I have successfully recovered my system with the help of a software called Boot Repair. After the recovery, it sent some information to Ubuntu Pastebin, something like this one.
Does this kind of paste contain private information?
I have successfully recovered my system with the help of a software called Boot Repair. After the recovery, it sent some information to Ubuntu Pastebin, something like this one.
Does this kind of paste contain private information?
TL;DR: you're safe enough
Boot Repair report that you have linked there only lists the layout of your hard drive and bootloader settings. This is quite low level information that reveals nothing useful about you as far as crackers are concerned.
The only tiny bit is on line 997, where it shows
/home/adam
. Users are usually assigned home folders same as their username, so this reveals your username. However, as far as an attacker is concerned, this is still nothing. Suppose you have ssh enabled or telnet enabled. Now, there is a possibility of bruteforce attack, with tools such ashydra
, which basically go through multiple combinations of passwords. If you have strong password, it will take forever for an attacker to crack it. In addition, there is no IP address of your system. A random guy online may figure out your username, but won't know where you are. Now, if there is a man-in-the-middle, then someone is intentionally would be looking at your packets, could potentially intercept this info. But in such case, you'd have a drone flying over your house or a van parked outside. You'd have to be really VIP target for this to happen. Then attacker also would need to go through your router; I suggest you have an admin password there - I've known a couple cases here on askubuntu where router settings were altered.If you are still concerned about the bruteforce attack, do this:
Open
/etc/security/limits.conf
. here's how mine looks at the end :See line xieerqi ? That's my login name. This line limits amount of logins for my username on my computer, i.e, max amount of sessions open.
Now look into
/etc/login.defs
. Again, here is mine :To prevent an attacker going forever and ever guessing passwords, login page will give 3 strikes, and then terminate the connection.
Note: to open these files for writing, you'd need
sudo
, like sosudo vi /etc/security/limits.conf
For more info you can also ask this question on security.stackexchange.com . Those guys know more about security than we do here
While the answer from Serg gives in-depth security concerns, guessing that nobody except the admin of http://paste.ubuntu.com gets the information you submit, here is the official privacy policy of the boot-repair.