Yes siree, the excitement never stops!

  • 0 Posts
  • 118 Comments
Joined 1 year ago
cake
Cake day: December 7th, 2023

help-circle


  • Well I am surprised no one has mentioned this but:

    This is the best possible JRPG to do a retcon/reimagining of as is going on with FF7, but a bit differently.

    Time travel!

    So, start a new story with new characters, but intermix this with the old cast and story beats resulting in a completely new story that brings back old favorite settings and characters, introduces new ones.

    Maybe you change significant plot points of the old story, maybe you don’t, maybe you doom the world to some entirely new kind of catastrophe, maybe you get stuck in what would otherwise be called a soft lock but is actually in this world an intentional plot device that just looks like a soft lock but isnt.

    Hell, if you /really/ want to go hog wild with this:

    Make the new set of characters generally opposed to the original set of characters, have their own method of time travelling, and make it so much of the game is actually about attempting to out-time-travel-wit the others, basically with certain characters attempting to be time demons ala DB Xenoverse and others trying to stop them… all mixed with the narrative possibilities at many points for many characters to switch allegiances, go rogue, or mostly team up.

    even moooore possible endings

    No I have no clue how you could actually write something this complicated, but the entirety of Kingdom Hearts exists and people tell me somehow that all makes sense, so I am confident a team of competent writers can pull off an absurdly complex multivariate story line.


  • It isnt so much vaporware as basically massively bad funding model and development practices.

    They have software. There is a ‘game’ you can ‘play’.

    Its just that its still buggy as fuck and the gameplay doesnt really meaningfully work.

    Its… more like an alpha that never stops adding features and content… and as a result, never does a feature lock and actually make what they have into a non buggy, actually compelling game.






  • This person asked if they can make PopOS secure via TPM.

    I am saying that while yes, you can, there isnt much point, because setting up LUKS to work with TPM is inconvenient, easy to fuck up, and basically offers no additional protection against all but extremely implausible security scenarios for basically everyone other than bladed server room admins worried about corporate espionage who are for some reason running bare metal PopOS on their server racks.

    Like the only actual use case I can see for this is /maybe/ having a LUKS encrypted portable backup drive, but even then you can still base the encryption key in the actual main pc’s harddrive without using tpm, though at /that and only that point/ are we approaching parity between the difficulty of using or not using tpm to accomplish this.


  • Oh ok so the use case here is if this casual linux user asking this question has only their harddrive stolen from their pc or their laptop in their home or apartment or workplace, not their whole pc.

    Mhm that seems likely.

    I guess this maybe makes sense if youre running like a server room, but chances are low thats the actual context of this question.

    Why would you run PopOS on a large operation’s servers?





  • Ok… so… if you have TPM… and LUKS…

    You still have a scenario where the encryption key is still on your physical device, LUKS with or without TPM, or … some kind of TPM based Linux encryption solution I have never heard of?

    Does Windows Secure Boot work on Linux via the TPM?

    No…

    Am I missing something?

    Theres no point in involving TPM in securing a linux computer.

    In a scenario where you’ve physically lost your computer, using TPM or not it wont matter if your pc gets into the hands of someone who can attempt to brute force the keys.

    If your pc is remotely compromised to the point it has something on it that can grab your keys, it also will not matter if you are using TPM in some way.

    The only practical use of full disk encryption is if your linux pc and or laptop gets stolen and falls into the hands of a non tech savvy person, and in that scenario, going through the trouble of correctly binding LUKS to TPM will have just been a waste of time.

    Thus, you should probably just use LUKS and not bother routing it through TPM.


  • Sure but you dont need to use TPM at all to use LUKS.

    You can store the encryption key on the harddrive, in the LUKS partition layer.

    Like thats the default of how LUKS works.

    Im really confused why people think TPM needs to be involved in anyway when using LUKS.

    Generally speaking you have to go out of your way to correctly cajole TPM v1 or v2 to actually correctly interface with LUKS.