• mvirts@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    1 month ago

    And then it starts running because you set up wine with binfmt_misc, only to crash a few seconds later

      • f4f4f4f4f4f4f4f4@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        1 month ago

        Better replace your keyboard everytime you leave it unattended, someone could put a keylogger in it. Don’t forget to check for hidden pinhole cameras around that capture you inputting your passwords. Etc, etc. Those even work against an encrypted drive…

          • f4f4f4f4f4f4f4f4@sopuli.xyz
            link
            fedilink
            English
            arrow-up
            1
            ·
            edit-2
            1 month ago

            grub’s always been a hack. The first stage in 512 byte boot sector chainloads the second stage in the space between boot sector and the first sectors of first partition. Second stage chainloads the kernel. (This is my primitive gist.)

            grub was never made for security, it just exists in a place where one would think security would be priority… but again, physical access = pwned, etc.

            Not quite the same, but funny: I recently unlocked an HDD from a car head unit to prove to a friend that it was only storing music ripped from its CD drive (and the associated minimal CD title database)… Toshiba master HDD password is 32 spaces. 😅

            • SynopsisTantilize@lemm.ee
              link
              fedilink
              arrow-up
              0
              ·
              1 month ago

              Oh shit hahaha that’s straight up disrespectful. Well yea I guess that makes sense but I just never thought to deep about it.

    • Phoenixz@lemmy.ca
      link
      fedilink
      arrow-up
      0
      ·
      1 month ago

      Yeah that is not really an “OMG” vulnerability as I can also get into that machine by booting it with a USB drive, or plugging it’s drove into my own machine.

    • kattfisk@lemmy.dbzer0.com
      link
      fedilink
      arrow-up
      0
      ·
      1 month ago

      That’s hyperbole. Such a system can be “hacked” by simply plugging in a usb-stick and booting from that instead, or dozens of other ways.

      The only reason to use GRUB authentication I can think of would be in something like a kiosk.

  • kamen@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    1 month ago

    … and yet some of the same people will readily copy-paste random shell scripts into their terminal without fully understanding them.

      • Mutelogic@sh.itjust.works
        link
        fedilink
        arrow-up
        0
        ·
        1 month ago

        I feel like there’s some truth to this!

        If the posted answer was in a moderately active thread, you can generally assume it’s correct if there are no contradictory replies.

      • PieMePlenty@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        1 month ago

        In fact, you should delete the terminal altogether. On a related note, powershell access is considered taboo in corporate environments by IT departments. When security audits are done, you lose a point if powershell can be used. It is in fact considered a hacking tool.

  • apex32@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    1 month ago

    A friend of mine once downloaded something malicious to his Linux machine and wasn’t worried about it. Then some time later, while browsing his files from a Windows machine, saw it and was like, “hey, what’s this?” Oops.

    He’s a tech savvy guy, so I’m guessing the fact he had downloaded it himself really let his guard down.

  • lath@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    1 month ago

    Modern viruses check the os before deciding which type of file to send your way.

      • N.E.P.T.R@lemmy.blahaj.zone
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 month ago

        Except websites can tell what base OS you run using browser fingerprinting. It os impossible to lie aboit your OS because of the differences in platforms.

          • N.E.P.T.R@lemmy.blahaj.zone
            link
            fedilink
            English
            arrow-up
            0
            ·
            1 month ago

            You can lie, but that doesnt mean that a website cant still tell your base OS if they use JS platform fingerprinting. Arkenfox, the base config which Librewolf is based off of says the exact same thing. Go to CreepJS and see it get your platform regardless.

              • N.E.P.T.R@lemmy.blahaj.zone
                link
                fedilink
                English
                arrow-up
                1
                ·
                1 month ago

                Firstly there is no need to be condescending.

                Secondly, do you block all JS? NoScript is not a silver bullet and doesnt stop fingerprinting, it is itself identified by the CreepJS test site. It may in this case reduce the chance of OS fingerprinting, but pure CSS methods exist as well.

                Additionally, NoScript is laregly redundant with uBlock Origin since you can do everything that it offers, such as blocking 3rd party scripts/iframes/all, block fonts, block JS, and it is very granular.

                Bottom line, you are fingerpintable.

                • RachelRodent@lemmy.dbzer0.com
                  link
                  fedilink
                  arrow-up
                  0
                  ·
                  1 month ago

                  No script offers more than just is blocking you can block certain elements fonts what all that. It is NOT redundant. And creepjs doesn’t even run without js which I don’t allow on non trusted websites. Also yeah sorry I wasn’t trying to be condescending.

        • bamboo@lemmy.blahaj.zone
          link
          fedilink
          English
          arrow-up
          0
          ·
          1 month ago

          Generally browser fingerprinting is used to identify individual browser sessions across IP addresses. This mostly takes into account reported features and capabilities of the browser and OS to the website. Fingerprinting isn’t looking for specific info your browser reports, it’s taking it all and hashing it to get a unique id specific to the browser. Because it’s hashed, it can’t be reversed to identify the OS from the hash.

          Sure a malicious website could Ignore the user agent and probe for some hardware capabilities that are specific to Linux, but that would be a lot of effort to probe various things which are set differently across all different browsers. I can’t speak for bad actors, but I wouldn’t spend the effort to check if the user agent is spoofed, if 95% of the time it’s accurate to get the OS type.