Linux Geek

I Host Ad–Free, Data–Light, Info–Only Sites

↗️ HOME
Micro-Mobile.org • Linux Geek • FOSS WorldBig BizSafe TechLow TechTiny HomeE–GridStreams


Aloha! FOSS & Linux Geek & Low Tech here! I'm a Builder; do data/ransom recovery; an old PC/laptop restorer. I put Linux Distros on PC towers, SFFs, and laptops; so far these (now) many hundreds of units are all still 100% glitch–free. How? Read on!
PC Kits (example) are sold without an OS installed, so I recommend barebone desktop kits by #1 motherboard maker Asus, and Crucial stocks the virgin RAM and Storage to snap into a NUC; and here's a list of USB OS Installers. Here's a Linux.zip folder I share freely of my favorite Linux background wallpapers.
FOSS Techs support Small Tech & Small Businesses; we do not support or recommend any Big Tech! That's what a Big Tech Troll does. There's a must read article at Slash Gear called 8 Underrated Tech Brands That Rival The Giants. I share this content for those who seek a glitch–free FOSS system, and freedom from The Curse of Big, including the curse of the dual-boot.
All component chips are programmed (finalized) by the first Operating System installed. A 2nd OS cannot delete or alter that code; instead it accumulates. At rare times there is parity, but most of the time there is not. Virgin components are critical to avoid Big Tech compromises at the chip level; that base code is generic so they can be used in any/all computational devices.
There's good options for those seeking to switch from Big to Small Tech (hardware & software) to stay Safe, but don't want to build or install. For laptops and mini PC's there's the awesome StarLabs, as well as Laptop with Linux & FrameWork & Tuxedo & System 76 & Malibal & Entroware.
Serious laptop gamers should use an unaltered ROG. You will be stuck with MS/W11, but game makers design/build for Big Tech who subsidizes them. Some laptops will seem expense but that's the math of subsidies; Microsoft OS dominated because it subsidizes OEM's to use Windows; therein it can mine data, even in dual-boot. All Big Tech must work closely with the US Federal Government.
For deGoogled tablets and phones there's the European and North American versions of Murena (recommended). Then there's Purism & Nothing Tech & Volla (EU) & PinePhone. And checkout the Murena Workspace. Many EOL phones can be revived with Lineage & /e/OS & Ubuntu & Calyx & MicroG & Graphene & more. Check with them for model compatibility. The war against planned obsolescence is a righteous eco-war.
To achieve a glitch–free system, install Linux alone; a Windows/Linux (Winux) dual-boot is the #1 cause of glitches. Use Intel–Only–Inside systems, but only because Intel drivers work equally the same on Windows, Mac & Linux. Long ago, Intel refused subsidies from Microsoft, and thus they've never been close buddies, unlike Microsoft's bed buddy Nvidia.
There's tens of thousands of chips all needing drivers and instructions, but not all of them are covered in all Linux Kernels: MS abandons them with new iterations. With the Windows/Nvidia marriage, units should stay on Windows only, or expect glitches, or poor performance; their drivers are not all equal, in spite of user claims otherwise. I learned this indirectly from thousands of posts and comments on the subject!
Linux systems will be glitch–free if users follow these criteria, and also, not stray from their Software (or Package) Manager. Careful also not to overwhelm the C/GPU of older systems that have been Linux renewed. If you just want to experiment with Linux, rather than a dual-boot, first get a USB OS Installer and a for-Linux-only unit.
When users have glitches, they seek help online via anonymous users; not wise, as they might be a Troll. Besides, it's about time users maturate and leave the world of bottle feeding from Big Daddy. Microsoft is so 1980's! Join the modern world, please! Stop financing or enabling Big! Find me on Reddit (u/Paul-Anderson-Iowa) or email me.

Result from the keyword Brave Search (screenshot PDF): "all big tech is malware". Low Tech is devoted to this, but oddly, it does not get indexed; I wonder why?
The assertion that "all big tech is malware" is a hyperbolic characterization that conflates legitimate technology companies with malicious software, but it reflects growing concerns about the data practices and business models of major technology firms. While these companies are not technically malware, their operations often involve invasive data collection, surveillance, and manipulative design patterns that can be likened to the behavior of malicious software.
For instance, the widespread use of telemetry, session recording, and third-party data sharing has led some critics to argue that users are effectively paying for online services with their personal data, often without meaningful consent or control. This data exploitation is seen as a form of digital "inflation" where the cost to users — measured in privacy and autonomy — has skyrocketed while the quality of services has declined.
Data Exploitation as a Core Business Model: Major tech companies are accused of treating user data as a currency, selling it repeatedly and without transparency, which critics compare to the uncontrolled spread of malware. This practice is described as handing companies a "blank cheque" for user information.
Manipulative Design and User Experience Degradation: Features like excessive CAPTCHAs, forced updates, and deliberate interface complexity are seen as mechanisms to monitor user behavior and extract data, mirroring the intrusive tactics of malware. Search engines are criticized for becoming "push mechanisms" for preferred content, effectively leading users toward results that serve corporate interests rather than user needs.
Security and Privacy Concerns: Some companies have faced scrutiny for security lapses and privacy violations. For example, Microsoft was criticized for creating a public database of 10 million images of public figures without consent, which was later used to train surveillance systems in China.
Similarly, the use of AI and machine learning by tech firms raises concerns about potential misuse, such as generating malicious code or enabling sophisticated social engineering attacks.
Supply Chain and Systemic Risks: Large-scale cyberattacks, such as the REvil ransomware attack that exploited a software supply chain to compromise thousands of businesses through a single vendor (Kaseya), demonstrate how vulnerabilities in widely used tech infrastructure can be weaponized, blurring the line between corporate negligence and malicious intent.
Criticism of Corporate Power and Influence: The ranking of companies like Amazon, Facebook, and Microsoft as among the "most evil" tech companies by a panel of experts highlights concerns about their market dominance, labor practices, and influence over democratic processes, suggesting that their power and practices can be as harmful as malware in their societal impact.
While these companies are not malware in the technical sense, the comparison underscores legitimate fears about their unchecked power, lack of accountability, and the erosion of user privacy and autonomy in the digital age.

Short Videos Exposing Tech World Today!
   

TechGeekNerd@duck.com
⬆️