Image Automatic Signing Key <cdimage@ubuntu.com>?
[15:37] <krytarik> ..Why would you trust any individual here more than the GPG system?
[15:39] <darsie> Anyone can upload GPG keys. It provides additional security.
[15:39] <darsie> Having it on a HTTPS server would be better.
[15:40] <darsie> A hacker possibly hacked my server which routes my internet, so I'm a bit paranoid.
[15:46] <darsie> I found the key ID on numerous websites. Should be ok.
[15:49] <Unit193> Gpg has a trust network.
[15:50] <darsie> I miss instructions how to make a bootable USB stick from the iso. Do I dd it to /dev/sdX?
[15:53] <wxl> that's one way to do it, darsie. if you know what you're doing, it's a very reliable methodology, too
[15:53] <darsie> ok
[15:55] <JohnDoe_71Rus> the hackers can change iso image, then you write it to flash. they can hack write util
[15:56] <darsie> JohnDoe_71Rus: That's why I verified the hash and signature.
[15:56] <wxl> that ^^
[15:56] <JohnDoe_71Rus> after write? or after save to disk
[15:56] <wxl> jboth
[15:56] <darsie> after save
[15:56] <JohnDoe_71Rus> they can modify at the write moment
[15:57] <wxl> you can verify it after write
[15:57] <darsie> I assume my computer isn't hacked. They can modify the data I receive via internet.
[15:58] <JohnDoe_71Rus> darsie: that OS do you use at the moment?
[15:59] <darsie> debian
[15:59] <darsie> Downloaded the netinstall image on a mac that doesn't have ssh enabled.
[16:00] <JohnDoe_71Rus> and why you think you system compromised?
[16:01] <darsie> My server may be compromised because a hacker found my email password, reset my bitstamp password, stole 7000 EUR and sent me an email with a web bug link to my server.
[16:02] <JohnDoe_71Rus> wow
[16:04] <darsie> So I assume he got root and wanted to check the server logs to find the IP of my PC and possibly launch  a key logger there etc.
[16:06] <JohnDoe_71Rus> darsie: https://imgur.com/WmRwjI3
[16:07] <JohnDoe_71Rus> https://www.youtube.com/watch?v=mh3AQuhQO8U
[21:15] <foldmorepaper> Hello!
[21:16] <foldmorepaper> I'm on Lubuntu 17.10, and was wondering if the method of updating to 18.04 is the same as dor Ubuntu?
[21:17] <krytarik> Yes.
[21:22] <foldmorepaper> The command 'do-release-upgrade' returns "No new release found" even though I have the Software Updater utility set to "any new version".
[21:22] <krytarik> Yes, see the release notes on that please.
[21:22] <foldmorepaper> Do I need to update anything beyond all packages and doing a dist-upgrade?
[21:23] <foldmorepaper> Thanks, will do.
[21:24] <krytarik> (The answer is, it'll become available for you in a few days.)
[21:27] <foldmorepaper> I'm sorry about that--I automatically assumed 18.04 had been released for a few days and didn't check the date on the post!
[21:27] <foldmorepaper> Thank you again.
[21:27] <krytarik> Heh, no problem. :)