GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    ramblingsteve (ramblingsteve@fosstodon.org)'s status on Friday, 19-Jul-2024 20:12:09 JST ramblingsteve ramblingsteve
    in reply to
    • Dave Lane :flag_tino: 🇳🇿

    @lightweight but...but... Linux isn't secure! 😂 🔥 💻

    In conversation about 10 months ago from fosstodon.org permalink
    • Embed this notice
      翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Friday, 19-Jul-2024 20:12:09 JST 翠星石 翠星石
      in reply to
      @ramblingsteve The kernel, Linux is known for having the best security record of all nontrivial kernels.

      There is also security hardening techniques you can use to make a system extremely hard to exploit - for example SELinux (with SELinux, even if you find a root privileged escalation attack in a daemon, you cannot read or write to anything outside what the daemon is authorized to access, unless you find a way to bypass SELinux - which pretty much doesn't happen unless the SELinux rules set are wrong).

      People like to count up the number of CVE's for all of the software in and that runs on GNU/Linux and then compare it with the count of CVE's for windows only and then say that windows is more secure because the number is smaller.

      The concept of CVE's is to embarrass proprietary software companies so they eventually go and fix the security bugs rather than leave them for years, which isn't useful for GNU/Linux, as if you just let the developer(s) know of the bug, they'll fix it, or better you can just fix the bug and send the fix in and the developer(s) will merge it immediately as long as it's correct.

      As a result, every single published CVE for GNU/Linux software is a bug that has long been fixed and usually isn't being actively exploited in mass, or is in known insecure software that is no longer maintained, while CVE's for windows are usually bugs that haven't yet been fixed for months, that are being actively exploited in mass.
      In conversation about 10 months ago permalink
    • Embed this notice
      Dave Lane :flag_tino: 🇳🇿 (lightweight@mastodon.nzoss.nz)'s status on Friday, 19-Jul-2024 20:12:12 JST Dave Lane :flag_tino: 🇳🇿 Dave Lane :flag_tino: 🇳🇿

      Watching what some are pronouncing "the world's worst IT disaster" unfolding from the comfort of a completely Enterprise-Windows-free zone that is, unsurprisingly, entirely unaffected. Sorry for those poor sods who're having to mop up this mess - created by IT policy makers who probably don't do 'on call'.

      In conversation about 10 months ago permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.