

Get a terminal by hitting Ctrl+Alt+F1, login with the Ubuntu user and a blank password, then look in the installer log: tail -f /var/log/installer/debug
Should tell you where you’re getting stuck.
Get a terminal by hitting Ctrl+Alt+F1, login with the Ubuntu user and a blank password, then look in the installer log: tail -f /var/log/installer/debug
Should tell you where you’re getting stuck.
Okay, so what’s your problem with my comment then?
You’re the author here, right?
If anything, it would be MORE useful for beginners if it included Snaps or Flatpaks.
That’s what your package manager is for. I’m unaware of a distro that doesn’t include a GUI for this.
You need a GUI-on-GUI thing to make it all work for you?
Random new Linux distro from China with zero history or contributions from any FOSS devs?
Nawthx
The Desktop Environment doesn’t matter much. Whichever you like. Stock Fedora is Gnome, and there is a Spin of practically every desktop available. Try what you think you’ll like.
You are quite mistaken. TPM is used as a key pair, and not just generation.
Let give you a specific example: built a hardware platform for a company, and they wanted to make sure that the storage and device were secure on their own, as well as being separated to prevent somebody pulling it apart to try and channel attack all the different things.
On install, the encrypted disk generates a signature. TPm has its own clean keys set to verify that it’s paired at various levels with various pieces of onboard hardware. Then you pair a bootloader combination of those signatures to generate a three-part signature to make sure that what is in TPM matches both the onboard signatures of what is hardwired in, along with the key generated by the new encrypted volume on the drive.
Anyone takes that drive out, it’s mostly useless, because it can’t boot without the signatures verified by TPM, and they’ll never be able to match the combination of the other 15 keys stored there for the hardwired components.
That’s how it’s intended for use. Not just for signature generation and verification. It’s more of a key/value store than anything, like a physical hardware token device.
Fedora for beginners. Ubuntu-based lost the crown because of Snap bullshit.
The default gateway. If it’s not passing traffic, your machine doesn’t go looking elsewhere for routes that work. Read through both the links, and they’ll give you extra background.
Then the first setup does that.
It wouldn’t be able to communicate with the internet, but would still be able to talk to your local network.
If that’s not specifically what you’re trying to do, and you don’t care if traffic might go out over your regular Internet connection, then you can create a fail over type situation where it will try and use a “backup” route to communicate to the internet if needed, though you’ll need to spend some time really making it pretty smooth: https://www.baeldung.com/linux/multiple-default-gateways-outbound-connections
ufw is a firewall. Routing controls traffic flow. You want to set the default route of that machine to only use the tun0 interface. Random link explains
As a secondary step you can set your firewall to block any traffic trying to exit an interface I suppose, but it really shouldn’t be necessary.
For your other services on the local network for your subnet, just add a secondary route only for your subnet that uses your router as a gateway.
No idea where you got this understanding from, but it’s not accurate. In your example, if a distro has signed binaries, then it will work to verify code loaded during the boot process to help to verify system integrity. As OP asked about Mint, yes it technically does have signed pre boot and boot signed modules.
No, this will not prevent all code/processes that aren’t signed from running. That’s a ludicrous statement. It will prevent unsigned kernel modules from being loaded (see Nvidia’s MOK process), and it will prevent a disk from being hit with sideload attacks perhaps (it should be encrypted anyway), but it absolutely does not prevent a user from running unsigned code, or even using root privs to run harmful code (like running random scripts from GitHub).
So at the end of the day does it help a standard user with security? I would argue no. As I said elsewhere, if this question were about HOW to improve security with SB, I’d have a different answer, but that’s not the question OP asked.
That’s not the question though. This is an average user installing Mint. They’re probably not enrolling disk encryption with TPM values or SB certs, they’re literally asking if it’s going to help them by default, and the answer is no. Now, if they were asking how they could increase system security with Secure Boot, I’d answer differently.
Lol, explain how? Are you using TPM values to actually secure anything? If not, then it’s literally doing nothing for you.
If you’re not actually going to be engaging in securing anything with it, just leave it off to avoid issues.
Check out Kdenlive, Shotcut, Openshot, and Lightworks for native apps. If you really need to go the Wine route after that, you can use an easy wrapper app if this is all new to you, like Bottles.