▲ | donnachangstein 3 days ago | |
It's a very myopic take. Someone that has seized control of your core network such that they were capable of modifying traffic, is not going to waste precious time or access modifying the flags of ls on your man page server. They will focus on more valuable things. Just because something is possible in theory doesn't make it likely or worth the time invested. You can put 8 locks on the door to your house but most people suffice with just one. Someone could remove a piece of mail from your unlocked rural mailbox, modify it and put it back. Do you trust the mail carrier as much as the security of your internal network? But it's not really a concern worth investing resources into for most. | ||
▲ | growse 3 days ago | parent [-] | |
> Someone that has seized control of your core network such that they were capable of modifying traffic, is not going to waste precious time or access modifying the flags of ls on your man page server. They will focus on more valuable things. Ah, the "both me and my attackers agree on what's important" fallacy. What if they modify the man page response to include drive-by malware? |