this post was submitted on 27 Sep 2021
17 points (87.0% liked)

Linux

49469 readers
669 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 2 points 3 years ago* (last edited 3 years ago) (1 children)

This person is not one bit constructive, and is a privacy community grifter.

Claims all kinds of CVE nonsense and large LoC code nonsense but ignores them for Windows and MacOS, instead promotes these two OSes over Linux based OSes.

His other claims regarding exploits are mostly resolved by running trusted code on machine, and so it requires either socially engineered malware installations, or some low level rootkit that bypasses all of it. Windows? Yeah that OS whose admin permissions can be elevated and bypassed by a Razer gaming USB mouse.

The other crap he harps about is memory unsafe code programming. Yeah, NT kernel is surely safer, a 2 decade old borg.

He ignores the existence of AppArmor as well, for some reason, but Windows and MacOS are more secure!

Somehow, Flatpak is bad but Bubblewrap, part of Flatpak, is good. Cites flatkill.org as proof.

Someone who uses "CCP Pooh -20 credit score" stickers in Telegram groups he admins is not worth taking seriously.

Edit: downvotes started by NoGoolag/SpiteChat army, they detected my presence rather quickly in 7 minutes

[–] [email protected] 3 points 3 years ago (2 children)

The article is indeed one-sided and often makes exaggerated claims.

One example: "This is in contrast to a rolling release model, in which users can update as soon as the software is released, thereby acquiring all security fixes up to that point. "

This ignores that facts that new releases are the only source of new vulnerabilities.

Plus, new vulnerabilities are still to be reported. A 0-day in the wild is usually worse than a published vulnerability: at least you can learn about the latter and take decisions on how to handle it.

[–] [email protected] 1 points 3 years ago (1 children)

Also, security patches are usually patched and released earlier right on rolling release distros right? I know they are when its a critical vulnerability.

[–] [email protected] 0 points 3 years ago* (last edited 3 years ago)

No. It depends on the distribution, but both Debian and paid distributions give maximum priority to patching vulnerabilities on stable/LTS releases. In various cases they are faster than the upstream developers.

[–] [email protected] 1 points 3 years ago

They also ignore effort of some distributions to backport fixes to their supported version of the software as well as promoting the maintenance-mode or ESR releases of software.