• 0 Posts
  • 12 Comments
Joined 9 months ago
cake
Cake day: August 12th, 2024

help-circle
rss

  • Decryption is not related to root permission.

    If the ENCRYPTED drive is mounted to the container, then the container can decrypt it.

    If the DECRYPTED drive is mounted to the container, then the container never knows it was encrypted in the first place.

    Second case is easier BTW. Just mount the drive on your host, type in the encryption password and you get a new, unencrypted drive. Specify this new drive in your docker compose/docker file.




  • You can install packages from other places and create your own (and then install them). The distro maintainers have one (or multiple) list of “approved” software but you can add as many lists as you want to your package manager. Often software developers will have their own package list that contains only their own software and if you install it you have to add that list to your package managers trusted software locations. In that sense it isn’t really better than going to the developers website and downloading an installer on windows but it is quite rare you have to do that



  • The system where someone monopolizes a essential good and leverages that to gain power is called anarcho-capitalism and is a whole different thing. In anarchy, ownership on that level does not exist. Neither a company nor a person can own a factory, or a farm, or the power grid. Employment doesn’t exist. People can band together and distribute tasks for a common goal (such as producing a certain good) but they all hold equal stake in all decisions.

    Of course a group of people could use violence to oppress other people. But then you no longer have anarchy. The same way a democracy stops beeing a democracy once a group seizes power and doesn’t allow fair elections anymore.






  • The post office knows who you are sending letters to. They have to know because they have to deliver it. They do not know the content of the letter. They also dont know if the letter will be passed along by the receiver to a different destination.

    Your ISP knows you are sending traffic to proton but not where proton is sending it to. Proton knows where you are sending traffic to but not the content of that traffic. So if you browse a website that only serves pirated content, then proton knows you are consuming pirated media but not which media.

    If the law requires proton to report any and all traffic to blacklisted sights then a “no logs policy” would breach that law.

    However to make this law work, Italy would have to ban all VPNs and http proxy services outside of Italy. Italy would have to force pretty mutch the whole world to follow this law for it to work.

    What happens if you run a tiny server on AWS in the USA to proxy your private traffic. Unless AWS USA is watching all traffic to see if it complies with Italian law there is no way to enforce it.