• fubarx@lemmy.world
    link
    fedilink
    English
    arrow-up
    92
    arrow-down
    1
    ·
    edit-2
    1 day ago

    If you download and install untrusted code extensions, you’re screwed. Not like it’s rocket-science.

      • kumi@feddit.online
        link
        fedilink
        English
        arrow-up
        5
        ·
        edit-2
        9 hours ago

        Friends don’t tell friends to “Just curl shiny.tool/install | sh” or “Just git clone and docker-compose up”.

      • blackn1ght@feddit.uk
        link
        fedilink
        English
        arrow-up
        80
        ·
        1 day ago

        Let’s be honest, how many current Linux users can trust any code that they run? There’s so many guides and instructions where you essentially copy/paste commands to install or configure something that it would be difficult for your average user to verify everything.

        • kumi@feddit.online
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          6 hours ago

          If you feel overwhelmed by this, an easy rule of thumb is sticking to distro packages of a trusted dist. Ideally ones with long track record, centralized packaging and tiered rollouts.

          Roughly,

          • High community trust: Debian, SUSE, Fedora, Ubuntu

          • Depends on the package but at least everything is transparent with some form of process, contributors vetted, and a centralized namespace: Arch, Alpine, Nixpkgs

          • Anything and anyone goes, you are one typo away from malware but hey, at least things get taken down when folks complain: AUR, GitHub, NPM, DockerHub, adding third-party ppa/copr

          • IDGAF: curl | sh

        • plateee@piefed.social
          link
          fedilink
          English
          arrow-up
          2
          ·
          22 hours ago

          Oh you want this cool terminal experience? Just run:

          curl https://totally-normal-website.io/installer.sh | sudo bash

    • evol@lemmy.today
      link
      fedilink
      English
      arrow-up
      12
      ·
      22 hours ago

      its kind of crazy how much I used to use the AUR, Was just randomly running randoms peoples scripts to install packages.

      • ambitiousslab@feddit.uk
        link
        fedilink
        English
        arrow-up
        32
        ·
        1 day ago

        You can trust the software in your distro’s repositories (if you run a distro with well-maintained repositories). This is because, generally only well-known software gets packaged, the packager should be familiar with both the project and the code, and everything is rebuilt on the distro’s own infrastructure, to ensure that a given binary actually corresponds to the source.

        It might still be possible for things to slip through, but it’s certainly much safer than random programs from online.

      • ZILtoid1991@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        1 day ago

        Depends on.

        If you’re not using your PC for highly critical applications, go high-trust mode, and read news about those who become untrustworthy.

        For critical applications, always check the usernames of the developers, use software trusted by others, etc.

      • RalfWausE@feddit.org
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        1
        ·
        1 day ago

        Yourself and the code you read and understand. So as long as you don’t use a system where this is possible (say 9Front and the like) you trust nothing and nobody, do careful backups and don’t go on a installation spree.

        • squaresinger@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          13 hours ago

          I fear there is no such system where this applies. The tech stack on any old netbook is so advanced and complex that there is nobody on this planet who fully understands it.

          Being theoretically able to read the code is certainly better than not being able to, but it’s not the same as having actually read and understood all the relevant code to the point where you can be somewhat confident that there’s no backdoor in it.

          (And even if someone had the time and mental capacity to do that, at some point when going through the stack you always hit a proprietary layer. Be that drivers, the bootloader, component firmware or the hardware itself.)