this post was submitted on 15 Jun 2024
29 points (100.0% liked)
Linux Questions
1149 readers
3 users here now
Linux questions Rules (in addition of the Lemmy.zip rules)
- stay on topic
- be nice (no name calling)
- do not post long blocks of text such as logs
- do not delete your posts
- only post questions (no information posts)
Tips for giving and receiving help
- be as clear and specific
- say thank you if a solution works
- verify your solutions before posting them as facts.
Any rule violations will result in disciplinary actions
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I just don't bother trying. Someone probably has a solution for the proprietary garbage inside the laptop that is undocumented. I could go in and monitor the registers that are being changed. I've only ever used it once, and I was there to blacklist the Mac address in my router's outbound filter because the worst hackers are corporate stalkerware pirates that limit my access to information and sell my data to those that wish to manipulate me in healthcare, insurance, banking, and politics.
The proprietary code is running on a microcontroller and there is no telling what else it is doing or connected to. It is present in the UEFI memory space. So naturally, I want to be able to monitor its native behavior at any time as well. I have logged an unknown Mac trying to dial out occasionally that is not the windows Mac, but I whitelist everything I wish to connect to via a 3rd party device I fully control. That level of ownership certainly is peak Linux.