this post was submitted on 26 May 2025
-13 points (34.1% liked)

Linux

7473 readers
287 users here now

A community for everything relating to the GNU/Linux operating system

Also check out:

Original icon base courtesy of [email protected] and The GIMP

founded 2 years ago
MODERATORS
top 9 comments
sorted by: hot top controversial new old
[–] [email protected] 4 points 3 days ago

Wouldn't using the built in Wireguard VPN on your system be the easiest method? Nothing to install, just import the config.

[–] refalo 14 points 5 days ago (3 children)

sudo curl

sudo random binary

Umm

[–] [email protected] 2 points 3 days ago

They did state it was easy, not safe. Unsafe is always easier. (Until it isn't—I'd get back "-bash: sudo: command not found" if I just followed those directions without understanding.)

[–] [email protected] 3 points 4 days ago

Especially considering that every distribution can set up a VPN without any external tools.

[–] [email protected] 4 points 4 days ago* (last edited 4 days ago) (1 children)

sudo curl

I'd use curl to download with user permissions and then sudo mv to the desired place.

sudo random binary

The official binary of your vpn provider isn't exactly "random". They probably also provide means to check whether the downloaded binary is authentic. Yet, they don't elaborate on that here.

[–] refalo 1 points 4 days ago (1 children)

To me, any binary I do not have the source code for is random. I have no idea what's in it and it could be doing any number of malicious things.

[–] [email protected] 1 points 4 days ago* (last edited 4 days ago)

Yes, but as it's the official binary of your VPN provider, you're going to need to trust them anyways when using their servers.

[–] andybytes 1 points 4 days ago
[–] [email protected] 0 points 3 days ago