▲ | danenania 3 days ago | |||||||||||||
You can read the script before installing. It's pretty straightforward—just grabs the appropriate binary from GitHub and puts it in /usr/local/bin. Installing via package managers or installers also runs remote 3rd party code on your machine, so I don't see much difference from a security perspective. You should make sure you trust the source before installing anything. | ||||||||||||||
▲ | lightdot 3 days ago | parent [-] | |||||||||||||
Of course one can and should read the script before running it, but the instructions promote just the opposite. Even if we skip a step ahead and consider that this script then installs a binary blob... the situation doesn't get any better, does it? If you find any of this as something normal and acceptable, I can only strongly disagree. Such bad practices should be discouraged. On the other hand, using a distro's package manager and a set of community approved packages is a far better choice when installing software, security vise. I really don't see how you could compare the two without plainly seeing the difference, from a security perspective. As an alternative, if the software is not available through a distro's package manager, one should inspect and compile the code. This project provides the instructions to do so, they are just not promoted as a first choice. I can't help coming to a conclusion, that you've largely made my point about bad practices and having a wrong mindset when it comes to software security. | ||||||||||||||
|