Comment on Stealthy Linux rootkit found in the wild after going undetected for 2 years
Kodemystic@lemmy.kodemystic.dev 11 months ago
Hpw to combat stuff like this?
Comment on Stealthy Linux rootkit found in the wild after going undetected for 2 years
Kodemystic@lemmy.kodemystic.dev 11 months ago
Hpw to combat stuff like this?
d3Xt3r@lemmy.nz 11 months ago
SELinux, grsecurity, containers, keep your system updated and don’t run random untrustworthy code.
TrickDacy@lemmy.world 11 months ago
Honestly, is there much code in the world which doesn’t meet this description? How do you propose we decide what is trustworthy? Every time I update my packages I’m getting possibly millions of new lines of code that I can’t possibly personally vet
PlatinumSf@pawb.social 11 months ago
Keyword “Random”. The code for the packages that shipped for your os and for your user installed utilities are generally ‘trusted’ code since you sought out the install. It’s not bulletproof, but it’s a good start vs running any package that happens to land in your downloads folder.
TrickDacy@lemmy.world 11 months ago
Well, it’s not always so cut and dried. For example, do I need to research the maker of some random dude who built an app that looks useful? I don’t think most people on lemmy are the types to literally not care at all where software comes from, so I’m just trying to understand better how we can properly draw that line
pete_the_cat@lemmy.world 11 months ago
Those packages are vetted by multiple maintainers from different places, they’d all have to be in on it.