this post was submitted on 14 Jan 2026
195 points (95.8% liked)

Technology

78661 readers
3981 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
top 43 comments
sorted by: hot top controversial new old
[–] MonkderVierte@lemmy.zip 30 points 1 day ago

The usual far more advanced malware than typical.

[–] fubarx@lemmy.world 92 points 1 day ago* (last edited 1 day ago) (3 children)

If you download and install untrusted code extensions, you're screwed. Not like it's rocket-science.

[–] CosmicTurtle0@lemmy.dbzer0.com 109 points 1 day ago (2 children)

As we push more average Windows users to Linux, we need to be prepared for these users to download and run completely untrusted code.

[–] kumi@feddit.online 5 points 15 hours ago* (last edited 15 hours ago) (1 children)

Friends don't tell friends to "Just curl shiny.tool/install | sh" or "Just git clone and docker-compose up".

You know, I have encountered a lot of "just pipe curl into sh" from people who absolutely should know not to do that.

[–] blackn1ght@feddit.uk 79 points 1 day ago (3 children)

Let's be honest, how many current Linux users can trust any code that they run? There's so many guides and instructions where you essentially copy/paste commands to install or configure something that it would be difficult for your average user to verify everything.

[–] kumi@feddit.online 2 points 11 hours ago* (last edited 11 hours ago)

If you feel overwhelmed by this, an easy rule of thumb is sticking to distro packages of a trusted dist. Ideally ones with long track record, centralized packaging and tiered rollouts.

Roughly,

  • High community trust: Debian, SUSE, Fedora, Ubuntu

  • Depends on the package but at least everything is transparent with some form of process, contributors vetted, and a centralized namespace: Arch, Alpine, Nixpkgs

  • Anything and anyone goes, you are one typo away from malware but hey, at least things get taken down when folks complain: AUR, GitHub, NPM, DockerHub, adding third-party ppa/copr

  • IDGAF: curl | sh

[–] village604@adultswim.fan 2 points 20 hours ago

Probably a bunch. But having the ability doesn't mean it's used.

[–] plateee@piefed.social 3 points 1 day ago

Oh you want this cool terminal experience? Just run:

curl https://totally-normal-website.io/installer.sh | sudo bash

[–] evol@lemmy.today 12 points 1 day ago (2 children)

its kind of crazy how much I used to use the AUR, Was just randomly running randoms peoples scripts to install packages.

[–] nutsack@lemmy.dbzer0.com 1 points 18 hours ago (1 children)

I'll probably never stop doing this. I like it too much

[–] kumi@feddit.online 2 points 14 hours ago (1 children)

https://www.theregister.com/2025/07/22/arch_aur_browsers_compromised/

There is crap like this all the time, that wave just happened to make news. Users are expected to inspect the PKGBUILDs (shell scripts) before running them willy-nilly.

You do as you wish but please don't normalize dangerous behaviour.

[–] nutsack@lemmy.dbzer0.com 2 points 14 hours ago* (last edited 14 hours ago) (1 children)

you can also try to avoid installing random fork packages with 1 vote uploaded by Steven

[–] kumi@feddit.online 1 points 13 hours ago* (last edited 13 hours ago)

Of course.

As Arch becomes mainstream and more of an attractive target for attackers I think we will get more of the same thing happening regularly in NPM: Legitimate popular packages getting compromised because a maintainer got infected or phished.

As well as botting of votes and comments.

[–] Sxan@piefed.zip 0 points 18 hours ago (1 children)

I still do. It's to pass þe time between Russian Roulette on Saturdays.

[–] evol@lemmy.today 3 points 17 hours ago

Arch is truly just a gamblers distro

[–] ragas@lemmy.ml 11 points 1 day ago (3 children)
[–] ambitiousslab@feddit.uk 33 points 1 day ago (1 children)

You can trust the software in your distro's repositories (if you run a distro with well-maintained repositories). This is because, generally only well-known software gets packaged, the packager should be familiar with both the project and the code, and everything is rebuilt on the distro's own infrastructure, to ensure that a given binary actually corresponds to the source.

It might still be possible for things to slip through, but it's certainly much safer than random programs from online.

[–] squaresinger@lemmy.world 6 points 18 hours ago

*insert obligatory xz utils reference*

[–] ZILtoid1991@lemmy.world 4 points 1 day ago

Depends on.

If you're not using your PC for highly critical applications, go high-trust mode, and read news about those who become untrustworthy.

For critical applications, always check the usernames of the developers, use software trusted by others, etc.

[–] RalfWausE@feddit.org 4 points 1 day ago (1 children)

Yourself and the code you read and understand. So as long as you don't use a system where this is possible (say 9Front and the like) you trust nothing and nobody, do careful backups and don't go on a installation spree.

[–] squaresinger@lemmy.world 4 points 18 hours ago

I fear there is no such system where this applies. The tech stack on any old netbook is so advanced and complex that there is nobody on this planet who fully understands it.

Being theoretically able to read the code is certainly better than not being able to, but it's not the same as having actually read and understood all the relevant code to the point where you can be somewhat confident that there's no backdoor in it.

(And even if someone had the time and mental capacity to do that, at some point when going through the stack you always hit a proprietary layer. Be that drivers, the bootloader, component firmware or the hardware itself.)

[–] chocrates@piefed.world 51 points 1 day ago (1 children)

Doesn't say anything about the exploits. Just talks about a command and control suite.

[–] adespoton@lemmy.ca 38 points 1 day ago* (last edited 1 day ago) (1 children)

It very clearly states that there were no exploits; the researchers stumbled across the undeployed C&C suite.

[–] chocrates@piefed.world 6 points 1 day ago

Oh I missed that line