-160
submitted 5 days ago by FG_3479@lemmy.world to c/opensource@lemmy.ml
  • A lot of software uses systemd-journald to log errors,

  • The bash shell saves everything you type into the terminal,

  • wtmp, btmp, utmp all track exactly who is logged in and when,

  • The package manager logs all software you install and keeps the logs after uninstallation,

  • And the kernel writes part of the RAM which may contain sensitive information to the disk when your PC crashes.

While the OS isn't sending these logs to Microsoft or Google, anyone who gets into your PC while you are logged in and your data is unencrypted can see much of what you have been doing.

If you want to be private, you must disable them.

you are viewing a single comment's thread
view the rest of the comments
[-] FG_3479@lemmy.world 1 points 1 day ago

I understand that, but if a hacker gets into your PC or someone takes it from you while it is logged in then that is like someone walking into your house and seeing you naked because the door has to be unlocked to get in the house.

Drive encryption is only one step towards a peivate and secure system. You can choose a middle ground such as limiting logs to 3 days if you prefer.

this post was submitted on 07 Feb 2026
-160 points (6.5% liked)

Open Source

44260 readers
46 users here now

All about open source! Feel free to ask questions, and share news, and interesting stuff!

Useful Links

Rules

Related Communities

Community icon from opensource.org, but we are not affiliated with them.

founded 6 years ago
MODERATORS