• 10 Posts
  • 68 Comments
Joined 4 months ago
cake
Cake day: April 4th, 2025

help-circle

  • and you’re being kind of a jerk?

    Please don’t troll and come back to the topic. GP was completely missing the topic, do you want to avoid it?

    . If you disable Secure Boot, install a Linux distro, enrol that distro’s keys and then reenable it, you’re fine.

    Um, given that Secure Boot prevents any modification of your computer’s boot chain - including installing another boot loader or OS - that’s not how it works.




  • As commenters on the LWN thread said, I doubt that many firmwares even bother to check anyway. My motherboard happens to have had a bug where you can corrupt the RTC and end up in 2031 if you overclock it wrong.

    Seems it compares the expiration date of the UEFI key with the signature date of the bootloader / OS keys. (See the comments on the LWN article, some are far more knowledgeable than I am.) So, no, it does not require a working on-board clock to lock you out if you are not extremely careful and fully understand each part.


  • Can you explain the detailed reason why you think that? Voicing opinions is nice of course but explaining the thought process and logic is, I think, almost always more interesting to other people.

    To start with, what do you think is the “normal users” threath model? And, for example, if one happens to be a member of any of the various minorities that authoritarian governments of every color happen to single out and persecute in your countries case, what would you want to protect from? Or if you are, say, a lawyer, and have a professional obligation to protect sensitive data from theft?





  • Your comment sounded like you were primarily concerned about the shell script piping rather it just being a program which can be downloaded without going through distro packages.

    The AUR install scripts are just downloaded shell scripts which are executed (hopefully after inspection).

    curl | bash just skips the inspection step - curl downloads to stdout, bash executes from stdin.




  • The affected malicious packages are:

    • librewolf-fix-bin
    • firefox-patch-bin
    • zen-browser-patched-bin

    What a nice attack on privacy-friendly infrastructure.

    And then, Arch AUR has such suspicious things like the Brave browser which claims to reduce tracking… and works together with advertisers.

    To be clear, AUR is fantastic if you develop some experimental package and you want to give it to your friends to try it out easily. But not as a general distribution mechanism.


  • BTW python’s package index has roughly the same problem - but a far less technical, experienced and critical user base. NPM has this problem since years.

    Expect these problems to rise with every percent more of new Linux users which never learned the difference between opening / viewing untrusted data, and running untrusted code, because Windows basically ignores this essential concept and Android tries to solve that with sandboxing each app.


  • Microsoft has been making Windows worse. I feel more that this is Microsoft’s fault, they have abandoned the development of desktop Windows and the advancement of support for modern processor designs and gaming hardware.

    Moores law is dead since a long time except for graphic cards and GPUs. This means you can’t keep adding things to desktop software in the style of “What IBM giveth, Microsoft takes away”.

    Existing development paradigms don’t add significant qualities to many-processor hardware.

    Which also explains part of the AI craze. It is investment money searching for a sensible use.