Skip Navigation
PSA: You should know that Debian Trixie/Testing does not receive security updates in a timely manner, and is not intended for production use
  • I mean you’d still expect that critical security fixes would land in testing, no?

    they get there, just after uh, 5 days usually. things change during the soft freeze as the migration time gets even longer

    testing is not really meant to be used in that way, you can think of testing of "what would the next debian stable look like if it was released today?" as the versions in debian stable are meant to be frozen, those that are in testing are meant to be tested at that version.

  • I made a local APT repository that automatically fetches DEBs and AppImages from anywhere
  • Unless I’m missing something, here we will disagree. Secure or not, FOSS principle-respecting or not, if I’m choosing to install software by X then I’m going to get it straight from X and not involve third-party Y too.

    Source code is like a recipe. Getting your food from the chef who made the recipe is fine, but getting it from another chef who... followed the same exact recipe is no different.

    This is how the linux software distribution model works, distro maintainers are a CHECK on upstream.

  • I made a local APT repository that automatically fetches DEBs and AppImages from anywhere
  • I’m and end user

    Yeah, we all are. What's your point?

    End users are also developers. All computer users are developers. You are developing.

    user working for end users

    By making a script that lets me get backdoors and shitty packages with ease? The linux package distribution system is a nightmare, Debian is the least bad approach. There is basically always a better option to using a .deb file. If you come across something that isn't packaged, I recommend Flatpak, building from source (and installing unprivileged), or using the developers vendored tarball (installing unprivileged).

    https://wiki.debian.org/SecureApt

    By using local .debs you lose the benefit of:

    Reproducible builds

    GPG checksums

    Stable release model

    debian security team

  • I made a local APT repository that automatically fetches DEBs and AppImages from anywhere
  • Why does Debian-Ubuntu not provide a simple command for this?

    You aren't supposed to add repos. Ever. https://wiki.debian.org/UntrustedDebs

    Apt is not built with security in mind, at all. The partial sandboxing it does do is trivial to bypass. Adding a repo is basically a RAT Trojan on your computer.

    An example is signal-desktop

    Yeah don't use signal. They restrict freedom 3 by making distribution difficult. Thats why they trick you into using their RAT repo.

    https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842943

    The least bad option is the unofficial flatpak.

  • I made a local APT repository that automatically fetches DEBs and AppImages from anywhere
  • If you are getting your code straight from the author,

    Which is not what you are doing at all with a .deb file. A .deb file is a binary with a bunch of scripts to "properly" install your package. Building from source is what you SHOULD be doing. Debian has an entire policy handbook on how packages are supposed to be packaged. Progrmatically you can review the quality of a package with 'lintian'. .debs made by developers following a wiki tutorial can't even come close. remember, apt installs happen as root and can execute arbitrary code.

    Also, debian packagers can be project maintainers, so they can be "the author."

  • I made a local APT repository that automatically fetches DEBs and AppImages from anywhere
  • Well, I’m just automating what people currently have to do manually : visit GitHub and download DEB and install DEB.

    Yeah. You should never do that. Like ever. Build from source; or use a vendored tarball. https://wiki.debian.org/DontBreakDebian

    .deb is a terribly insecure nightmare thats held up by the excellent debian packagers, gpg , and checksums, and stable release model. don't use .deb files.

  • From Linux to NetBSD with SSH only
  • BSD is on its death bed

    https://www.openbsd.org/75.html

    https://netbsd.org/releases/formal-10/NetBSD-10.0.html

    Considering OpenBSD and NetBSD have had two new releases just this year, and how well funded the BSDs are by major corpos who like ripping source code, I think their so called "Deaths" have been majorly overstated.

    Give a BSD a try, it's a lot less like shoving systemd/apache2/red hat together and reading 300000 line long config files with documentation that clearly was never intended to be read and more like using an actual operating system designed to be cohesive.

  • IT Department's Plan
  • Also: don’t trust your employees to boot into safe mode. Trust a 3rd party to freely install system level files at any time.

    Exactly. This is exactly the problem, and unless people wisen up the software security problem is only going to get worse. Companies and Governments need to rethink how they approach security entirely. This is a preview of what is to come, its only going to get worse and more damaging from here, and none of the vendors care.

  • IT Department's Plan
  • I’m pretty sure Windows is plenty secure.

    Haha sure. Windows NT MIGHT be considered 'secure' from an architectural standpoint but literally of this falls apart when you tape all the Microsoft Dark Patterns on it that ruin the security. Its a joke, and that's the entire problem.

    Think: Microsoft Accounts, now the "secure" Windows NT Local User Authentication is effectively backdoored by MS and makes you vulnerable to phishing attacks. Windows Update: Constantly pushing dark patterns and 'features' that it discourages people from updating so then guess what, people don't update! The fact that Windows so easily allows Crowdstrike to make system level changes like this without trying a whiny fit is also apart of it. Think about the fact how easily Microsoft allows stuff like Valorant anti-cheat and Crowdstrike, which are effectively rootkits, to be installed with one UAC prompt. In reality this issue is not really Microsoft's fault directly, but in a bunch of indirect ways they encourage this and allow it to happen, and we have seen time and time again, Microsoft DOES NOT CARE ABOUT SECURITY.

    If anything this "Crowdstrike" software showcases the endemic problem in software security and how our system is failing and continuing to fail us. Its an anti-virus, but we already HAVE Windows Defender. These corporations should not be using some random 3rd party Antivirus, I doubt it even does much good, its just cargo-culting "oh, this is industry standard, so we have to use it." This is the kind of thinking/approach that Microsoft encourages.

  • Nuclear isn't perfect, but it is the best we have right now.
  • It having an inconclusive effect on wildlife, but wildlife clearly being able to survive in the region, doesn't really detract from what I originally thought.

    From the article you linked:

    "No matter what the consequences of lingering radiation might be, there were massive benefits to people leaving."

  • InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)CQ
    cqst @lemmy.blahaj.zone
    Posts 1
    Comments 47