this post was submitted on 20 Apr 2024
563 points (90.9% liked)

linuxmemes

21031 readers
419 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack members of the community for any reason.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • These rules are somewhat loosened when the subject is a public figure. Still, do not attack their person or incite harrassment.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn. Even if you watch it on a Linux machine.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, and wants to interject for a moment. You can stop now.

  • Please report posts and comments that break these rules!

    founded 1 year ago
    MODERATORS
     
    you are viewing a single comment's thread
    view the rest of the comments
    [–] Aux@lemmy.world 4 points 6 months ago (2 children)

    Not sure what you're doing there, but it's pretty much every other command needs sudo here... Can't even install updates without it.

    [–] uis@lemm.ee 3 points 6 months ago (1 children)

    Except when you install something on linux package manager of your distro is executed as opposed to installer that was made by developer of package you are installing. And you probably install install packages from your distro's repos, unless you are on Debian of course.

    Or you can run package manager as user that usually installs in ~/.local. Or unpack yourself.

    [–] areyouevenreal@lemm.ee 1 points 6 months ago

    Package managers have post install scripts and hooks that would allow you to install a rootkit. Then again they can also just add services on many Linux systems, which can run as root. Just put a systemd unit file in the right place and enable it.

    The security advantage of Linux is having trusted repos and using things like FlatPak. System packages being malicious would very much be able to infect a system. Just look at the XZ backdoor for an example.

    [–] baseless_discourse@mander.xyz 1 points 6 months ago* (last edited 6 months ago)

    The safest way to install update is via offline updates, which don't need sudo on the user side, but requires a restart. See https://fedoramagazine.org/offline-updates-and-fedora-35/ for a good explanation.

    I believe offline upgrade is also the default on every OS out there, for example gnome software only installs updates offline.

    Even if you have to use sudo to upgrade (or journalctl, dmesg, both are sysadmin tasks and not typically done by a normal user), you are still only giving root privileges to these trusted programs distributed by your distro, not some random installers on the internet, unless you are using AUR.

    I am genuinely curious what other commands with sudo that you need to run on a daily bases, for tasks that is unrelated to system administration?