Step 1. install opendoas
An article about tweaking sudo without insults?
Insults is a bonus after tip 7
Oops guess I didn’t read far enough ;)
Please stop the blogspam. Nobody wants to see yet another shitty list.
bu-bu-but number 4 will shock you!
You are right. I expected to see a boring list of most frequently used options from
/etc/sudoers
, but WOW! The author is very brave guy!
I.e. how malware could easily catch your Sudo password without root access.
Peeps, bad news, Linux is damn insecure.
By simply placing an alias in your bashrc they could already grab your sudo password.
Another bad news, this Windows “okay” Button without any password is actually more secure.
Either you’re trolling - in which case, sod off back to Reddit - or you have a woeful misunderstanding of how Linux user permissions work.
Please explain how someone might “simply change” someone else’s .bashrc without either already having access to that user account, or root access on the whole machine?
The idea is malware you installed would presumably run under your user account and have access. You could explicitly give it different UIDs or even containerize it to counteract that, but by default a process can access everything it’s UID can, which isn’t great. And even still to this day that’s how users execute a lot of processes.
Windows isn’t much better here, though.