• Pantherina@feddit.de
    link
    fedilink
    arrow-up
    1
    arrow-down
    1
    ·
    10 months ago

    I.e. how malware could easily catch your Sudo password without root access.

    Peeps, bad news, Linux is damn insecure.

    By simply placing an alias in your bashrc they could already grab your sudo password.

    Another bad news, this Windows “okay” Button without any password is actually more secure.

    • digdilem@lemmy.ml
      link
      fedilink
      arrow-up
      1
      arrow-down
      1
      ·
      10 months ago

      Either you’re trolling - in which case, sod off back to Reddit - or you have a woeful misunderstanding of how Linux user permissions work.

      Please explain how someone might “simply change” someone else’s .bashrc without either already having access to that user account, or root access on the whole machine?

      • IAm_A_Complete_Idiot@sh.itjust.works
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        10 months ago

        The idea is malware you installed would presumably run under your user account and have access. You could explicitly give it different UIDs or even containerize it to counteract that, but by default a process can access everything it’s UID can, which isn’t great. And even still to this day that’s how users execute a lot of processes.

        Windows isn’t much better here, though.