• fubarx@lemmy.world
    link
    fedilink
    English
    arrow-up
    70
    arrow-down
    1
    ·
    edit-2
    15 hours ago

    If you download and install untrusted code extensions, you’re screwed. Not like it’s rocket-science.

    • evol@lemmy.today
      link
      fedilink
      English
      arrow-up
      4
      ·
      8 hours ago

      its kind of crazy how much I used to use the AUR, Was just randomly running randoms peoples scripts to install packages.

      • blackn1ght@feddit.uk
        link
        fedilink
        English
        arrow-up
        59
        ·
        11 hours ago

        Let’s be honest, how many current Linux users can trust any code that they run? There’s so many guides and instructions where you essentially copy/paste commands to install or configure something that it would be difficult for your average user to verify everything.

      • ambitiousslab@feddit.uk
        link
        fedilink
        English
        arrow-up
        20
        ·
        11 hours ago

        You can trust the software in your distro’s repositories (if you run a distro with well-maintained repositories). This is because, generally only well-known software gets packaged, the packager should be familiar with both the project and the code, and everything is rebuilt on the distro’s own infrastructure, to ensure that a given binary actually corresponds to the source.

        It might still be possible for things to slip through, but it’s certainly much safer than random programs from online.

      • RalfWausE@feddit.org
        link
        fedilink
        English
        arrow-up
        4
        ·
        14 hours ago

        Yourself and the code you read and understand. So as long as you don’t use a system where this is possible (say 9Front and the like) you trust nothing and nobody, do careful backups and don’t go on a installation spree.

      • ZILtoid1991@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        12 hours ago

        Depends on.

        If you’re not using your PC for highly critical applications, go high-trust mode, and read news about those who become untrustworthy.

        For critical applications, always check the usernames of the developers, use software trusted by others, etc.

  • chocrates@piefed.world
    link
    fedilink
    English
    arrow-up
    48
    arrow-down
    1
    ·
    16 hours ago

    Doesn’t say anything about the exploits. Just talks about a command and control suite.

  • Sims@lemmy.ml
    link
    fedilink
    English
    arrow-up
    9
    arrow-down
    122
    ·
    17 hours ago

    “The VoidLink interface is localized for Chinese-affiliated operators, an indication that it likely originates from a Chinese-affiliated development environment.”

    Baha, shit propaganda… Yes of cause it MUST be the Chinese ! I mean, it is impossible to fake an interface in another language, and we all know they are out to eat our children… sigh…

    And who says ? This is not better than the shit corps amazon, micro***p, etc, that are now identifying foreign ‘threats’ for the US Fascist regime. Who gave private corps the right to examine AND convict other nations - without any transparency or oversight - on a whim from their Boss.

    Get away from US *unts and their insane propaganda - ASAP !!

    • Zomg@piefed.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 hours ago

      Yikers lmaooo. Maybe it could… but what if…OMG it’s true? you aren’t in control of your own thoughts it seems.

    • acosmichippo@lemmy.world
      link
      fedilink
      English
      arrow-up
      11
      ·
      edit-2
      12 hours ago

      you know, you’re right. it couldn’t have been china or russia since it’s far more advanced than typical.

      • TipsyMcGee@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        7
        ·
        9 hours ago

        The reasoning is curious: “This thing that China is credibly accused of doing is bad, therefore it cannot be China that’s doing it”.

    • Em Adespoton@lemmy.ca
      link
      fedilink
      English
      arrow-up
      74
      arrow-down
      3
      ·
      17 hours ago

      Have you looked at the files? They were obviously generated in a Chinese-affiliated development environment, and the interface is designed for Chinese speakers. Which is exactly what they said. They very pointedly DIDN’T say that the malware was written by the Chinese government or one of their affiliates.

      It’s also not in the same style as the stuff generated by the various Chinese APT groups, so is likely by some third party with Chinese connections. It’s a very methodical and thorough collection, but it wasn’t discovered via an attack — the researchers stumbled across the test environment. And that’s not something that’s likely to be the case with state actor-related groups.

  • tidderuuf@lemmy.world
    link
    fedilink
    English
    arrow-up
    17
    arrow-down
    70
    ·
    18 hours ago

    With no indication that VoidLink is actively targeting machines, there’s no immediate action required by defenders, although they can obtain indicators of compromise from the Checkpoint blog post.

    Don’t click on the article. It’s an AI regurgitated summary and internet rot site.

    You’re welcome.

    • Nawor3565@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      67
      arrow-down
      3
      ·
      17 hours ago

      Did you just call Ars Technica an “internet rot site”?

      Good way to make it obvious you don’t know what you’re talking about without saying you don’t know what you’re talking about.

      • tidderuuf@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        31
        ·
        14 hours ago

        Do I need to repeat myself or is your skull too thick? Try using those links in a year from now Ars is literally an Arse of the tech industry.

        • Passerby6497@lemmy.world
          link
          fedilink
          English
          arrow-up
          5
          arrow-down
          1
          ·
          7 hours ago

          It might help if you actually said something rather than just trolling with below average bait (assuming you are trolling and not just intellectually battling a door stop for 3rd place)

    • Em Adespoton@lemmy.ca
      link
      fedilink
      English
      arrow-up
      52
      arrow-down
      1
      ·
      17 hours ago

      Considering Dan isn’t a bot and responds to comments in the forum, I suspect you have no clue what you’re talking about.

      The sourced research he cites is also not AI generated.

      • youmaynotknow@lemmy.zip
        link
        fedilink
        English
        arrow-up
        3
        arrow-down
        3
        ·
        10 hours ago

        ‘Usually’ being the operating word. It’s still a media Corp owned company part of Condé Nast, like Wired.