• fubarx@lemmy.world
    link
    fedilink
    English
    arrow-up
    69
    arrow-down
    1
    ·
    edit-2
    13 hours ago

    If you download and install untrusted code extensions, you’re screwed. Not like it’s rocket-science.

    • evol@lemmy.today
      link
      fedilink
      English
      arrow-up
      4
      ·
      5 hours ago

      its kind of crazy how much I used to use the AUR, Was just randomly running randoms peoples scripts to install packages.

      • blackn1ght@feddit.uk
        link
        fedilink
        English
        arrow-up
        55
        ·
        9 hours ago

        Let’s be honest, how many current Linux users can trust any code that they run? There’s so many guides and instructions where you essentially copy/paste commands to install or configure something that it would be difficult for your average user to verify everything.

      • ambitiousslab@feddit.uk
        link
        fedilink
        English
        arrow-up
        20
        ·
        8 hours ago

        You can trust the software in your distro’s repositories (if you run a distro with well-maintained repositories). This is because, generally only well-known software gets packaged, the packager should be familiar with both the project and the code, and everything is rebuilt on the distro’s own infrastructure, to ensure that a given binary actually corresponds to the source.

        It might still be possible for things to slip through, but it’s certainly much safer than random programs from online.

      • RalfWausE@feddit.org
        link
        fedilink
        English
        arrow-up
        4
        ·
        11 hours ago

        Yourself and the code you read and understand. So as long as you don’t use a system where this is possible (say 9Front and the like) you trust nothing and nobody, do careful backups and don’t go on a installation spree.

      • ZILtoid1991@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        10 hours ago

        Depends on.

        If you’re not using your PC for highly critical applications, go high-trust mode, and read news about those who become untrustworthy.

        For critical applications, always check the usernames of the developers, use software trusted by others, etc.