• A lot of software uses systemd-journald to log errors,

  • The bash shell saves everything you type into the terminal,

  • wtmp, btmp, utmp all track exactly who is logged in and when,

  • The package manager logs all software you install and keeps the logs after uninstallation,

  • And the kernel writes part of the RAM which may contain sensitive information to the disk when your PC crashes.

While the OS isn’t sending these logs to Microsoft or Google, anyone who gets into your PC while you are logged in and your data is unencrypted can see much of what you have been doing.

If you want to be private, you must disable them.

  • TheFogan@programming.dev
    link
    fedilink
    English
    arrow-up
    35
    ·
    16 hours ago

    You posted this same silly thing about 3 days ago.

    anyway why isn’t the advice “encrypt your drives” instead of “disable all logging”.

    I mean your own examples are like the least serious problem.

    Who is logged in and when? So we’re talking a multi user system that’s clearly hosting a lot… that’s kind of important for an administrator to be able to track who is logging in when, to know if something goes wrong.

    Package manager logs what’s installed. well duh, what’s the scenerio that this is even a factor? I don’t want big government to know I had, qbittorrent or whatever? There’s no program that’s likely installed via apt that’s illegal to have.

    So yeah in short, stuff that’s vital if you ever need to troubleshoot, useful in general, almost unthinkable to imagine situations where this is a problem (at least in situations in which someone has your user account, or root access to your system for these to be the high priority.

    On the whole the idea there is like.

    “If someone steals your car… they could also steal the car users manual”.