32
top 33 comments
sorted by: hot top controversial new old
[-] MonkderVierte@lemmy.zip 3 points 1 week ago

The usual far more advanced malware than typical.

[-] fubarx@lemmy.world 3 points 1 week ago* (last edited 1 week ago)

If you download and install untrusted code extensions, you're screwed. Not like it's rocket-science.

[-] CosmicTurtle0@lemmy.dbzer0.com 6 points 1 week ago

As we push more average Windows users to Linux, we need to be prepared for these users to download and run completely untrusted code.

[-] blackn1ght@feddit.uk 5 points 1 week ago

Let's be honest, how many current Linux users can trust any code that they run? There's so many guides and instructions where you essentially copy/paste commands to install or configure something that it would be difficult for your average user to verify everything.

[-] kumi@feddit.online 1 points 1 week ago* (last edited 1 week ago)

If you feel overwhelmed by this, an easy rule of thumb is sticking to distro packages of a trusted dist. Ideally ones with long track record, centralized packaging and tiered rollouts.

Roughly,

  • High community trust: Debian, SUSE, Fedora, Ubuntu

  • Depends on the package but at least everything is transparent with some form of process, contributors vetted, and a centralized namespace: Arch, Alpine, Nixpkgs

  • Anything and anyone goes, you are one typo away from malware but hey, at least things get taken down when folks complain: AUR, GitHub, NPM, DockerHub, adding third-party ppa/copr

  • IDGAF: curl | sh

[-] kumi@feddit.online 2 points 1 week ago* (last edited 1 week ago)

Friends don't tell friends to "Just curl shiny.tool/install | sh" or "Just git clone and docker-compose up".

You know, I have encountered a lot of "just pipe curl into sh" from people who absolutely should know not to do that.

[-] evol@lemmy.today 1 points 1 week ago

its kind of crazy how much I used to use the AUR, Was just randomly running randoms peoples scripts to install packages.

[-] nutsack@lemmy.dbzer0.com 0 points 1 week ago

I'll probably never stop doing this. I like it too much

[-] kumi@feddit.online 0 points 1 week ago

https://www.theregister.com/2025/07/22/arch_aur_browsers_compromised/

There is crap like this all the time, that wave just happened to make news. Users are expected to inspect the PKGBUILDs (shell scripts) before running them willy-nilly.

You do as you wish but please don't normalize dangerous behaviour.

[-] nutsack@lemmy.dbzer0.com 0 points 1 week ago* (last edited 1 week ago)

you can also try to avoid installing random fork packages with 1 vote uploaded by Steven

[-] kumi@feddit.online 1 points 1 week ago* (last edited 1 week ago)

Of course.

As Arch becomes mainstream and more of an attractive target for attackers I think we will get more of the same thing happening regularly in NPM: Legitimate popular packages getting compromised because a maintainer got infected or phished.

[-] ragas@lemmy.ml 0 points 1 week ago
[-] ambitiousslab@feddit.uk 3 points 1 week ago

You can trust the software in your distro's repositories (if you run a distro with well-maintained repositories). This is because, generally only well-known software gets packaged, the packager should be familiar with both the project and the code, and everything is rebuilt on the distro's own infrastructure, to ensure that a given binary actually corresponds to the source.

It might still be possible for things to slip through, but it's certainly much safer than random programs from online.

[-] squaresinger@lemmy.world 1 points 1 week ago

*insert obligatory xz utils reference*

[-] chocrates@piefed.world 2 points 1 week ago

Doesn't say anything about the exploits. Just talks about a command and control suite.

[-] adespoton@lemmy.ca 1 points 1 week ago* (last edited 1 week ago)

It very clearly states that there were no exploits; the researchers stumbled across the undeployed C&C suite.

[-] tidderuuf@lemmy.world -4 points 1 week ago

With no indication that VoidLink is actively targeting machines, there’s no immediate action required by defenders, although they can obtain indicators of compromise from the Checkpoint blog post.

Don't click on the article. It's an AI regurgitated summary and internet rot site.

You're welcome.

[-] solrize@lemmy.ml 17 points 1 week ago

Ars technica is usually legit.

[-] Nawor3565@lemmy.blahaj.zone 17 points 1 week ago

Did you just call Ars Technica an "internet rot site"?

Good way to make it obvious you don't know what you're talking about without saying you don't know what you're talking about.

[-] tidderuuf@lemmy.world -3 points 1 week ago

Do I need to repeat myself or is your skull too thick? Try using those links in a year from now Ars is literally an Arse of the tech industry.

[-] Cocodapuf@lemmy.world 2 points 1 week ago

Ok, noted. Troll identified and blocked.

[-] tidderuuf@lemmy.world -1 points 1 week ago

"oh no someone said the truth but it hurts my feelings" blocked

[-] Passerby6497@lemmy.world 1 points 1 week ago

It might help if you actually said something rather than just trolling with below average bait (assuming you are trolling and not just intellectually battling a door stop for 3rd place)

[-] adespoton@lemmy.ca 11 points 1 week ago

Considering Dan isn’t a bot and responds to comments in the forum, I suspect you have no clue what you’re talking about.

The sourced research he cites is also not AI generated.

[-] acosmichippo@lemmy.world 1 points 1 week ago

you're AI on an internet rot site.

[-] BananaIsABerry@lemmy.zip 1 points 1 week ago

Yeah! AI bad!

Give him the updoots for saying it!

this post was submitted on 14 Jan 2026
32 points (90.0% liked)

Technology

79228 readers
231 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS