LARBS website: larbs.xyz 00:00 Intro and Background 01:26 Download and Create and ISO 05:05 On the Artix and Arch Install Scripts in the Repositories 07:28 Reboot and Boot from the ISO 08:26 UEFI vs Legacy Boot 09:38 Formatting the Drive and Partitions 14:34 Making an Encrypted Partition (luksFormat) 17:37 Mount Partitions 18:24 Choosing Mirrors for Speed (Optional) 19:02 Install the Operating System and Programs 22:06 Chrooting into the New Operating System 23:03 Settings: Timezone, locale, LANG, hostname 26:13 Enable NetworkManager and internet/wifi 27:17 Passwords and users (optional autologin) 29:30 Preparing decryption on boot, mkinitcpio.conf 30:59 Grub configuration with UUIDs to decrypt 32:08 Generating an fstab file 32:28 Finishing up the GRUB configuration 36:32 Grub installation and grub-mkconfig 39:13 Finalizing 39:47 Checking our work 41:44 On graphical environments 42:30 LARBS 45:45 On xinit and starting desktop environments or window managers
28:11 "If you are decrypting your drive, ..., having an user password is basically a formality." It's exactly the other way around. If you don't encrypt your drive, then an user password is almost useless because anyone can boot from a usb stick and acess all your files from there, or remove your disks and plug them into another computer. However, if all is encrypted, the only way to acess your files is by logging in after disk decryption. So if you disable login and sudo passwords and someone uses your computer after you have decrypted, you are completely exposed. Passwords are meant for online protection, while encryption is for data at rest. Not that you shoud leave your computer unnatended at all, but the point is the same.
There's also one thing I'd recommend when using this kind of setup (Btrfs + encryption) -- in your /etc/fstab, You can add a "compress=zstd" option to each of the btrfs entries This may benefit You in 2 ways: - First, the data is compressed on the fly, so you can fit it much more of it onto your drive, with the only cost being minor CPU usage increase (for me it's ~10% usage when writing). - Second, the crypt-device has less physical data to encrypt, so the net CPU-time needed might actually **go down**, resulting in a higher total disk throughput ^_^ ❤
Good vidya. Graphical Artix ISOs can do full encrypted installs (including /boot), and btrfs is setupd by default with proper subvolumes so that it can work with snapshot tools like timeshift without any user intervention. While it's not difficult to setup subvolumes, it usually requires some command-line deviations during the install (e.g. Debian/Devuan) which is not documented that well. Really great feature to have on the graphical iso's, once again proving that Artix is a great just werks arch distro.
you know you can just install graphical partitioning tool like gparted while you are booted into the usb and do it prior to running the installation. so really no command line is needed i think
Great video. Good for intermediates stepping into Arch. The only thing you could add in this video is x86_64v3 v4 kernel support and io schedulers, but those two things can be had elsewhere.
20:31 linux is not included in base anymore to allow lightweight container installs, as containers rely on host's kernel instead of shipping with their own
Hey Luke, thanks for the vid, it was a useful starting point. Unfortunately, you neglected setting up your btrfs subvolumes, which pretty much defeats the purpose of using btrfs over ext4 as your filesystem. The fact that subvolumes and snapshotting is possible on btrfs is the whole reason why the added complexity (and thus, the lower performance and increased instability) may be worth it.
18:24 There is a neat tool that automates this, it's called reflector. You provide it with a sorting method and with a list of countries and you redirect the output to the mirrors file.
It's been now a little more than a year since I decided to jump from windows to Artix without knowing anything about it, I had many hardships in my path doing that, but looking back now it was all worth it.
I had a really hard time doing this about 1 and a half years ago, in my defence6was a complete noob at that point I used a weekend. I really wish I had this video back then but I got it done, eventually. Been daily driving it ever sins, have never had this smooth of a computing experience before also cut about 3 sec off my boot time👌
LARBS is a good learning distro to see how files should be organized and how to do things without Gnome or KDE doing them for you and how you can create your own bootstrapping script.
Just use oflag=sync to write the image directly in chunks you set with the bs= parameter. That way once the command is done it's over and you have a ready-to-use installation drive.
Thanks for the upload. I have been making the switch to artix in my free hours while wage-cucking. 2 things: (1) the desktop environments like plasma and mate allow you to encrypt any partition during the installation. They are using luks, the commands are the same in practice (cryptsetup open, mount, umount, cryptsetup close); (2) I have been failing getting a full install of artix on a usb drive, you have any experience with that? I have installed arch the real way a few times thanks to your video, but I like plasma and just prefer the simpler route. Do you have any gripes with these desktop environments? would love to hear.
This is the second arch/Luks installation i have watched now, and both completely skip over setting up swap and home partitions. There's no way you guys just live in root. Do you set them up inside the cryptsetup partition with root? Do you make separate partitions and individually encrypt those as well? Not much documentation on it.
What about swap and hibernation? From what I've read, the only possibility is to hibernate into a swap file on the root partition. Also, is there a normie way of encrypting Linux system similar to VeraCrypt way on windows?
Zero fill is a great way to wipe out your drive and also find / discover badblocks in case you need to replace your failing drive and of course sanitize it. The drive may still be usable and the controller will mark those otherwise undiscovered badblocks as unusable. But you're right, it takes time. On a 512gb ssd, it was about 90 minutes. BTW doesn't arch recommend encrypting the boot partition on a separate drive to protect the precious kernel? /boot has to be on a separate partition from root so you don't have to unlock twice. Also I guess you're not using or encrypting swap.
this shit is so cool I've never used linux before I just installed this on an old ass dell inspiron with a crt monitor and an IBM model m I feel like its 1992 just messin around in the TTY is so much fun :D
If my laptop has coreboot and not legacy bois or uefi then which type of file systems and grub installs do I use? My grub cant seem to find the init system - im installing open-rc artix btw
I use larbs and dont regret it. artix & larbs are my second linux distro. A bit overwhelmed sometimes, perhaps good moment to ask, I want to change mod+W to open firefox instead of librewolf. I went to the settings i read on F1, changed the name of librewolf to firefox but it didnt work. What/where shall I do it?
Tried a few of these weekly builds with desktop manager in VMWare Workstation, just to see how the quality is. All of those seemingly provide options for fde too. Frankly, tons of errors. Seems untested to me.
At 18:27 I go to type in the nvim command and get "-bash: nvim: command not found" I went to the next step and installed the packages and tried again, but get the same message.
You should consider using systemd-boot or gummiboot - GRUB doesn’t support luks2 so you will have weaker encryption as a result - of course, that’s only if that really matters to you.
@@manners7483 It's not about encrypting your boot; GRUB can't unlock Luks2 with Argon2 encryption on your main disk. Luks1 only supports PBKDF2 which is vulnerable to certain attacks such as those using graphics cards.
@@mckendrick7672 yea so you just leave boot unencrypted. Encryption on boot just makes the actual situations encryption is useful less useful while giving no real added benefits for situations that don't really exist. If someone is hacking your boot and you don't notice you have bigger problems to worry about and probably shouldn't be leaving your PC unattended in such a vulnerable situation. I would suggest anything you need to keep secret that badly should be done on a USB with tailsOS or some other live USB that you carry on your person or hide very well when not in use. But you do you obviously. If your threat model requires that sort of thing you would know better than I as I never put much thought into defending my system from nationstate level attacks. I'm fine with the difficulty my encryption will cause should anyone get physical access to my system. If that happens I don't an on ever seeing it again so they can have my boot. I'm more focused on not making a dumb mistake that makes my encryption mute.
@@manners7483 Yeah, my boot partition isn't encrypted either. Encrypting your boot partition would protect you from an evil maid attack, but that would still require the attacker have physical access to the device. My primary purpose with using encryption is in preventing people from looking at my data directly. If you're concerned that your boot partition may have been compromised while someone else had physical access to it you'd probably be better off using another device to boot into the encrypted partition - so it might be beneficial to keep the boot partition on removable media. However, if you're in a position to be that concerned about evil maid attacks, you'd probably want to make sure the firmware of the device itself wasn't compromised. Personally speaking, using systemd-boot is easier to use than GRUB anyways, and it comes with the benefit of being able to use stronger encryption with it.
I'm having a hard time finding the files involved in modifying the keybinds. I really want to change my mod key but can't find that file anywhere i've looked including in the folders that are mentioned in the F1 help page. Could someone give me the exact locations they are installed to and what they are called. Been trying to find ways around asking this here but can't.
RUNNING ON OLD COMPUTER WITH MBR: Your computer may not support gpt if it’s old. You need to set up mbr partitioning. CLEAR ALL PARTITIONS $ fdisk /dev/sda $ o Then create the partition as luke did, and mark sda1( the boot partition) as bootable $ fdisk /dev/sda $ a $ 1 Thats it. Verify with: $ fdisk -l /dev/sda Disklabel type should be “dos”. And sda1 should have * on “Boot” section.
@@BurgerKingHarkinian it's really hard to get it to work. But it's possible. There are tutorials but it's not an easy path. I'm thinking Like can be the first to do this on TH-cam. Plausible deniability is the goal
29:30 this always threw me to an autologged tty and I had to manually run lightdm to access my window manager lost hours looking around to debug lightdm, X and my window manager when simply removing this autologin addition solved everything
I met a new obstacle for installing Arch, none of the methods to get a bootable USB-stick works reliably. I see weird (Chinese-like but not Chinese) characters when I read the contents of the USB-stick. One time after rebooting on anotehr system and back on my system all of the sudden the files became readable and then I could boot from it. Some problem with the USB-stick? Some data pollution in the table? With regular files the USB-stick still seems to work fine though I think that 1 GB has been lost for whatever reason (from 16 to 15). A mystery for now,
@@RESPEKTOS I use that too but some older bios'es and some newer iso's don't like it , in that case there is also Suse's Imagewriter on the Artix repos. It ain't gonna do better than dd though, unless @Peter Jansen is dd-ing to a partition instead of the whole disk.
3:45 - 'dd if=artix-base-runit-20220713-x86_64.iso of=/dev/sdc' destroys all data on /dev/sdc (your USB drive), correct? Should probably be a warning about using dd for beginners who might run the command on a device which contains valuable data.
Hey Luke, i put larbs on an old laptop to try and i'm an older person that is still a noob as far as linux is concerned. My question is how do i update the system, i read that you can just use github commands but i'm not really sure what i am doing. Can you give me actual commands that i should run to get updates. Thanks love your videos.
@@robertdemint9943 yea you can but you don't have to. Larbs is not something that needs to be updated. I just leave mine be and never have any problems.
@@manners7483 Thanks but don't the programs need updates sooner or later for security? I'm fine with rerunning install script as i don't use as daily driver yet.
28:11 "If you are decrypting your drive, ..., having an user password is basically a formality." It's exactly the other way around. If you don't encrypt your drive, then an user password is almost useless because anyone can boot from a usb stick and acess all your files from there, or remove your disks and plug them into another computer. However, if all is encrypted, the *only* way to acess your files is by *logging in* after disk decryption. So if you disable login and sudo passwords and someone uses your computer after you have decrypted, you are completely exposed. Passwords are meant for online protection, while encryption is for data at rest. Not that you shoud leave your computer unnatended at all, but the point is the same.
Why just not not Obarun instead? its more devoided of any of the systemd components that void and Artix does not or never do (coz the systemd compenents left, like elogind, dot not do the init)
seeing as how there hasn't been a package update (or maybe the homepage is broken?) in 2 months, i'd steer clear of that unless they do what OBSD does and only update packages when there's a security fix
It's when you do: basestrap /mnt linux linux-firmware That's the kernel itself, you can do any kernel you want like linux-zen for instance. I wouldn't play around too much with different kernels unless its for fun and you dont mind tinkering
If you want to customize your kernel you install Gentoo other wise you do what the other anon said. And if you are worried about compile times on Gentoo you can just use flatpak, snaps, or appimg for any applications you don't want to emerge with custom use flags.
Arch install is crap. It does weird stuff with the filesystem that makes troubleshooting a nightmare as you can't follow any guides made with a traditional arch install. It is not worth the time it saves once you run into a problem.
LARBS website: larbs.xyz
00:00 Intro and Background
01:26 Download and Create and ISO
05:05 On the Artix and Arch Install Scripts in the Repositories
07:28 Reboot and Boot from the ISO
08:26 UEFI vs Legacy Boot
09:38 Formatting the Drive and Partitions
14:34 Making an Encrypted Partition (luksFormat)
17:37 Mount Partitions
18:24 Choosing Mirrors for Speed (Optional)
19:02 Install the Operating System and Programs
22:06 Chrooting into the New Operating System
23:03 Settings: Timezone, locale, LANG, hostname
26:13 Enable NetworkManager and internet/wifi
27:17 Passwords and users (optional autologin)
29:30 Preparing decryption on boot, mkinitcpio.conf
30:59 Grub configuration with UUIDs to decrypt
32:08 Generating an fstab file
32:28 Finishing up the GRUB configuration
36:32 Grub installation and grub-mkconfig
39:13 Finalizing
39:47 Checking our work
41:44 On graphical environments
42:30 LARBS
45:45 On xinit and starting desktop environments or window managers
Make LARBS great again...
28:11 "If you are decrypting your drive, ..., having an user password is basically a formality."
It's exactly the other way around. If you don't encrypt your drive, then an user password is almost useless because anyone can boot from a usb stick and acess all your files from there, or remove your disks and plug them into another computer. However, if all is encrypted, the only way to acess your files is by logging in after disk decryption. So if you disable login and sudo passwords and someone uses your computer after you have decrypted, you are completely exposed. Passwords are meant for online protection, while encryption is for data at rest. Not that you shoud leave your computer unnatended at all, but the point is the same.
There's also one thing I'd recommend when using this kind of setup (Btrfs + encryption)
-- in your /etc/fstab, You can add a "compress=zstd" option to each of the btrfs entries
This may benefit You in 2 ways:
- First, the data is compressed on the fly, so you can fit it much more of it onto your drive,
with the only cost being minor CPU usage increase (for me it's ~10% usage when writing).
- Second, the crypt-device has less physical data to encrypt, so the net CPU-time needed
might actually **go down**, resulting in a higher total disk throughput ^_^ ❤
Good vidya. Graphical Artix ISOs can do full encrypted installs (including /boot), and btrfs is setupd by default with proper subvolumes so that it can work with snapshot tools like timeshift without any user intervention. While it's not difficult to setup subvolumes, it usually requires some command-line deviations during the install (e.g. Debian/Devuan) which is not documented that well. Really great feature to have on the graphical iso's, once again proving that Artix is a great just werks arch distro.
I understand some of these werds.
you know you can just install graphical partitioning tool like gparted while you are booted into the usb and do it prior to running the installation. so really no command line is needed i think
Not only is Luke back, he is back with Linux videos?? Wow 💪😁
We're so back
Great video. Good for intermediates stepping into Arch. The only thing you could add in this video is x86_64v3 v4 kernel support and io schedulers, but those two things can be had elsewhere.
20:31 linux is not included in base anymore to allow lightweight container installs, as containers rely on host's kernel instead of shipping with their own
Look at this mad lad pulling USB drives while running dd
BASeD
Haha, yeah all while he mentions sync in passing. Tell me how important looking both ways is while you dash between speeding cars during rush hour.
Hey Luke, thanks for the vid, it was a useful starting point. Unfortunately, you neglected setting up your btrfs subvolumes, which pretty much defeats the purpose of using btrfs over ext4 as your filesystem.
The fact that subvolumes and snapshotting is possible on btrfs is the whole reason why the added complexity (and thus, the lower performance and increased instability) may be worth it.
If I wanted to learn more about subvolumes for a real install, where would I go?
Time to watch the arch installation guide from the manually installed arch
I can confirm: I don't want to install Arch / Artix Linux yet this video works for me.
18:24 There is a neat tool that automates this, it's called reflector. You provide it with a sorting method and with a list of countries and you redirect the output to the mirrors file.
Reflector doesn't work on artix, it depends on soystemd
@@vrilgod4176 Ooh, didn't know that.
btw on arch iso, reflector is now installed by default so you can just run reflector -c [country] to update your mirrorlist
Don't ever change LARBS to company-friendly naming convention. Keep asserting dominance.
after trying to do this by myself I got to the last part of grub and failed. but this video saved me when I followed along. SAVIOR
It's been now a little more than a year since I decided to jump from windows to Artix without knowing anything about it, I had many hardships in my path doing that, but looking back now it was all worth it.
I had a really hard time doing this about 1 and a half years ago, in my defence6was a complete noob at that point I used a weekend. I really wish I had this video back then but I got it done, eventually. Been daily driving it ever sins, have never had this smooth of a computing experience before also cut about 3 sec off my boot time👌
LARBS is a good learning distro to see how files should be organized and how to do things without Gnome or KDE doing them for you and how you can create your own bootstrapping script.
Bro you are KILLING it with these uploads lately
Holy shit he's back from larping irl to larping in front of the screen, I love it!
Luke: Fug the optics I'm the vanguard now.
Is it just me or is Luke looking younger and younger with each video he posts?
He's looking more and more like Megamind with every video he posts
He looks the same as he did when he started lol
Adrenochrome
We miss you :(
😭😭
He innawoods now
Perfect timing! I was just trying to install artix on an old desktop a few days ago and it wasn't working.
It helped me to install windows, thanks sir!!!
thanks a bunch, this fiddling with cryptsetup i'll use on my opensuse TTY-only usb stick linux installation.much appreciated
FYI Luke you can pass the --mkdir flag to mount and it will create the mountpoint so you don't have to mkdir it yourself first. A little less typing.
amazing, love it ! this video is like being with a friend, thank you so much !
Just use oflag=sync to write the image directly in chunks you set with the bs= parameter. That way once the command is done it's over and you have a ready-to-use installation drive.
Luke, you are a good man!
Thanks for the upload. I have been making the switch to artix in my free hours while wage-cucking. 2 things: (1) the desktop environments like plasma and mate allow you to encrypt any partition during the installation. They are using luks, the commands are the same in practice (cryptsetup open, mount, umount, cryptsetup close); (2) I have been failing getting a full install of artix on a usb drive, you have any experience with that?
I have installed arch the real way a few times thanks to your video, but I like plasma and just prefer the simpler route. Do you have any gripes with these desktop environments? would love to hear.
Bruh you forgot to add „…in 2023” at the end of the title
*2024
@@brockm4047LOL, I don’t know if you didn’t look at the time mark this video and comment was uploaded.
I did. Just updating the year. I'll be back next year to update as well. lol
Good timing I'm installing larbs right now 👍
im a bit confused about why you installed the lvm stuff and added the hook for it, you don't seem to be using it?
With lvm you can add a hdd to the pool whenever you want so it's a good idea if you want the option to add more storage later.
@@manners7483 There's literally 0 reason to do this if you're using BTRFS as your filesystem.
Sooo... I could have used this video earlier but I don't mind it now, as I might learn a lot from it despite having already encrypted my own laptop
i love the part when he connects to the internet
came just at the right time brother
Hey Luke, what keys did you press to change the opacity of the window? (I use LARBS)
alt-a and alt-s
It's in the help pdf btw:
Super + F1
(and in the config.h)
I’ve been waiting my entire life for this video. Thank you bro
Pls come back :c
This is the second arch/Luks installation i have watched now, and both completely skip over setting up swap and home partitions. There's no way you guys just live in root. Do you set them up inside the cryptsetup partition with root? Do you make separate partitions and individually encrypt those as well? Not much documentation on it.
Even if you voted for Ross Perot back in 1992, this video is going to work for you
Tech video?? No way!! Also what do you think about NixOS, Luke?
What about swap and hibernation? From what I've read, the only possibility is to hibernate into a swap file on the root partition.
Also, is there a normie way of encrypting Linux system similar to VeraCrypt way on windows?
If you are using systemd on arch, you don't even need networkmanager. In case you are using UEFI, you don need grub either
i wanted to do this for a year but now you made a damn video so I'll have to follow it
Yo luke what did you do about the laptop situation? Im talking about the video from a while ago.
Hey Luke, is it necessary to set the type of the first partiton to EFI during the use of fdisk? Why is it not necessary?
fdisk tip: use "o" to delete all partitions at once
Finally!
Zero fill is a great way to wipe out your drive and also find / discover badblocks in case you need to replace your failing drive and of course sanitize it. The drive may still be usable and the controller will mark those otherwise undiscovered badblocks as unusable. But you're right, it takes time. On a 512gb ssd, it was about 90 minutes. BTW doesn't arch recommend encrypting the boot partition on a separate drive to protect the precious kernel? /boot has to be on a separate partition from root so you don't have to unlock twice. Also I guess you're not using or encrypting swap.
Thanks. How does this work with modern nvidia gpus and the functionality those can bring?
artix is the best
god damn is AUR incredibly handy
@@happygofishing it's the only way
Grub defaulted to trying to install for efi and gave me "grub-install error: cannot find efi directory", why did yours default to installing for i386?
Hey, I am getting a similar error, did you manage to fix this?
add --force at the end of the command
this shit is so cool I've never used linux before
I just installed this on an old ass dell inspiron with a crt monitor and an IBM model m I feel like its 1992
just messin around in the TTY is so much fun :D
That is a really good video. Everything well explained even for noobs
If my laptop has coreboot and not legacy bois or uefi then which type of file systems and grub installs do I use? My grub cant seem to find the init system - im installing open-rc artix btw
did you figure it out?
do you use tmux?
Yes man, this Noob thanks you
Isn't it best practice to create at least a subvolume for root in the btrfs partition?
I use larbs and dont regret it. artix & larbs are my second linux distro. A bit overwhelmed sometimes, perhaps good moment to ask, I want to change mod+W to open firefox instead of librewolf. I went to the settings i read on F1, changed the name of librewolf to firefox but it didnt work. What/where shall I do it?
not sure exactly how larbs is setup but you you probably want to change the $BROWSER environment variable which is set in your shell profile config
You need to change the dwm bind too.
@@LukeSmithxyz thank you ill try that. Wow you know I exist :3
when larbs has better documentation than manjaro 💀
Tried a few of these weekly builds with desktop manager in VMWare Workstation, just to see how the quality is. All of those seemingly provide options for fde too. Frankly, tons of errors. Seems untested to me.
Default RuneScape character teaches Soydevs how to Git Gud™️
At 18:27 I go to type in the nvim command and get "-bash: nvim: command not found"
I went to the next step and installed the packages and tried again, but get the same message.
Luke I can only say you are the guy
You should consider using systemd-boot or gummiboot - GRUB doesn’t support luks2 so you will have weaker encryption as a result - of course, that’s only if that really matters to you.
Encryption on your boot is pretty pointless. It is not really going to help you against any realistic situation.
@@manners7483 It's not about encrypting your boot; GRUB can't unlock Luks2 with Argon2 encryption on your main disk. Luks1 only supports PBKDF2 which is vulnerable to certain attacks such as those using graphics cards.
@@mckendrick7672 yea so you just leave boot unencrypted. Encryption on boot just makes the actual situations encryption is useful less useful while giving no real added benefits for situations that don't really exist.
If someone is hacking your boot and you don't notice you have bigger problems to worry about and probably shouldn't be leaving your PC unattended in such a vulnerable situation.
I would suggest anything you need to keep secret that badly should be done on a USB with tailsOS or some other live USB that you carry on your person or hide very well when not in use.
But you do you obviously. If your threat model requires that sort of thing you would know better than I as I never put much thought into defending my system from nationstate level attacks. I'm fine with the difficulty my encryption will cause should anyone get physical access to my system. If that happens I don't an on ever seeing it again so they can have my boot.
I'm more focused on not making a dumb mistake that makes my encryption mute.
@@manners7483 Yeah, my boot partition isn't encrypted either. Encrypting your boot partition would protect you from an evil maid attack, but that would still require the attacker have physical access to the device. My primary purpose with using encryption is in preventing people from looking at my data directly.
If you're concerned that your boot partition may have been compromised while someone else had physical access to it you'd probably be better off using another device to boot into the encrypted partition - so it might be beneficial to keep the boot partition on removable media. However, if you're in a position to be that concerned about evil maid attacks, you'd probably want to make sure the firmware of the device itself wasn't compromised.
Personally speaking, using systemd-boot is easier to use than GRUB anyways, and it comes with the benefit of being able to use stronger encryption with it.
Will this work in a dual boot setup?
what do i have to do different for a dual boot system?
thoughts on dinit and s6
If your on dell,hp,lenovo the key you need is f13
I'm having a hard time finding the files involved in modifying the keybinds. I really want to change my mod key but can't find that file anywhere i've looked including in the folders that are mentioned in the F1 help page. Could someone give me the exact locations they are installed to and what they are called. Been trying to find ways around asking this here but can't.
What app does he use for his camera?
Ffmpeg
ffplay -window_title webcam /dev/video0
i think he uses mpv on the camera in /dev
I still use artix, cheers (runit)
If I dual boot linux and windows on different hard drives. Will windows spy on my linux hard drive? If so will encypting the linux os drive stop it?
the threepeat!
What is better, arch linux with systemd or artix with runit?
Newbs want systemd. Run it and openrc are older script based init based on sysV init. It's an extra layer of problems.
RUNNING ON OLD COMPUTER WITH MBR:
Your computer may not support gpt if it’s old. You need to set up mbr partitioning.
CLEAR ALL PARTITIONS
$ fdisk /dev/sda
$ o
Then create the partition as luke did, and mark sda1( the boot partition) as bootable
$ fdisk /dev/sda
$ a
$ 1
Thats it.
Verify with:
$ fdisk -l /dev/sda
Disklabel type should be “dos”. And sda1 should have * on “Boot” section.
Please look into veracrypt hidden volumes
Doesn't really work with full disk encryption on Linux, does it?
@@BurgerKingHarkinian it's really hard to get it to work. But it's possible. There are tutorials but it's not an easy path. I'm thinking Like can be the first to do this on TH-cam. Plausible deniability is the goal
@@maximus6884 sure would be pretty cool. I agree.
"Tomb" is the answer you seek friend
29:30 this always threw me to an autologged tty and I had to manually run lightdm to access my window manager
lost hours looking around to debug lightdm, X and my window manager when simply removing this autologin addition solved everything
do you see the fun in openrc
I met a new obstacle for installing Arch, none of the methods to get a bootable USB-stick works reliably. I see weird (Chinese-like but not Chinese) characters when I read the contents of the USB-stick. One time after rebooting on anotehr system and back on my system all of the sudden the files became readable and then I could boot from it. Some problem with the USB-stick? Some data pollution in the table? With regular files the USB-stick still seems to work fine though I think that 1 GB has been lost for whatever reason (from 16 to 15). A mystery for now,
use Ventoy, dont write isos to usb anymore, just drag and drop
@@RESPEKTOS I use that too but some older bios'es and some newer iso's don't like it , in that case there is also Suse's Imagewriter on the Artix repos.
It ain't gonna do better than dd though, unless @Peter Jansen is dd-ing to a partition instead of the whole disk.
3:45 - 'dd if=artix-base-runit-20220713-x86_64.iso of=/dev/sdc' destroys all data on /dev/sdc (your USB drive), correct? Should probably be a warning about using dd for beginners who might run the command on a device which contains valuable data.
Hey Luke, i put larbs on an old laptop to try and i'm an older person that is still a noob as far as linux is concerned. My question is how do i update the system, i read that you can just use github commands but i'm not really sure what i am doing. Can you give me actual commands that i should run to get updates. Thanks love your videos.
Are you trying to update the Os/ programs or Larbs?
@@manners7483 Larbs, i read that i could just rerun the curl command but would like to learn how to use github. Thanks
@@robertdemint9943 yea you can but you don't have to. Larbs is not something that needs to be updated. I just leave mine be and never have any problems.
@@manners7483 Thanks but don't the programs need updates sooner or later for security? I'm fine with rerunning install script as i don't use as daily driver yet.
can you do it encrypting the boot partition too? its more secure and difficult to set up that way
pointless
@@milesrout why?
what do you put in your boot partition@@tecnoloxia137
@@kasiarzpl8647another boot partition, apparently
Another video Luke?
Are you ok?
anyone knows what's the color scheme he's using in the terminal ?
Here at 2,196 views. How is Luke still alive?
Did all this perfectly then after I installed larbs and logged into tty1 or try to use startx I just get a blackscreen with no error logs
classic video
28:11 "If you are decrypting your drive, ..., having an user password is basically a formality."
It's exactly the other way around. If you don't encrypt your drive, then an user password is almost useless because anyone can boot from a usb stick and acess all your files from there, or remove your disks and plug them into another computer. However, if all is encrypted, the *only* way to acess your files is by *logging in* after disk decryption. So if you disable login and sudo passwords and someone uses your computer after you have decrypted, you are completely exposed. Passwords are meant for online protection, while encryption is for data at rest. Not that you shoud leave your computer unnatended at all, but the point is the same.
What about the swap partition?
There's a page on the wiki.
Is the $CURRENT_YEAR when Luke Smith goes into Wayland with DWL?
Why just not not Obarun instead? its more devoided of any of the systemd components that void and Artix does not or never do (coz the systemd compenents left, like elogind, dot not do the init)
Hyperbola is better
seeing as how there hasn't been a package update (or maybe the homepage is broken?) in 2 months, i'd steer clear of that unless they do what OBSD does and only update packages when there's a security fix
Sir kindly the method did not work
bro its been 12 minutes since the video released, how did u get through the whole 47 minutes already
Sir, did you do the needful?
Sarr please, microsoft tehc support, send credit card numbar
Have you tried liking, commenting, subscribing and accepting Jesus into your life?
Why not rhel?
this video was made for existing arch linux users 😂
How do I encrypt my Montana cabin so that the glowboys don't eat my porridge?
Avoid having a mailing/street address.
/proc not installed error at 31:00
When can I choose the Kernel (like non Linux kernel)?
It's when you do:
basestrap /mnt linux linux-firmware
That's the kernel itself, you can do any kernel you want like linux-zen for instance. I wouldn't play around too much with different kernels unless its for fun and you dont mind tinkering
If you want to customize your kernel you install Gentoo other wise you do what the other anon said. And if you are worried about compile times on Gentoo you can just use flatpak, snaps, or appimg for any applications you don't want to emerge with custom use flags.
@@Bagginsess You can do custom kernels on Arch perfectly easily.
@@milesrout oh really? Didn't know that I'll go check that out thanks!
why the systemd hate ?
Arch install is crap. It does weird stuff with the filesystem that makes troubleshooting a nightmare as you can't follow any guides made with a traditional arch install.
It is not worth the time it saves once you run into a problem.