this post was submitted on 13 Aug 2023
1020 points (98.7% liked)

linuxmemes

20880 readers
2 users here now

I use Arch btw


Sister communities:

Community rules

  1. Follow the site-wide rules and code of conduct
  2. Be civil
  3. Post Linux-related content
  4. No recent reposts

Please report posts and comments that break these rules!

founded 1 year ago
MODERATORS
 
all 22 comments
sorted by: hot top controversial new old
[–] [email protected] 230 points 1 year ago

Gotta support open source wherever you can.

[–] [email protected] 159 points 1 year ago (1 children)

Genetic diversity protects a species against epidemic disease

[–] [email protected] 28 points 1 year ago* (last edited 1 year ago) (2 children)

that's why i support flatpak as the universal package manager, vírus can't work there

[–] [email protected] 17 points 1 year ago (1 children)

That sounds like a challenge!

[–] [email protected] 4 points 1 year ago

actually good idea lmao

[–] [email protected] 3 points 1 year ago (1 children)

Attacker will steal your browser cookie the same way it does without flatpak. If you have poor security hygiene and bad habits, flatpak nor anything else will save you.

[–] [email protected] 1 points 1 year ago (1 children)

if yoy fuck over with the default package manager, the attacker has your system, if you fuck over with flatpak, they have your browser cookie, my point still stand

sure, nothing beats good security hygiene and habits, but another security layer(plus others flatpak benefits) are a good thing

[–] [email protected] 3 points 1 year ago

What you are describing here is fase feeling of security. Many flatpaks have access to your home dir by default. This is already security flushed down the toilet. Browser is the biggest attack vector nowadays and this is where your accounts reside. Worrying about package manager while not giving a shit sbout bank account seems out of place.

[–] [email protected] 138 points 1 year ago

I can break my install just fine without any outside help thank you much and please 🤣😂😭

[–] [email protected] 101 points 1 year ago (2 children)

I wish someone would send me $5 out of pity for my non-malware code.

[–] [email protected] 8 points 1 year ago (1 children)

Sure, send me your github username and your ko-fi link and I'll judge you accordingly

[–] [email protected] 3 points 1 year ago

@[email protected] please don't forget I said Hi! when you're rich, soon

[–] [email protected] 99 points 1 year ago

Like the good old Albanian virus

[–] [email protected] 91 points 1 year ago

I feel personally attacked. Yes I've actually done this (minus sending them money). I had a server (that I am pretty sure sent headers to the effect that it ran x86) which had some logs indicating someone had tried to download an arm IOT botnet onto it. So I downloaded it and tried running it through a decompiler. I found a UPX stub. The rest was compressed. So I tried the UPX unpacker. This didn't work because it was built with a modified copy of UPX. So I hauled out a raspberry pi, reflashed the OS and tried running it in GDB in hopes of just dumping the unpacked bit from memory. Nothing. So I downloaded qemu and set up an aarch 64 arm 9 image still nothing. So I tried 32 bit arm again in qemu. At this point I gave up

[–] [email protected] 77 points 1 year ago* (last edited 1 year ago)

cmalw-lib-2.0

The programer's version of lawful evil

[–] [email protected] 62 points 1 year ago

That’s why you don’t write a virus for Linux…

[–] [email protected] 58 points 1 year ago

This guys fucks

[–] [email protected] 47 points 1 year ago

Pull requests welcome

[–] [email protected] 35 points 1 year ago

This is pure gold.

Also true :)