273
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
this post was submitted on 13 Mar 2025
273 points (96.6% liked)
Linux
6450 readers
588 users here now
A community for everything relating to the GNU/Linux operating system
Also check out:
Original icon base courtesy of lewing@isc.tamu.edu and The GIMP
founded 2 years ago
MODERATORS
Depends on the repo but at least for Debian, there's a path of trust between GPG keys I've signed and the Debian release GPG keys.
How do you know that the malware goblin hasn't installed malware on your computer when you weren't looking?
I think the only foolproof plan is using boulders, stones, and perhaps other blunt objects to deal with the issue of code executing altogether.
What are you trying to say?
If there's code running on a machine, there's a possibility it's malicious or unsafe, the only solution is destruction of anything that can run code.