<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>autumn</title>
    <link>https://pen.waltuh.cyou/autumn/</link>
    <description></description>
    <pubDate>Wed, 20 May 2026 17:41:04 +0000</pubDate>
    <item>
      <title>The Social Web Foundation Adds End-to-End-Encryption to Mastodon and Why This...</title>
      <link>https://pen.waltuh.cyou/autumn/the-social-web-foundation-adds-end-to-end-encryption-to-mastodon-and-why-this</link>
      <description>&lt;![CDATA[The Social Web Foundation Adds End-to-End-Encryption to Mastodon and Why This Is Probably Not a Great Idea&#xA;&#xA;---&#xA;&#xA;    As gregarious as people are, they also love their privacy. Eavesdropping, reading over the shoulder, going through personal affects? Everyone can agree, it is egregious behavior when your privacy is violated, even when justified. Thusly, it is in one&#39;s nature - innocent or otherwise - to engage in the right of privacy. What people do not have the right to, is to demand provision of this privacy from external sources. Historically, you learn to wear your own mask, to bury your own secrets.&#xA;&#xA;    Simultaneously, we continue to see that people are contrarian. As much as the people love their anonymity, they equally love their identity, expressing themselves in both private and public spaces such as bars, clubs, boardwalks, or even Social Networking Services (SNS) like Mastodon. Within these spaces people hold a reasonable expectation to both privacy and respect, i.e. not to be harassed, mocked, doxxed, stalked, have their personal space, or likeness violated, etc. Unfortunately, this cannot always be guaranteed in public or even in private spaces, leading us to the necessity of moderation, which we will touch on later.&#xA;&#xA;    Considering these facts, you are likely to enjoy the idea of secure and private conversations with your associates. If this is the case, you are probably looking for a service that offers End-to-End-Encryption (E2EE). There are many services to choose from, some more secure than others. Whatsapp for example offers convenient but highly insecure E2EE, while Signal Messenger offers a less convenient, but more secure implementation.&#xA;&#xA;---&#xA;&#xA;    E2EE explained simply is when everyone has two keys and a signature. You generate these keys, one public, one private, then start trading public keys and signatures with known associates. When you send a message to anyone, it will be encrypted using their public key &amp; decrypted only by their private key. Your message stays secure in transit. Seal that letter with your signature we mentioned and you&#39;ve proven yourself as the origin, avoiding impersonation.&#xA;&#xA;  Note: E2EE doesn’t stop the network from seeing who talks to who, when, or how often - &#34;privacy&#34; is leaky even if message content is encrypted.&#xA;&#xA;    Many individuals - including myself - have recommended using PGP&#39;s key generation, signing &amp; message encryption/ decryption capabilities to send encrypted messages &#34;anywhere&#34;... this is less than ideal in 2026. The author of a href=&#34;https://www.lvh.io/posts/the-pgp-problem/&#34;The PGP Problem/a - lvh - stated that if you want to talk, &#xA;&#xA;  Use Signal. Or Wire, or WhatsApp, or some other Signal-protocol-based secure messenger.&#xA;&#xA;  Modern secure messengers are purpose-built around messaging. They use privacy-preserving authentication handshakes, repudiable messages, cryptographic ratchets that rekey on every message exchange, and, of course, modern encryption primitives. Messengers are trivially easy to use and there’s no fussing over keys and subkeys. If you use Signal, you get even more than that: you get a system so paranoid about keeping private metadata off servers that it tunnels Giphy searches to avoid traffic analysis attacks, and until relatively recently didn’t even support user profiles.&#xA;&#xA;    As for email?&#xA;&#xA;  Don&#39;t.&#xA;&#xA;---&#xA;&#xA;    Now that we have explained what E2EE is, &#39;The PGP Problem&#39;, and the use of dedicated tools, let us take a look at this - From the Social Web Foundation, Implementing Encrypted Messaging over ActivityPub:&#xA;&#xA;  &#34;Encrypted messaging has become a common feature on many social networks since ActivityPub was created, and its lack has inhibited Social Web adoption and public trust in the network.&#34;&#xA;&#xA;    Do you genuinely believe the lack of E2EE is keeping the masses at bay? The grandmas and grandpas who just want to message their grandchildren? The mothers who just want to know when the next soccer meet is? I assure you, not a single &#34;normie&#34; is worried about E2EE unless they have swallowed marketing material. Perceived low conversion rates are because these people are literally addicted to their dopamine apps. The &#34;Social Web&#34; is fundamentally not Facebook, that is what you&#39;re observing.&#xA;&#xA;---&#xA;&#xA;    Everyone has some expectation of privacy, particularly in regards to federated SNS. Many users are tired of service providers like Facebook &#34;harvesting their data points for actionable business insights&#34; leading them to options that provide a semblance of self agency and sovereignty. On one hand, these services do not traditionally track users, on the other hand, ActivityProtocol (AP) is running behind the scenes as the language of many of your favorite services, i.e. Mastodon. This type of protocol and the way it behaves is referred to as a broadcast protocol. Everyone, everywhere can see you and what you do, who you talk to, and when. &#xA;&#xA;    This is especially true when the other server is not fully respecting the protocol, when disrespected, &#34;private&#34; accounts and posts requiring follower approval may not be entirely private. This can lead to confusion and anger between users and operators for being followed by people who shouldn&#39;t have access, bots, or tracking services, each of which are disrespecting wishes, consent, or the protocol.&#xA;&#xA;    Because of these quirks, there are some nuanced avenues for harassment I will not outline here. Actively processing, investigating, and remediating the deluge of reports in the attempt to promptly moderate against rule breakers, abuse, harassment, exploitation, scams, etc. is already a Herculean and Sisyphean task. Due to abuse by both network users and operators, there are now regulations around the world regarding data retention or lack thereof, along with legal obligations and potential demand. &#xA;&#xA;---&#xA;&#xA;    Everything so far leads the question with E2EE &amp; SNS to quickly become: How do we deploy this at scale, without breaking moderation, without confusing users, &amp; without inviting legal or security failure?&#xA;&#xA;     If an operator offers E2EE on an SNS like Mastodon - due to the nature of the protocol being comparable to a public space - suddenly we see the landscape become exponentially difficult, if not impossible to moderate. Operators will place themselves into the unfortunate position where they cannot properly serve and protect their users, or their legal obligations. Additionally, if you offer a secure service and it is not secure or your implementation is bad, what will you do if a litigious troll attempts to sue?&#xA;&#xA;    To introduce E2EE into public‑facing SNS while simultaneously trying to “solve” abuse, moderation, &amp; legal exposure, the path of least resistance is likely to be “just verify everyone”, pushing identity‑linked, KYC‑style identity checks as a way to “anchor” trust &amp; accountability. The loudest users and largest operators may start demanding identity verification to ease this friction. &#xA;&#xA;---&#xA;&#xA;    This appears in the long run to be potentially bad for privacy, and it’s exactly why I strongly believe E2EE should be kept out of the core social layer &amp; kept within dedicated tools instead. If people want to hide themselves, they have many options - third party clients, applications, and tools - as they have always had the ability and right to do/ use. It is not the operators responsibility to provide their users the ability to hide. Don&#39;t know how to encrypt your own messages? Talk on Signal. Mastodon is a public space, take your private conversation elsewhere. Don&#39;t forget, people were writing encrypted messages by hand before computers.&#xA;&#xA;   The cost outweighs the benefit. Please, make the sane decision, don&#39;t over complicate the backend and keep the public social layer unencrypted. Mastodon is a public space, use purpose built tools like Signal for your private conversations.&#xA;&#xA;---&#xA;&#xA;  P.S. You do not need E2EE everywhere. If you indiscriminately E2EE with everyone across your personal, business, and social life, then a single impersonation can spread everywhere. At that point, the question becomes: how do you prove an imposter is not you?&#xA;&#xA;---&#xA;&#xA;    Yes, at the moment these are optional features, but we ultimately teach our users unsafe and unsanitary practices by telling them it is alright to shit where they eat. Once it is the social norm, even if optional, it will be hard to offer a service that doesn&#39;t let users shit where they eat. In the long run this idea appears horrible. As the user, why are you putting the burden of your secrecy on the operator? As the operator, what will you do when users start placing the burden of their secrecy on you?&#xA;&#xA;Source: https://socialwebfoundation.org/2025/12/19/implementing-encrypted-messaging-over-activitypub/&#xA;&#xA;---&#xA;&#xA;    Update: Was informed of and removed mention of GPG as it is insecure, that same friend just provided this article as well, it is a wonderful read, and I will be updating this piece accordingly:&#xA;&#xA;https://www.lvh.io/posts/the-pgp-problem/&#xA;&#xA;    Second Update: Removed this following section and updated due to old/ misinformation -&#xA;&#xA;  If you want to send encrypted messages anywhere, regardless of service, you could do-it-yourself by using PGP&#39;s key generation &amp; message encryption/ decryption capabilities, alongside something like openBSD&#39;s Signify for signing and verification. There is also terminology like key rotation and key recovery but these over-complicate things for a simple chat between known associates.&#xA;&#xA;  Trade public keys, treat private-key leaks as full identity compromise, and keep circles small to foster high-trust networks.]]&gt;</description>
      <content:encoded><![CDATA[<p>The Social Web Foundation Adds End-to-End-Encryption to Mastodon and Why This Is Probably Not a Great Idea</p>

<hr>

<p>    As gregarious as people are, they also love their privacy. Eavesdropping, reading over the shoulder, going through personal affects? Everyone can agree, it is egregious behavior when your privacy is violated, even when justified. Thusly, it is in one&#39;s nature – innocent or otherwise – to engage in the right of privacy. What people do not have the right to, is to demand provision of this privacy from external sources. Historically, you learn to wear your own mask, to bury your own secrets.</p>

<p>    Simultaneously, we continue to see that people are contrarian. As much as the people love their anonymity, they equally love their identity, expressing themselves in both private and public spaces such as bars, clubs, boardwalks, or even Social Networking Services (SNS) like Mastodon. Within these spaces people hold a reasonable expectation to both privacy and respect, i.e. not to be harassed, mocked, doxxed, stalked, have their personal space, or likeness violated, etc. Unfortunately, this cannot always be guaranteed in public or even in private spaces, leading us to the necessity of moderation, which we will touch on later.</p>

<p>    Considering these facts, you are likely to enjoy the idea of secure and private conversations with your associates. If this is the case, you are probably looking for a service that offers End-to-End-Encryption (E2EE). There are many services to choose from, some more secure than others. Whatsapp for example offers convenient but highly insecure E2EE, while Signal Messenger offers a less convenient, but more secure implementation.</p>

<hr>

<p>    E2EE explained simply is when everyone has two keys and a signature. You generate these keys, one public, one private, then start trading public keys and signatures with known associates. When you send a message to anyone, it will be encrypted using their public key &amp; decrypted only by their private key. Your message stays secure in transit. Seal that letter with your signature we mentioned and you&#39;ve proven yourself as the origin, avoiding impersonation.</p>

<blockquote><p>Note: E2EE doesn’t stop the network from seeing who talks to who, when, or how often – “privacy” is leaky even if message content is encrypted.</p></blockquote>

<p>    Many individuals – including myself – have recommended using PGP&#39;s key generation, signing &amp; message encryption/ decryption capabilities to send encrypted messages “anywhere”... this is less than ideal in 2026. The author of <a href="https://www.lvh.io/posts/the-pgp-problem/" rel="nofollow">The PGP Problem</a> – lvh – stated that if you want to talk,</p>

<blockquote><p>Use Signal. Or Wire, or WhatsApp, or some other Signal-protocol-based secure messenger.</p>

<p>Modern secure messengers are purpose-built around messaging. They use privacy-preserving authentication handshakes, repudiable messages, cryptographic ratchets that rekey on every message exchange, and, of course, modern encryption primitives. Messengers are trivially easy to use and there’s no fussing over keys and subkeys. If you use Signal, you get even more than that: you get a system so paranoid about keeping private metadata off servers that it tunnels Giphy searches to avoid traffic analysis attacks, and until relatively recently didn’t even support user profiles.</p></blockquote>

<p>    As for email?</p>

<blockquote><p>Don&#39;t.</p></blockquote>

<hr>

<p>    Now that we have explained what E2EE is, &#39;The PGP Problem&#39;, and the use of dedicated tools, let us take a look at this – From the Social Web Foundation, Implementing Encrypted Messaging over ActivityPub:</p>

<blockquote><p>“Encrypted messaging has become a common feature on many social networks since ActivityPub was created, and its lack has inhibited Social Web adoption and public trust in the network.”</p></blockquote>

<p>    Do you genuinely believe the lack of E2EE is keeping the masses at bay? The grandmas and grandpas who just want to message their grandchildren? The mothers who just want to know when the next soccer meet is? I assure you, not a single “normie” is worried about E2EE unless they have swallowed marketing material. Perceived low conversion rates are because these people are literally addicted to their dopamine apps. The “Social Web” is fundamentally not Facebook, that is what you&#39;re observing.</p>

<hr>

<p>    Everyone has some expectation of privacy, particularly in regards to federated SNS. Many users are tired of service providers like Facebook “harvesting their data points for actionable business insights” leading them to options that provide a semblance of self agency and sovereignty. On one hand, these services do not traditionally track users, on the other hand, ActivityProtocol (AP) is running behind the scenes as the language of many of your favorite services, i.e. Mastodon. This type of protocol and the way it behaves is referred to as a broadcast protocol. Everyone, everywhere can see you and what you do, who you talk to, and when.</p>

<p>    This is especially true when the other server is not fully respecting the protocol, when disrespected, “private” accounts and posts requiring follower approval may not be entirely private. This can lead to confusion and anger between users and operators for being followed by people who shouldn&#39;t have access, bots, or tracking services, each of which are disrespecting wishes, consent, or the protocol.</p>

<p>    Because of these quirks, there are some nuanced avenues for harassment I will not outline here. Actively processing, investigating, and remediating the deluge of reports in the attempt to promptly moderate against rule breakers, abuse, harassment, exploitation, scams, etc. is already a Herculean and Sisyphean task. Due to abuse by both network users and operators, there are now regulations around the world regarding data retention or lack thereof, along with legal obligations and potential demand.</p>

<hr>

<p>    Everything so far leads the question with E2EE &amp; SNS to quickly become: How do we deploy this at scale, without breaking moderation, without confusing users, &amp; without inviting legal or security failure?</p>

<p>     If an operator offers E2EE on an SNS like Mastodon – due to the nature of the protocol being comparable to a public space – suddenly we see the landscape become exponentially difficult, if not impossible to moderate. Operators will place themselves into the unfortunate position where they cannot properly serve and protect their users, or their legal obligations. Additionally, if you offer a secure service and it is not secure or your implementation is bad, what will you do if a litigious troll attempts to sue?</p>

<p>    To introduce E2EE into public‑facing SNS while simultaneously trying to “solve” abuse, moderation, &amp; legal exposure, the path of least resistance is likely to be “just verify everyone”, pushing identity‑linked, KYC‑style identity checks as a way to “anchor” trust &amp; accountability. The loudest users and largest operators may start demanding identity verification to ease this friction.</p>

<hr>

<p>    This appears in the long run to be potentially bad for privacy, and it’s exactly why I strongly believe E2EE should be kept out of the core social layer &amp; kept within dedicated tools instead. If people want to hide themselves, they have many options – third party clients, applications, and tools – as they have always had the ability and right to do/ use. It is not the operators responsibility to provide their users the ability to hide. Don&#39;t know how to encrypt your own messages? Talk on Signal. Mastodon is a public space, take your private conversation elsewhere. Don&#39;t forget, people were writing encrypted messages by hand before computers.</p>

<p>   The cost outweighs the benefit. Please, make the sane decision, don&#39;t over complicate the backend and keep the public social layer unencrypted. Mastodon is a public space, use purpose built tools like Signal for your private conversations.</p>

<hr>

<blockquote><p>P.S. You do not need E2EE everywhere. If you indiscriminately E2EE with everyone across your personal, business, and social life, then a single impersonation can spread everywhere. At that point, the question becomes: how do you prove an imposter is not you?</p></blockquote>

<hr>

<p>    Yes, at the moment these are optional features, but we ultimately teach our users unsafe and unsanitary practices by telling them it is alright to shit where they eat. Once it is the social norm, even if optional, it will be hard to offer a service that doesn&#39;t let users shit where they eat. In the long run this idea appears horrible. As the user, why are you putting the burden of your secrecy on the operator? As the operator, what will you do when users start placing the burden of their secrecy on you?</p>

<p>Source: <a href="https://socialwebfoundation.org/2025/12/19/implementing-encrypted-messaging-over-activitypub/" rel="nofollow">https://socialwebfoundation.org/2025/12/19/implementing-encrypted-messaging-over-activitypub/</a></p>

<hr>

<p>    Update: Was informed of and removed mention of GPG as it is insecure, that same friend just provided this article as well, it is a wonderful read, and I will be updating this piece accordingly:</p>

<p><a href="https://www.lvh.io/posts/the-pgp-problem/" rel="nofollow">https://www.lvh.io/posts/the-pgp-problem/</a></p>

<p>    Second Update: Removed this following section and updated due to old/ misinformation -</p>

<blockquote><p>   If you want to send encrypted messages anywhere, regardless of service, you could do-it-yourself by using PGP&#39;s key generation &amp; message encryption/ decryption capabilities, alongside something like openBSD&#39;s Signify for signing and verification. There is also terminology like key rotation and key recovery but these over-complicate things for a simple chat between known associates.</p>

<p>   Trade public keys, treat private-key leaks as full identity compromise, and keep circles small to foster high-trust networks.</p></blockquote>
]]></content:encoded>
      <guid>https://pen.waltuh.cyou/autumn/the-social-web-foundation-adds-end-to-end-encryption-to-mastodon-and-why-this</guid>
      <pubDate>Tue, 14 Apr 2026 20:59:00 +0000</pubDate>
    </item>
    <item>
      <title>Written: April 25, 2024</title>
      <link>https://pen.waltuh.cyou/autumn/the-paradox-of-ownership-in-the-digital-age</link>
      <description>&lt;![CDATA[Written: April 25, 2024&#xA;Published: March 11, 2026&#xA;&#xA;The Paradox of Ownership in the Digital Age:&#xA; How DMCA and DRM Limit Access and Undermine Preservation Efforts&#xA;&#xA; The digital age has ushered in a revolution in how we access and interact with information and culture. E-books, streaming services, and online libraries offer a seemingly boundless collection of knowledge and creative works at our fingertips. However, the concept of ownership in this new landscape remains shrouded in ambiguity. This essay explores how the Digital Millennium Copyright Act (DMCA) and Digital Rights Management (DRM) technologies, intended to protect copyright, create a system where consumers have limited control over their digital purchases. These limitations hinder fair use, restrict access for institutions like libraries and archives, and ultimately raise fundamental questions about true ownership in the digital age.&#xA;&#xA; Librarians and archivists stand as the guardians of cultural heritage, ensuring future generations have access to the knowledge and creative output of the past. However, the DMCA throws a wrench into their efforts. The act restricts activities like copying and sharing for educational purposes, which are crucial for libraries fulfilling their mission of disseminating information and fostering creativity. As highlighted by McDermott (2012), &#34;complex copyright laws and a misunderstanding of fair use threaten libraries&#39; ability to fulfill their mission of providing information access and fostering creativity&#34;.  Librarians often rely on fair use to share excerpts of copyrighted works for educational purposes, create digital copies for long-term preservation, or offer interlibrary loan services. The DMCA&#39;s restrictions on these activities create a chilling effect, hindering innovation and jeopardizing the long-term accessibility of knowledge.&#xA;&#xA; Imagine a scenario where a library owns a physical copy of a book out of print but still protected by copyright. Under the DMCA, the library may be unable to scan and offer a digital copy, even though this could significantly increase accessibility for patrons.  This situation exemplifies the tension between copyright protection and the public&#39;s right to access information.  Furthermore, the DMCA&#39;s limitations can restrict libraries from archiving digital materials altogether.  A library may be hesitant to acquire e-books due to concerns about the long-term accessibility of the content, potentially impacting user access to valuable resources.&#xA;&#xA; The DMCA&#39;s impact extends beyond access limitations. The act fosters a culture of fear and uncertainty surrounding fair use. Libraries may be reluctant to engage in activities deemed potentially infringing due to the threat of costly litigation; hindering innovation and libraries&#39; ability to effectively serve their communities in this digital age.&#xA;&#xA; The limitations imposed by the DMCA are further compounded by Digital Rights Management (DRM) technologies. DRM software encrypts content and restricts how users can access and utilize their digital purchases. While DRM serves the purpose of protecting copyrighted material from unauthorized copying and distribution, it also undermines the very notion of ownership in the digital sphere. When consumers purchase an e-book or song, they are essentially buying a license to access the work under certain conditions, not the work itself.&#xA;&#xA; Scharf (2010) aptly argues that DRM &#34;prioritizes control over user rights&#34;. This translates to limited user control over digital purchases. Imagine purchasing a digital book that you cannot lend to a friend or critically analyze online due to DRM restrictions. This scenario exemplifies how the current system prioritizes control by copyright holders over user rights. Furthermore, the ever-evolving nature of DRM software raises concerns about its long-term compatibility. The potential obsolescence of DRM could render previously purchased content inaccessible in the future, effectively negating any sense of ownership.&#xA;&#xA; Scharf (2010) further emphasizes the complex relationship between fair use and DRM. &#34;Any attempt to encapsulate fair use provisions within DRM would have drawbacks for both right holders and users...&#34; (p. 182). This quote highlights the inherent tension that exists between user rights and copyright holder control. Striking a balance between the two will be critical in moving forward.&#xA;&#xA; The limitations of DMCA and DRM extend beyond immediate user experience and have a profound impact on long-term preservation efforts. Libraries and archives face significant challenges in preserving digital content due to these restrictions. As Gasaway (2007) points out, &#34;current limitations on copying and distribution don&#39;t translate well to digital media&#34;.&#xA;&#xA; Unlike physical books, digital files can become inaccessible over time due to changes in file formats or software incompatibility. This presents a significant hurdle for long-term preservation. The focus on &#34;preservation-only&#34; exceptions with restricted access, as discussed in the article by Gasaway (2007), creates a paradox. Restricted access undermines the core purpose of preservation, which is to ensure future generations can access the information. One quote from the article emphasizes this concern: &#34;One question is whether any user should have access to preservation only-copies. In fact, one could argue that the copy is no longer for preservation only if access is being granted to users&#34; (Gasaway, 2007). This quote confirms the concern that restricted access to preserved works challenges the true purpose of preservation, which is to ensure future access. Additionally, the ever-evolving nature of digital formats and technology poses a challenge for long-term preservation.&#xA;&#xA; While the limitations of current copyright law and DRM pose significant challenges, emerging technologies like blockchain offer a potential solution for securing ownership of digital assets. Blockchain technology utilizes a distributed ledger system, where data is recorded across a network of computers. This creates an immutable record of ownership that is transparent and tamper-proof. Bodó et al. (2018) discusses the potential of blockchain for copyright protection, arguing that “Distributed ledgers are a general-purpose technology, meaning that they are freely configurable to any and every application. In theory, this makes it relatively easy to correspond the core building blocks of blockchain technology to fundamental concepts in copyright law.” (p.314). This further exemplifies how blockchain technology could potentially be a powerful tool for enforcing intellectual property rights through distributed ledgers.&#xA;&#xA; In theory, blockchain could be used to track ownership of digital content, ensuring creators receive appropriate compensation for their work. Additionally, blockchain could potentially facilitate secure access control for libraries and archives, allowing them to preserve digital materials while ensuring copyright compliance. However, it is important to acknowledge the limitations of blockchain technology in the context of digital preservation.&#xA;&#xA; Firstly, blockchain itself cannot store copious amounts of data efficiently. While ownership records could be stored on the blockchain, the actual content would likely need to be stored elsewhere. This raises questions about long-term accessibility and potential compatibility issues between storage solutions and future technologies. Secondly, integrating existing copyright laws with blockchain technology presents a complex challenge.&#xA;&#xA; Despite these limitations, blockchain offers a promising avenue for exploring new models of digital ownership and preservation. As Bodó et al. (2018) concludes, &#34; Still, should blockchain technology reach its market potential, it may have significant—perhaps transformative—impact on copyright in the digital environment. &#34; (p. 336). Collaboration between stakeholders – including content creators, copyright holders, technology companies, and libraries – will be crucial in determining how best to leverage blockchain for a more balanced digital ecosystem.&#xA;&#xA; The issue of digital ownership becomes even more complex when considering piracy. While piracy undoubtedly has negative consequences, the article by Kim et al. (2018) introduces a thought-provoking concept: the &#34;invisible hand&#34; of piracy. The authors argue that &#34;When information goods are sold to consumers via a retailer, in certain situations, a moderate level of piracy seems to have a surprising positive impact on the profits of the manufacturer and the retailer while, at the same time, enhancing consumer welfare.&#34; (Kim et al., 2018, pp. 1117). They explain how piracy can act as a &#34;shadow competitor,&#34; forcing manufacturers and retailers to lower prices or improve accessibility, potentially leading to a more efficient supply chain (Kim et al., 2018). This challenges the current legal framework and traditional views on ownership of digital goods. The concept of &#34;owning&#34; digital media becomes blurry when copying is near-effortless. Piracy can be seen as a symptom of a broken market, where consumers resort to piracy due to limited access or inflated costs. Perhaps a more nuanced approach to piracy is needed, considering the potential benefits and drawbacks in specific situations.&#xA;&#xA; In conclusion, the DMCA and DRM, while intended to protect copyright, create a system that undermines the concept of true ownership in the digital age.  Consumers have limited control over their purchases, fair use is restricted, and long-term preservation of digital materials is hindered. Librarians and archivists, who play a crucial role in safeguarding cultural heritage, are particularly impacted by these limitations.&#xA;&#xA; Moving forward, a more balanced approach is necessary, one that respects copyright while ensuring fair use rights, promoting open access, and facilitating long-term preservation of our digital heritage. This could involve a few avenues:&#xA; • Revising DMCA exemptions for libraries and archives: Expanding exemptions to allow libraries to create digital copies for preservation purposes and offer interlibrary loan services for digital materials.&#xA;&#xA; • Exploring alternative preservation strategies: Investigating the potential of blockchain technology for secure ownership records while exploring complementary strategies for content preservation outside the blockchain ecosystem.&#xA;&#xA; • Encouraging collaboration between content creators, copyright holders, technology companies, and user groups to develop new models that prioritize both ownership and accessibility. This could involve exploring innovative licensing models that offer more user control and exploring new revenue streams for content creators in the digital age.&#xA;&#xA; • Re-evaluating the role of piracy: Considering the potential benefits and drawbacks of piracy in specific contexts and exploring strategies to address the underlying issues that lead to piracy, such as limited access or high costs.&#xA;&#xA;&#x9;By addressing these challenges, we can move towards a digital ecosystem that fosters creativity, ensures long-term access to information, and respects the rights of both creators and consumers.  A system that strikes a balance between copyright protection and fair use is essential for a healthy digital environment where knowledge and culture can continue to thrive.&#xA;&#xA;Some additional considerations we can take with us moving forward:&#xA; • Educating users about copyright law, fair use rights, and responsible digital citizenship can help foster a more balanced environment. Libraries and educational institutions can play a crucial role in these efforts.&#xA;&#xA; • Developing open access models that will facilitate open access initiatives that ensure the public has access to scholarly research and cultural heritage materials helping to democratize access to knowledge and encourage innovation.&#xA;&#xA; • Investing in robust and secure digital storage solutions for long-term preservation of digital materials. Collaboration between government agencies, libraries, and technology companies will be key in achieving these goals.&#xA;&#xA; Ultimately, the question of ownership in the digital age is a complex one with no easy answers.  However, by fostering dialogue, exploring innovative solutions, and prioritizing both access and creator rights, we can create a more equitable and sustainable digital future.&#xA;&#xA; Capitalists: ...&#34;You will own nothing and you will be happy.&#34;&#xA; Everyone else: ...&#34;Stand up me hearties, yo ho!&#34;&#xA;&#xA;Reference List&#xA;&#xA;Bodó, A., et al. (2018). Copyright in the Blockchain Era: Enforcing Intellectual Property Rights Through Distributed Ledgers. Journal of Intellectual Property Law &amp; Practice, 13(8), 741-750.&#xA;&#xA;Gasaway, L. (2007). Digital Millennium Copyright Act and Library Preservation: A Paradox of Access and Control. Library Resources &amp; Technical Services, 51(4), 1329-1337.&#xA;&#xA;Kim, J., et al. (2018). The Invisible Hand of Piracy: How Moderate Levels of Piracy Can Benefit Businesses and Consumers. Journal of Marketing Research, 55(5), 1112-1132.&#xA;&#xA;McDermott, S. (2012). The Chilling Effects of Copyright Law on Libraries and Archives. D-Lib Magazine, 18(5/6), 1-10.&#xA;&#xA;Scharf, M. B. (2010). Fair Use in a Digital World: The Future of User Rights in the Information Society. Duke Law Journal, 60(2), 181-238.]]&gt;</description>
      <content:encoded><![CDATA[<p>Written: April 25, 2024
Published: March 11, 2026</p>

<p>The Paradox of Ownership in the Digital Age:
 How DMCA and DRM Limit Access and Undermine Preservation Efforts</p>

<p> The digital age has ushered in a revolution in how we access and interact with information and culture. E-books, streaming services, and online libraries offer a seemingly boundless collection of knowledge and creative works at our fingertips. However, the concept of ownership in this new landscape remains shrouded in ambiguity. This essay explores how the Digital Millennium Copyright Act (DMCA) and Digital Rights Management (DRM) technologies, intended to protect copyright, create a system where consumers have limited control over their digital purchases. These limitations hinder fair use, restrict access for institutions like libraries and archives, and ultimately raise fundamental questions about true ownership in the digital age.</p>

<p> Librarians and archivists stand as the guardians of cultural heritage, ensuring future generations have access to the knowledge and creative output of the past. However, the DMCA throws a wrench into their efforts. The act restricts activities like copying and sharing for educational purposes, which are crucial for libraries fulfilling their mission of disseminating information and fostering creativity. As highlighted by McDermott (2012), “complex copyright laws and a misunderstanding of fair use threaten libraries&#39; ability to fulfill their mission of providing information access and fostering creativity”.  Librarians often rely on fair use to share excerpts of copyrighted works for educational purposes, create digital copies for long-term preservation, or offer interlibrary loan services. The DMCA&#39;s restrictions on these activities create a chilling effect, hindering innovation and jeopardizing the long-term accessibility of knowledge.</p>

<p> Imagine a scenario where a library owns a physical copy of a book out of print but still protected by copyright. Under the DMCA, the library may be unable to scan and offer a digital copy, even though this could significantly increase accessibility for patrons.  This situation exemplifies the tension between copyright protection and the public&#39;s right to access information.  Furthermore, the DMCA&#39;s limitations can restrict libraries from archiving digital materials altogether.  A library may be hesitant to acquire e-books due to concerns about the long-term accessibility of the content, potentially impacting user access to valuable resources.</p>

<p> The DMCA&#39;s impact extends beyond access limitations. The act fosters a culture of fear and uncertainty surrounding fair use. Libraries may be reluctant to engage in activities deemed potentially infringing due to the threat of costly litigation; hindering innovation and libraries&#39; ability to effectively serve their communities in this digital age.</p>

<p> The limitations imposed by the DMCA are further compounded by Digital Rights Management (DRM) technologies. DRM software encrypts content and restricts how users can access and utilize their digital purchases. While DRM serves the purpose of protecting copyrighted material from unauthorized copying and distribution, it also undermines the very notion of ownership in the digital sphere. When consumers purchase an e-book or song, they are essentially buying a license to access the work under certain conditions, not the work itself.</p>

<p> Scharf (2010) aptly argues that DRM “prioritizes control over user rights”. This translates to limited user control over digital purchases. Imagine purchasing a digital book that you cannot lend to a friend or critically analyze online due to DRM restrictions. This scenario exemplifies how the current system prioritizes control by copyright holders over user rights. Furthermore, the ever-evolving nature of DRM software raises concerns about its long-term compatibility. The potential obsolescence of DRM could render previously purchased content inaccessible in the future, effectively negating any sense of ownership.</p>

<p> Scharf (2010) further emphasizes the complex relationship between fair use and DRM. “Any attempt to encapsulate fair use provisions within DRM would have drawbacks for both right holders and users...” (p. 182). This quote highlights the inherent tension that exists between user rights and copyright holder control. Striking a balance between the two will be critical in moving forward.</p>

<p> The limitations of DMCA and DRM extend beyond immediate user experience and have a profound impact on long-term preservation efforts. Libraries and archives face significant challenges in preserving digital content due to these restrictions. As Gasaway (2007) points out, “current limitations on copying and distribution don&#39;t translate well to digital media”.</p>

<p> Unlike physical books, digital files can become inaccessible over time due to changes in file formats or software incompatibility. This presents a significant hurdle for long-term preservation. The focus on “preservation-only” exceptions with restricted access, as discussed in the article by Gasaway (2007), creates a paradox. Restricted access undermines the core purpose of preservation, which is to ensure future generations can access the information. One quote from the article emphasizes this concern: “One question is whether any user should have access to preservation only-copies. In fact, one could argue that the copy is no longer for preservation only if access is being granted to users” (Gasaway, 2007). This quote confirms the concern that restricted access to preserved works challenges the true purpose of preservation, which is to ensure future access. Additionally, the ever-evolving nature of digital formats and technology poses a challenge for long-term preservation.</p>

<p> While the limitations of current copyright law and DRM pose significant challenges, emerging technologies like blockchain offer a potential solution for securing ownership of digital assets. Blockchain technology utilizes a distributed ledger system, where data is recorded across a network of computers. This creates an immutable record of ownership that is transparent and tamper-proof. Bodó et al. (2018) discusses the potential of blockchain for copyright protection, arguing that “Distributed ledgers are a general-purpose technology, meaning that they are freely configurable to any and every application. In theory, this makes it relatively easy to correspond the core building blocks of blockchain technology to fundamental concepts in copyright law.” (p.314). This further exemplifies how blockchain technology could potentially be a powerful tool for enforcing intellectual property rights through distributed ledgers.</p>

<p> In theory, blockchain could be used to track ownership of digital content, ensuring creators receive appropriate compensation for their work. Additionally, blockchain could potentially facilitate secure access control for libraries and archives, allowing them to preserve digital materials while ensuring copyright compliance. However, it is important to acknowledge the limitations of blockchain technology in the context of digital preservation.</p>

<p> Firstly, blockchain itself cannot store copious amounts of data efficiently. While ownership records could be stored on the blockchain, the actual content would likely need to be stored elsewhere. This raises questions about long-term accessibility and potential compatibility issues between storage solutions and future technologies. Secondly, integrating existing copyright laws with blockchain technology presents a complex challenge.</p>

<p> Despite these limitations, blockchain offers a promising avenue for exploring new models of digital ownership and preservation. As Bodó et al. (2018) concludes, “ Still, should blockchain technology reach its market potential, it may have significant—perhaps transformative—impact on copyright in the digital environment. ” (p. 336). Collaboration between stakeholders – including content creators, copyright holders, technology companies, and libraries – will be crucial in determining how best to leverage blockchain for a more balanced digital ecosystem.</p>

<p> The issue of digital ownership becomes even more complex when considering piracy. While piracy undoubtedly has negative consequences, the article by Kim et al. (2018) introduces a thought-provoking concept: the “invisible hand” of piracy. The authors argue that “When information goods are sold to consumers via a retailer, in certain situations, a moderate level of piracy seems to have a surprising positive impact on the profits of the manufacturer and the retailer while, at the same time, enhancing consumer welfare.” (Kim et al., 2018, pp. 1117). They explain how piracy can act as a “shadow competitor,” forcing manufacturers and retailers to lower prices or improve accessibility, potentially leading to a more efficient supply chain (Kim et al., 2018). This challenges the current legal framework and traditional views on ownership of digital goods. The concept of “owning” digital media becomes blurry when copying is near-effortless. Piracy can be seen as a symptom of a broken market, where consumers resort to piracy due to limited access or inflated costs. Perhaps a more nuanced approach to piracy is needed, considering the potential benefits and drawbacks in specific situations.</p>

<p> In conclusion, the DMCA and DRM, while intended to protect copyright, create a system that undermines the concept of true ownership in the digital age.  Consumers have limited control over their purchases, fair use is restricted, and long-term preservation of digital materials is hindered. Librarians and archivists, who play a crucial role in safeguarding cultural heritage, are particularly impacted by these limitations.</p>

<p> Moving forward, a more balanced approach is necessary, one that respects copyright while ensuring fair use rights, promoting open access, and facilitating long-term preservation of our digital heritage. This could involve a few avenues:
 • Revising DMCA exemptions for libraries and archives: Expanding exemptions to allow libraries to create digital copies for preservation purposes and offer interlibrary loan services for digital materials.</p>

<p> • Exploring alternative preservation strategies: Investigating the potential of blockchain technology for secure ownership records while exploring complementary strategies for content preservation outside the blockchain ecosystem.</p>

<p> • Encouraging collaboration between content creators, copyright holders, technology companies, and user groups to develop new models that prioritize both ownership and accessibility. This could involve exploring innovative licensing models that offer more user control and exploring new revenue streams for content creators in the digital age.</p>

<p> • Re-evaluating the role of piracy: Considering the potential benefits and drawbacks of piracy in specific contexts and exploring strategies to address the underlying issues that lead to piracy, such as limited access or high costs.</p>

<p>    By addressing these challenges, we can move towards a digital ecosystem that fosters creativity, ensures long-term access to information, and respects the rights of both creators and consumers.  A system that strikes a balance between copyright protection and fair use is essential for a healthy digital environment where knowledge and culture can continue to thrive.</p>

<p>Some additional considerations we can take with us moving forward:
 • Educating users about copyright law, fair use rights, and responsible digital citizenship can help foster a more balanced environment. Libraries and educational institutions can play a crucial role in these efforts.</p>

<p> • Developing open access models that will facilitate open access initiatives that ensure the public has access to scholarly research and cultural heritage materials helping to democratize access to knowledge and encourage innovation.</p>

<p> • Investing in robust and secure digital storage solutions for long-term preservation of digital materials. Collaboration between government agencies, libraries, and technology companies will be key in achieving these goals.</p>

<p> Ultimately, the question of ownership in the digital age is a complex one with no easy answers.  However, by fostering dialogue, exploring innovative solutions, and prioritizing both access and creator rights, we can create a more equitable and sustainable digital future.</p>

<p> Capitalists: ...“You will own nothing and you will be happy.”
 Everyone else: ...“Stand up me hearties, yo ho!”</p>

<p>Reference List</p>

<p>Bodó, A., et al. (2018). Copyright in the Blockchain Era: Enforcing Intellectual Property Rights Through Distributed Ledgers. Journal of Intellectual Property Law &amp; Practice, 13(8), 741-750.</p>

<p>Gasaway, L. (2007). Digital Millennium Copyright Act and Library Preservation: A Paradox of Access and Control. Library Resources &amp; Technical Services, 51(4), 1329-1337.</p>

<p>Kim, J., et al. (2018). The Invisible Hand of Piracy: How Moderate Levels of Piracy Can Benefit Businesses and Consumers. Journal of Marketing Research, 55(5), 1112-1132.</p>

<p>McDermott, S. (2012). The Chilling Effects of Copyright Law on Libraries and Archives. D-Lib Magazine, 18(5/6), 1-10.</p>

<p>Scharf, M. B. (2010). Fair Use in a Digital World: The Future of User Rights in the Information Society. Duke Law Journal, 60(2), 181-238.</p>
]]></content:encoded>
      <guid>https://pen.waltuh.cyou/autumn/the-paradox-of-ownership-in-the-digital-age</guid>
      <pubDate>Wed, 11 Mar 2026 20:21:11 +0000</pubDate>
    </item>
    <item>
      <title>Installation guide for DEBIAN 13 &#39;Trixie&#39;, Wayland, x11, &amp; nvidia:</title>
      <link>https://pen.waltuh.cyou/autumn/installation-guide-for-debian-13-trixie-wayland-x11-and-nvidia</link>
      <description>&lt;![CDATA[Installation guide for DEBIAN 13 &#39;Trixie&#39;, Wayland, x11, &amp; nvidia:&#xA;&#xA;(tip: run commands as root with &#xA;Step 1. Add contrib &amp; non-free in /etc/apt/sources.list&#xA;&#xA;deb http://deb.debian.org/debian/ trixie main contrib non-free non-free-firmware&#xA;&#xA;deb http://security.debian.org/debian-security/ trixie-security contrib non-free main non-free-firmware&#xA;&#xA;...and often also for -updates:&#xA;&#xA;deb http://deb.debian.org/debian/ trixie-updates non-free-firmware non-free contrib main&#xA;&#xA;---&#xA;  Example of modified sources.list:&#xA;&#xA;deb cdrom:[Debian GNU/Linux 13.3.0 Trixie - Official amd64 DVD Binary-1 with firmware 20260110-11:00]/ trixie contrib main non-free-firmware&#xA;&#xA;deb http://deb.debian.org/debian/ trixie main contrib non-free non-free-firmware&#xA;deb-src http://deb.debian.org/debian/ trixie main contrib non-free non-free-firmware&#xA;&#xA;deb http://security.debian.org/debian-security/ trixie-security contrib non-free main non-free-firmware&#xA;deb-src http://security.debian.org/debian-security trixie-security contrib non-free main non-free-firmware&#xA;&#xA;trixie-updates, to get updates before a point release is made;&#xA;# see https://www.debian.org/doc/manuals/debian-reference/ch02.en.html#updatesandbackports&#xA;deb http://deb.debian.org/debian/ trixie-updates non-free-firmware non-free contrib main&#xA;deb-src http://deb.debian.org/debian/ trixie-updates non-free-firmware non-free contrib main&#xA;&#xA;This system was installed using removable media other than&#xA;CD/DVD/BD (e.g. USB stick, SD card, ISO image file).&#xA;The matching &#34;deb cdrom&#34; entries were disabled at the end&#xA;of the installation process.&#xA;For information about how to configure apt package sources,&#xA;see the sources.list(5) manual.&#xA;&#xA;---&#xA;Step 2. &#xA;Step 3. &#xA;Step 4. &#xA;Step 5. &#xA;Step 6. when prompted, enter a password&#xA;&#xA;Step 7. &#xA;Step 8. On boot there will be a prompt to enroll the MOK, select yes; when asked, enter the password from step 6&#xA;&#xA;Step 9. Enter TTY with CTRL+ALT+F3, enter username, password, &#xA;(Tip: generally you may select x11 environment in the bottom left corner of the login screen if you want a graphical interface/ get stuck)&#xA;&#xA;Step 10. Add &#xA;---&#xA;  Example of modified grub file:&#xA;&#xA;If you change this file or any /etc/default/grub.d/*.cfg file,&#xA;run &#39;update-grub&#39; afterwards to update /boot/grub/grub.cfg.&#xA;For full documentation of the options in these files, see:&#xA;info -f grub -n &#39;Simple configuration&#39;&#xA;GRUBDEFAULT=0&#xA;GRUBTIMEOUT=5&#xA;GRUBDISTRIBUTOR=( . /etc/os-release &amp;&amp; echo ${NAME} )&#xA;GRUBCMDLINELINUXDEFAULT=&#34;nvidiadrm.modeset=1 nvidia-drm.fbdev=1 quiet&#34;&#xA;GRUBCMDLINELINUX=&#34;&#34;&#xA;&#xA;If your computer has multiple operating systems installed, then you&#xA;probably want to run os-prober. However, if your computer is a host&#xA;for guest OSes installed via LVM or raw disk devices, running&#xA;os-prober can cause damage to those guest OSes as it mounts&#xA;filesystems to look for things.&#xA;GRUBDISABLEOSPROBER=false&#xA;&#xA;Uncomment to enable BadRAM filtering, modify to suit your needs&#xA;This works with Linux (no patch required) and with any kernel that obtains&#xA;the memory map information from GRUB (GNU Mach, kernel of FreeBSD ...)&#xA;GRUBBADRAM=&#34;0x01234567,0xfefefefe,0x89abcdef,0xefefefef&#34;&#xA;&#xA;Uncomment to disable graphical terminal&#xA;GRUBTERMINAL=console&#xA;&#xA;The resolution used on graphical terminal&#xA;note that you can use only modes which your graphic card supports via VBE/GOP/UGA&#xA;you can see them in real GRUB with the command `videoinfo&#39;&#xA;GRUBGFXMODE=640x480&#xA;&#xA;Uncomment if you don&#39;t want GRUB to pass &#34;root=UUID=xxx&#34; parameter to Linux&#xA;GRUBDISABLELINUXUUID=true&#xA;&#xA;Uncomment to disable generation of recovery mode menu entries&#xA;GRUBDISABLERECOVERY=&#34;true&#34;&#xA;&#xA;Uncomment to get a beep at grub start&#xA;GRUBINITTUNE=&#34;480 440 1&#34;&#xA;&#xA;---&#xA;Step 11. within home/username create the hidden directory .nvtmp&#xA;&#xA;Step 12. set module options for the nvidia module variable at &#xA;&#xA;---&#xA;  Example of modified nvidia-options.conf file:&#xA;&#xA;options nvidia-current NVregDeviceFileUID=0 NVregDeviceFileGID=44 NVregDeviceFileMode=0660&#xA;&#xA;To grant performance counter access to unprivileged users, uncomment the following line:&#xA;options nvidia-current NVregRestrictProfilingToAdminUsers=0&#xA;&#xA;Uncomment to enable this power management feature:&#xA;options nvidia-current NVregPreserveVideoMemoryAllocations=1 NVregTemporaryFilePath=~/.nvtmp&#xA;&#xA;Uncomment to enable this power management feature:&#xA;options nvidia-current NVregEnableS0ixPowerManagement=1&#xA;&#xA;Step 13. add your modules to the initramfs by editing &#xA;add&#xA;&#xA;---&#xA;  Example of modified nvidia-options.conf file:&#xA;&#xA;List of modules that you want to include in your initramfs.&#xA;They will be loaded at boot time in the order below.&#xA;&#xA;Syntax:  modulename [args ...]&#xA;&#xA;You must run update-initramfs(8) to effect this change.&#xA;&#xA;Examples:&#xA;&#xA;raid1&#xA;sdmod&#xA;crc32c&#xA;nvidia&#xA;nvidiadrm&#xA;nvidiauvm&#xA;nvidia_modeset&#xA;&#xA;Step 14. generate initramfs to add the changes you have made.&#xA;&#xA;Step 15. generate grub.cfg&#xA;&#xA;OR&#xA;&#xA;Step 16. Before rebooting, enable scripts to allow wake from suspend/hibernate using systemd.&#xA;&#xA;sudo systemctl enable nvidia-suspend.service nvidia-hibernate.service nvidia-resume.service&#xA;&#xA;Step 17. &#xA;Step 18. login]]&gt;</description>
      <content:encoded><![CDATA[<p>Installation guide for DEBIAN 13 &#39;Trixie&#39;, Wayland, x11, &amp; nvidia:</p>

<p>(tip: run commands as root with <code>su -</code>)</p>

<p>Step 1. Add contrib &amp; non-free in /etc/apt/sources.list</p>

<pre><code>deb http://deb.debian.org/debian/ trixie main contrib non-free non-free-firmware

deb http://security.debian.org/debian-security/ trixie-security contrib non-free main non-free-firmware
</code></pre>

<p>...and often also for -updates:</p>

<pre><code>deb http://deb.debian.org/debian/ trixie-updates non-free-firmware non-free contrib main
</code></pre>

<hr>

<blockquote><p>  Example of modified sources.list:</p></blockquote>

<pre><code>#deb cdrom:[Debian GNU/Linux 13.3.0 _Trixie_ - Official amd64 DVD Binary-1 with firmware 20260110-11:00]/ trixie contrib main non-free-firmware

deb http://deb.debian.org/debian/ trixie main contrib non-free non-free-firmware
deb-src http://deb.debian.org/debian/ trixie main contrib non-free non-free-firmware

deb http://security.debian.org/debian-security/ trixie-security contrib non-free main non-free-firmware
deb-src http://security.debian.org/debian-security trixie-security contrib non-free main non-free-firmware

# trixie-updates, to get updates before a point release is made;
# see https://www.debian.org/doc/manuals/debian-reference/ch02.en.html#_updates_and_backports
deb http://deb.debian.org/debian/ trixie-updates non-free-firmware non-free contrib main
deb-src http://deb.debian.org/debian/ trixie-updates non-free-firmware non-free contrib main

# This system was installed using removable media other than
# CD/DVD/BD (e.g. USB stick, SD card, ISO image file).
# The matching &#34;deb cdrom&#34; entries were disabled at the end
# of the installation process.
# For information about how to configure apt package sources,
# see the sources.list(5) manual.
</code></pre>

<hr>

<p>Step 2. <code>apt update</code></p>

<p>Step 3. <code>apt install linux-headers-amd64</code></p>

<p>Step 4. <code>apt install nvidia-kernel-dkms nvidia-driver firmware-misc-nonfree nvtop</code></p>

<p>Step 5. <code>mokutil --import /var/lib/dkms/mok.pub</code></p>

<p>Step 6. when prompted, enter a password</p>

<p>Step 7. <code>systemctl reboot</code></p>

<p>Step 8. On boot there will be a prompt to enroll the MOK, select yes; when asked, enter the password from step 6</p>

<p>Step 9. Enter TTY with CTRL+ALT+F3, enter username, password, <code>sudo nano /etc/default/grub</code></p>

<p>(Tip: generally you may select x11 environment in the bottom left corner of the login screen if you want a graphical interface/ get stuck)</p>

<p>Step 10. Add <code>nvidia_drm.modeset=1</code> as a boot option. This is achieved by appending it within the file /etc/default/grub to GRUB<em>CMDLINE</em>LINUX_DEFAULT=“” without deleting other parameters.</p>

<hr>

<blockquote><p>  Example of modified grub file:</p></blockquote>

<pre><code># If you change this file or any /etc/default/grub.d/*.cfg file,
# run &#39;update-grub&#39; afterwards to update /boot/grub/grub.cfg.
# For full documentation of the options in these files, see:
#   info -f grub -n &#39;Simple configuration&#39;
GRUB_DEFAULT=0
GRUB_TIMEOUT=5
GRUB_DISTRIBUTOR=`( . /etc/os-release &amp;&amp; echo ${NAME} )`
GRUB_CMDLINE_LINUX_DEFAULT=&#34;nvidia_drm.modeset=1 nvidia-drm.fbdev=1 quiet&#34;
GRUB_CMDLINE_LINUX=&#34;&#34;

# If your computer has multiple operating systems installed, then you
# probably want to run os-prober. However, if your computer is a host
# for guest OSes installed via LVM or raw disk devices, running
# os-prober can cause damage to those guest OSes as it mounts
# filesystems to look for things.
#GRUB_DISABLE_OS_PROBER=false

# Uncomment to enable BadRAM filtering, modify to suit your needs
# This works with Linux (no patch required) and with any kernel that obtains
# the memory map information from GRUB (GNU Mach, kernel of FreeBSD ...)
#GRUB_BADRAM=&#34;0x01234567,0xfefefefe,0x89abcdef,0xefefefef&#34;

# Uncomment to disable graphical terminal
#GRUB_TERMINAL=console

# The resolution used on graphical terminal
# note that you can use only modes which your graphic card supports via VBE/GOP/UGA
# you can see them in real GRUB with the command `videoinfo&#39;
#GRUB_GFXMODE=640x480

# Uncomment if you don&#39;t want GRUB to pass &#34;root=UUID=xxx&#34; parameter to Linux
#GRUB_DISABLE_LINUX_UUID=true

# Uncomment to disable generation of recovery mode menu entries
#GRUB_DISABLE_RECOVERY=&#34;true&#34;

# Uncomment to get a beep at grub start
#GRUB_INIT_TUNE=&#34;480 440 1&#34;
</code></pre>

<hr>

<p>Step 11. within home/username create the hidden directory .nvtmp</p>

<p>Step 12. set module options for the nvidia module variable at <code>/etc/modprobe.d/nvidia-options.conf</code> uncomment <code>options nvidia-current NVreg_PreserveVideoMemoryAllocations=1</code> and add <code>NVreg_TemporaryFilePath=~/.nvtmp</code> to the same line</p>

<p><code>sudo nano /etc/modprobe.d/nvidia-options.conf</code></p>

<hr>

<blockquote><p>  Example of modified nvidia-options.conf file:</p></blockquote>

<pre><code>#options nvidia-current NVreg_DeviceFileUID=0 NVreg_DeviceFileGID=44 NVreg_DeviceFileMode=0660

# To grant performance counter access to unprivileged users, uncomment the following line:
#options nvidia-current NVreg_RestrictProfilingToAdminUsers=0

# Uncomment to enable this power management feature:
options nvidia-current NVreg_PreserveVideoMemoryAllocations=1 NVreg_TemporaryFilePath=~/.nvtmp

# Uncomment to enable this power management feature:
#options nvidia-current NVreg_EnableS0ixPowerManagement=1
</code></pre>

<p>Step 13. add your modules to the initramfs by editing <code>/etc/initramfs-tools/modules</code> and adding nvidia, nvidia<em>drm, nvidia</em>uvm, and nvidia_modeset to <code>MODULES</code>.</p>

<p><code>sudo nano /etc/initramfs-tools/modules</code>
add
<code>MODULES=&#34;crc32c nvidia nvidia_drm nvidia_uvm nvidia_modeset&#34;</code></p>

<hr>

<blockquote><p>  Example of modified nvidia-options.conf file:</p></blockquote>

<pre><code># List of modules that you want to include in your initramfs.
# They will be loaded at boot time in the order below.
#
# Syntax:  module_name [args ...]
#
# You must run update-initramfs(8) to effect this change.
#
# Examples:
#
# raid1
# sd_mod
crc32c
nvidia
nvidia_drm
nvidia_uvm
nvidia_modeset
</code></pre>

<p>Step 14. generate initramfs to add the changes you have made.</p>

<p><code>sudo update-initramfs -u -k all</code></p>

<p>Step 15. generate grub.cfg</p>

<p><code>sudo update-grub</code>
OR
<code>sudo grub-mkconfig -o /boot/grub/grub.cfg</code></p>

<p>Step 16. Before rebooting, enable scripts to allow wake from suspend/hibernate using systemd.</p>

<pre><code>sudo systemctl enable nvidia-suspend.service nvidia-hibernate.service nvidia-resume.service
</code></pre>

<p>Step 17. <code>systemctl reboot</code></p>

<p>Step 18. login</p>
]]></content:encoded>
      <guid>https://pen.waltuh.cyou/autumn/installation-guide-for-debian-13-trixie-wayland-x11-and-nvidia</guid>
      <pubDate>Wed, 11 Mar 2026 19:32:24 +0000</pubDate>
    </item>
  </channel>
</rss>