this post was submitted on 31 Aug 2023
203 points (91.4% liked)
Programming
17492 readers
43 users here now
Welcome to the main community in programming.dev! Feel free to post anything relating to programming here!
Cross posting is strongly encouraged in the instance. If you feel your post or another person's post makes sense in another community cross post into it.
Hope you enjoy the instance!
Rules
Rules
- Follow the programming.dev instance rules
- Keep content related to programming in some way
- If you're posting long videos try to add in some form of tldr for those who don't want to watch videos
Wormhole
Follow the wormhole through a path of communities !webdev@programming.dev
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Did you miss the part where I said they use the security argument to lock down the device and restrict the user? In addition, Linux distros in their default configuration may not be secure - but there are plenty of packages that can secure it down to a deep level. It just depends on the user's threat level assessment. That military establishment vs homeless tent analogy is just pure hyperbole and FUD.
Security doesn’t work like that and I find it important to share the insecure nature of most linux distros with many people, hopefully to make it improve one day.
Currently a
make install
can do literally anything to your computer besides installing a video card driver (as per the old xkcd comic) and sure there is firejail.. but let’s be honest, how often do you use it? Defaults matter, and thus linux is insecure.Also, again, how is osx locked down? What’s a concrete thing you can’t do on it?