| 12 Jan 2026 |
| jimmie joined the room. | 08:06:04 |
| jimmie set a profile picture. | 08:12:08 |
| jimmie changed their display name from zigzen to jimmie. | 08:12:29 |
| 20 Jan 2026 |
| innocentzer0 joined the room. | 14:44:37 |
| 29 Jan 2026 |
| jaymes2 joined the room. | 18:25:03 |
| 30 Jan 2026 |
| zimward changed their display name from zimward to zimward @fosdem. | 16:19:17 |
| 1 Feb 2026 |
| Fernando Rodrigues changed their display name from SigmaSquadron to Fernando Rodrigues. | 10:43:03 |
| zimward changed their display name from zimward @fosdem to zimward. | 20:36:48 |
| 3 Feb 2026 |
| crazychaoz joined the room. | 14:27:15 |
| 4 Feb 2026 |
| tiferrei changed their profile picture. | 02:55:26 |
| tiferrei left the room. | 11:59:37 |
| 10 Feb 2026 |
| pneumatic changed their display name from ribosomerocker to pneumatic. | 10:28:41 |
| 11 Feb 2026 |
| aura (deprecated; @aura:bundernet.org) changed their display name from Aura to aura (deprecated; @aura:bundernet.org). | 11:25:12 |
| hoplopf joined the room. | 14:33:16 |
| 16 Feb 2026 |
| zimward changed their display name from zimward to zim. | 13:49:40 |
| zimward changed their display name from zim to zimward. | 13:50:44 |
| pneumatic changed their profile picture. | 15:18:31 |
| 16 Jul 2021 |
| andi- changed the history visibility to "world_readable" from "shared". | 12:07:40 |
| spacesbot - keeps a log of public NixOS channels joined the room. | 12:09:23 |
@grahamc:nixos.org | ^ recording material I looked at | 12:09:26 |
| manveru joined the room. | 12:09:46 |
andi- | I've found this https://kernsec.org/wiki/index.php/Linux_Kernel_Integrity | 12:09:54 |
andi- | had a bunch of (somewhat dated) links | 12:10:00 |
@grahamc:nixos.org | I'm still waiting for someone to confirm what I believe to be a fundamentally true security property https://developers.tpm.dev/posts/15575774 | 12:11:22 |
@grahamc:nixos.org | just as many bots as people in here | 12:11:35 |
andi- | I am still a bit confused by the requirement of different secrets to decrypt one secret. This is probably because TPMs support different trust roots(?) and each of the root has to match the secrets you want to decrypt? | 12:12:51 |
@grahamc:nixos.org | yeah | 12:13:00 |
andi- | So, why that take ownership stuff then? | 12:13:12 |
@grahamc:nixos.org | you can create a hierarchy of keys which reveal different amounts of data | 12:13:20 |
andi- | Shouldn't I rather specify the root somehow? | 12:13:21 |