• 2 Posts
  • 194 Comments
Joined 2 years ago
cake
Cake day: June 13th, 2023

help-circle





  • I see your edit, and would like to comment that you also haven’t mentioned which rpi you were going to try this on. I recently wanted to set up a quick little pc using a rpi, just so I could browse the web and maybe watch some videos. Tried a rpi2 I had laying around. No way. Moved to a rpi3, and while it would load most pages, youtube was a bust as it completely maxed out the ram and swap. I then went to a rpi4 with 8gb and it has been doable, kind of. Sometimes it’s pretty choppy with the video, but basic web browsing is ok. I did try my plex the other day through the browser and it was barely acceptable. Lots of stuttering and sometimes just hangs, but that’s not the ideal way to view plex on anything. Haven’t tried my rpi5 yet, but my point to all this is that I think you are on the right track setting it up on a spare pc he has. If you had given him a rpi as a ‘desktop’ replacement it might have just soured him on the whole idea.




  • writeable. AFAIK with bitlocker they are hashed and salted and therefore would be corrupted if you opened again with manipulated data.

    No problem. This part right here might be enough to cause concern. Lets say it isn’t a hacker, but just someone dicking around with his linux os, and manages to accidentally write to the bitlocker drive. I don’t know enough about bitlocker, but writing random data to an encrypted file is a great way to corrupt it. So if nothing else he could possibly corrupt his work os. And then hope that they buy the old “I don’t know how it broke.”

    When I was making this all up in my head, I was thinking that if I was a hacker and wanted to just mess with people, I wouldn’t need to write a huge os, just overwrite his os with something like a DBAN iso. Something small, but again any tampering with the drive would likely invalidate the bitlocked os. So even just a dd if=/dev/zero of=/dev/{os drive} and that’s all she wrote.


  • Here’s a scenario for you. His laptop running his linux os gets hacked. Said hacker discovers another drive with windows or an encrypted partition. Now he could sit there and try and de-encrypt it, or if he has the time and inclination just completely overwrite it with whatever he wanted. OP finishes what he is doing and reboots back into what he expects to be his work provided Windows OS, and sees some error message, or maybe nothing at all. In the background the hackers OS which is now running just leads him on while it’s doing what it needs to do, like scanning the network it might be connected to. Or prompting him for a id/pw.
    Regardless, the linux os will have access to the drive the Windows os is loaded onto. Now what happens to it may or may not be relevant, but it will be a writeable drive, therefore it will be suspect to manipulation.