this post was submitted on 28 Feb 2025
1060 points (99.1% liked)

linuxmemes

23692 readers
2120 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack users for any reason. This includes using blanket terms, like "every user of thing".
  • Don't get baited into back-and-forth insults. We are not animals.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn. Even if you watch it on a Linux machine.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, <loves/tolerates/hates> systemd, and wants to interject for a moment. You can stop now.
  • 5. πŸ‡¬πŸ‡§ Language/язык/Sprache
  • This is primarily an English-speaking community. πŸ‡¬πŸ‡§πŸ‡¦πŸ‡ΊπŸ‡ΊπŸ‡Έ
  • Comments written in other languages are allowed.
  • The substance of a post should be comprehensible for people who only speak English.
  • Titles and post bodies written in other languages will be allowed, but only as long as the above rule is observed.
  • 6. (NEW!) Regarding public figuresWe all have our opinions, and certain public figures can be divisive. Keep in mind that this is a community for memes and light-hearted fun, not for airing grievances or leveling accusations.
  • Keep discussions polite and free of disparagement.
  • We are never in possession of all of the facts. Defamatory comments will not be tolerated.
  • Discussions that get too heated will be locked and offending comments removed.
  • Β 

    Please report posts and comments that break these rules!


    Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't remove France.

    founded 2 years ago
    MODERATORS
     
    top 50 comments
    sorted by: hot top controversial new old
    [–] [email protected] 1 points 2 weeks ago

    until you try to install .exe game file using lutris and wine

    [–] [email protected] 3 points 2 weeks ago

    Sometimes when I've torrenting from a public wifi I'll get a malicious .scr file - but since I torrent from an Android phone it can't do anything to me.

    [–] [email protected] 22 points 2 weeks ago

    And then it starts running because you set up wine with binfmt_misc, only to crash a few seconds later

    [–] [email protected] 5 points 2 weeks ago

    Well if the exe was in a bottle it would be dangerous.

    https://usebottles.com/ :D

    [–] [email protected] 18 points 2 weeks ago (5 children)

    Remember that time, when it was possible for about 6 years to hack into any Linux system (without drive encryption) which had GRUB by pressing backspace exactly 28 times? Yeah, good old times.

    https://www.hmarco.org/bugs/CVE-2015-8370-Grub2-authentication-bypass.html

    [–] [email protected] 5 points 2 weeks ago

    Yeah that is not really an "OMG" vulnerability as I can also get into that machine by booting it with a USB drive, or plugging it's drove into my own machine.

    [–] [email protected] 8 points 2 weeks ago

    That's hyperbole. Such a system can be "hacked" by simply plugging in a usb-stick and booting from that instead, or dozens of other ways.

    The only reason to use GRUB authentication I can think of would be in something like a kiosk.

    [–] [email protected] 5 points 2 weeks ago

    Does anyone here use GRUB authentication? If so why? What's your threat model?

    [–] [email protected] 16 points 2 weeks ago

    If the adversary has physical access you are generally pwned either way

    [–] [email protected] 4 points 2 weeks ago (1 children)

    Breh. What? I feel naked right now.

    [–] [email protected] 1 points 2 weeks ago* (last edited 2 weeks ago) (1 children)

    Better replace your keyboard everytime you leave it unattended, someone could put a keylogger in it. Don't forget to check for hidden pinhole cameras around that capture you inputting your passwords. Etc, etc. Those even work against an encrypted drive...

    [–] [email protected] 1 points 2 weeks ago (1 children)

    To be fair I rotate hardware and DE so often my drives are wiped nearly monthly. But Jesus this is egregious.

    [–] [email protected] 2 points 2 weeks ago* (last edited 2 weeks ago) (1 children)

    grub's always been a hack. The first stage in 512 byte boot sector chainloads the second stage in the space between boot sector and the first sectors of first partition. Second stage chainloads the kernel. (This is my primitive gist.)

    grub was never made for security, it just exists in a place where one would think security would be priority... but again, physical access = pwned, etc.

    Not quite the same, but funny: I recently unlocked an HDD from a car head unit to prove to a friend that it was only storing music ripped from its CD drive (and the associated minimal CD title database)... Toshiba master HDD password is 32 spaces. πŸ˜…

    [–] [email protected] 1 points 2 weeks ago

    Oh shit hahaha that's straight up disrespectful. Well yea I guess that makes sense but I just never thought to deep about it.

    [–] [email protected] 2 points 2 weeks ago

    Wrong location my dear

    load more comments
    view more: next β€Ί