A while ago I made a tiny function in my ~/.zshrc to download a video from the link in my clipboard. I use this nearly every day to share videos with people without forcing them to watch it on whatever site I found it. What’s a script/alias that you use a lot?

# Download clipboard to tmp with yt-dlp
tmpv() {
  cd /tmp/ && yt-dlp "$(wl-paste)"
}
  • data1701d (He/Him)@startrek.website
    link
    fedilink
    English
    arrow-up
    2
    ·
    13 hours ago

    In my case, no; it’s all a single machine - it is in the initramfs and uses the system’s TPM to (relatively) securely store the keys.

    It can be set up with an attestation server, but you certainly don’t have to do it. The Arch wiki has a really good article on getting it set up.

    • notfromhere@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      13 hours ago

      How difficult is it for an adversary to get in the middle of the TPM releasing the keys to LUKS? That’s why I would want attestation of some sort, but that makes it more complicated and thinking about how that would work in practice makes my head spin…

      • data1701d (He/Him)@startrek.website
        link
        fedilink
        English
        arrow-up
        2
        ·
        13 hours ago

        Vulnerabilities certainly do exist, but I’m pretty sure the attacker has to be well-equipped

        I’d call it a protection against data getting cracked in a petty theft, but if your attack vector is much more than that, there are other measures you should probably take. I think Clevis also works with Yubikeys and similar, meaning the system won’t decrypt without it plugged in.

        Heck, I think I know someone who just keeps their boot partition with the keys on it on a flash drive and hide it on their person.