▲ | jjgreen 2 days ago | ||||||||||||||||
Splendid idea, especially since "curl | bash" can be detected on the server [1] (which if compromised could serve hostile content to only those who do it) [1] https://web.archive.org/web/20250622061208/http://idontplayd... | |||||||||||||||||
▲ | IshKebab 2 days ago | parent | next [-] | ||||||||||||||||
This is one of those theoretical issues that has absolutely no practical implications. | |||||||||||||||||
| |||||||||||||||||
▲ | falcor84 2 days ago | parent | prev | next [-] | ||||||||||||||||
Yes, ... but if the server is compromised, they could also just inject malware directly into the binary that it's installing, right? As I see it, at the end of the day you're only safe if you're directly downloading a package whose hash you can confirm via a separate trusted source. Anything else puts you at the mercy of the server you're downloading from. | |||||||||||||||||
| |||||||||||||||||
▲ | 2 days ago | parent | prev [-] | ||||||||||||||||
[deleted] |