• 1 Post
  • 163 Comments
Joined 2 months ago
cake
Cake day: October 28th, 2024

help-circle

  • bootkitty wasn’t implemented ever and if you use GUID Partition Table and your bios is set to uefi without csm, it can’t affect you, since Bootkitty embeds itself into the Master Boot Record and there exploits the LogoFail vulrenability (this was already patched btw) with as far as i remember, a self-extracting steganographical bitmap image for arbritary code execution to bypass Secure Boot with injecting face certifications to Moklist. Also, it only runs on select devices, far from all Linux systems are vulrenabe.














  • kekmacska@lemmy.ziptolinuxmemes@lemmy.worldDistro Focuses
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    2
    ·
    5 days ago

    depends on workload. Debian has very old packages and can be insecure but it is a set it and forget it type of thing, it is good when uptime is critical for a server. For desktops, or servers that need better security, but can tolerate a little downtime, rolling releases are good too, if you are enough to update frequently, and you should, since updates usually contain a lot of patched vulrenabilities



  • kekmacska@lemmy.ziptolinuxmemes@lemmy.worldDistro Focuses
    link
    fedilink
    English
    arrow-up
    2
    ·
    5 days ago

    Tails in itself is reasonably secure too, but it was mostly designed for use with public computers and forensics, and ofc to conceal network activity that might seem suspicious. And it is a good solution if you need a portable linux, and your android phone is not a good choice for your use case.




  • kekmacska@lemmy.ziptolinuxmemes@lemmy.worldDistro Focuses
    link
    fedilink
    English
    arrow-up
    13
    ·
    5 days ago

    no, Qubes, Bazzite, Garuda were made with security in mind. Containerization, selinux enforcing, hash checks, address space layout randomization is also built in. These are all more secure than Fedora. Qubes for example, uses vm containers to completly isolate every app, so the system is almost impossible to compromise by malware or hacking. Bazzite uses immutable root file system, much like stock android. it may not along well with unix philosophies, but there isn’t really a way for a malicious code to run with elevated privilages or to manipulate system files. Garuda automatically creates snapshota from the system, so if it is compromised, it can be rolled back quickly. Snapshots for external devices or cloud are supported as well. It uses zram compression on swap, this helps avoid data leakages to the disk, so makes sure that after a reboot, every session quits, since data from ram can’t leak on the disk. it also uses firejail and chaotic aur sandboxing. There is a smaller support for secure boot too. So these are all highly secure operating systems. And to some degree, privacy and security overlap each other.