this post was submitted on 26 Nov 2024
-31 points (40.8% liked)

196

17237 readers
1703 users here now

Be sure to follow the rule before you head out.


Rule: You must post before you leave.



Other rules

Behavior rules:

Posting rules:

NSFW: NSFW content is permitted but it must be tagged and have content warnings. Anything that doesn't adhere to this will be removed. Content warnings should be added like: [penis], [explicit description of sex]. Non-sexualized breasts of any gender are not considered inappropriate and therefore do not need to be blurred/tagged.

If you have any questions, feel free to contact us on our matrix channel or email.

Other 196's:

founded 2 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] -5 points 3 months ago (1 children)
[–] [email protected] 1 points 3 months ago* (last edited 3 months ago) (2 children)

It’s open source, which in this case means a lot of people are working on it, and it is used on internet-facing computers, which means it can’t hide behind a residential firewall so has to be secure against every attack imaginable.

So yeah, the fact that is called merely “secure” is indeed lol, it should have been called “ultra mega super max secure”.

[–] [email protected] 1 points 3 months ago* (last edited 3 months ago)

This is a seriously ironic take coming from someone whose username is a reference to the biggest breach of Linux security in history and the ease with which the trust needed to pull it off was gained

[–] [email protected] -1 points 3 months ago (1 children)
[–] [email protected] 2 points 3 months ago* (last edited 3 months ago) (1 children)

Bro/sis/enby read a random aah article and concluded that every sysadmin in the world is wrong 💀

[–] [email protected] 0 points 3 months ago

This article is just one of several articles that cite vulnerabilities that GNU/Linux has. Open source is something I advocate but I am aware that the mere fact that a software is open source does not guarantee that it is secure. Many eyes checking the code did not prevent the xz Utils backdoor from being included in several distributions. The monolithic kernel is also problematic every day, more and more lines of code are added, further increasing the attack surface, among others. Just to name a few