52
submitted 2 weeks ago by ikidd@lemmy.world to c/linux@programming.dev
you are viewing a single comment's thread
view the rest of the comments
[-] atrielienz@lemmy.world 4 points 2 weeks ago
[-] dgdft@lemmy.world 9 points 2 weeks ago* (last edited 2 weeks ago)

That is a setup guide for hardware key and passkey auth. It is not a hardening guide, and does nothing to mitigate these LPE vulns.

[-] atrielienz@lemmy.world 7 points 2 weeks ago

Thank you. That's what I wanted to know.

load more comments (2 replies)
this post was submitted on 19 Jun 2025
52 points (94.8% liked)

Linux

8249 readers
458 users here now

A community for everything relating to the GNU/Linux operating system

Also check out:

Original icon base courtesy of lewing@isc.tamu.edu and The GIMP

founded 2 years ago
MODERATORS