![]() ![]() And cybercrime is not prevented by suppressing information and keeping everyone insecure but by building technically secure infrastructure and systems. A fundamentally insecure society which also gives up its right to privacy in an intrusive way never possible before and allows for highly centralized-often or potentially AI-driven-control is already somewhat "lost". Those that harm or plan to harm society need to be confronted by society in innovative ways, and adequately. ![]() There are valid reasons for surveillance and most understand that secure communication can also sometimes be problematic by unwittingly helping those who decrease security of society. The ultimate goal of guides such as this is to bring about a worldwide mass-migration to 100% libre operating system and to increase cybersecurity of citizens and infrastructure. The difficulty of properly setting up Debian is keeping away many users. If you think it's not useful you can ignore it. Much of this guide might be suboptimal or even false: please help by improving and correcting it. It should not be split up as it aims to aggregate and summarize information for an all-in-one-place guide. They can delve deeper once it is working. The steps don't need to be followed exactly-it is meant as an orientation to speed up and ease the setup to allow inexperienced GNU/Linux users and even casual computer users to get a fully free, libre and open source (FLOSS) operating system going by themselves. It's written in a chronological step-by-step manner which when updated and tested appropriately and followed from top to bottom precisely will simply get things working. It aims to be written in layman's terms without any required preknowledge and is mainly aimed at Debian newcomers-especially those who switched to Debian to evade backdoors in other operating systems (OS), malware and gaining control over their machines. This page aims to be(come) a step-by-step guide for setting up a personal computer with Debian from scratch to a fully configured system with high security, usability, convenience and privacy-protection. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |