▲ | akimbostrawman 3 days ago | |||||||||||||
>UAC is not a security boundary, so it is not relevant when talking about security. That is there excuses but you don't seem to realize that this makes it only worse because that means there is no boundary at all. >If they are setup and most Linux distros only limit individual apps. So a brand new app can still run wild. new apps will be either installed from a trusted repository (often with a MAC profile) or sandboxed by default from flatpak/snap store. You don't seem to understand that the entire install process is different. You don't get your software from random sites found on Google between malware ads on Linux. >This has been shown to be false in practice due to the xz backdoor XZ has nothing to to with a lack of vetting and even if it was it would be an argument for it because it got caught in testing. | ||||||||||||||
▲ | sugarpimpdorsey 3 days ago | parent [-] | |||||||||||||
> XZ has nothing to to with a lack of vetting and even if it was it would be an argument for it because it got caught in testing. This is absolutely false, it was not caught in any sort of regular testing whatsoever. It was caught by - of all people - a Microsoft employee who noticed SSH logins were taking a split second too long. Not distro packagers. The packages were already staged in the testing branches of the distros they were targeting and could have easily made it into the LTS versions had this one curious MS guy not noticed. | ||||||||||||||
|