• 1 Post
  • 174 Comments
Joined 2 months ago
cake
Cake day: October 28th, 2024

help-circle

  • bootkitty wasn’t implemented ever and if you use GUID Partition Table and your bios is set to uefi without csm, it can’t affect you, since Bootkitty embeds itself into the Master Boot Record and there exploits the LogoFail vulrenability (this was already patched btw) with as far as i remember, a self-extracting steganographical bitmap image for arbritary code execution to bypass Secure Boot with injecting face certifications to Moklist. Also, it only runs on select devices, far from all Linux systems are vulrenabe.














  • kekmacska@lemmy.ziptolinuxmemes@lemmy.worldDistro Focuses
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    2
    ·
    4 days ago

    depends on workload. Debian has very old packages and can be insecure but it is a set it and forget it type of thing, it is good when uptime is critical for a server. For desktops, or servers that need better security, but can tolerate a little downtime, rolling releases are good too, if you are enough to update frequently, and you should, since updates usually contain a lot of patched vulrenabilities



  • kekmacska@lemmy.ziptolinuxmemes@lemmy.worldDistro Focuses
    link
    fedilink
    English
    arrow-up
    2
    ·
    4 days ago

    Tails in itself is reasonably secure too, but it was mostly designed for use with public computers and forensics, and ofc to conceal network activity that might seem suspicious. And it is a good solution if you need a portable linux, and your android phone is not a good choice for your use case.