85 points

remember kids, always use git condom

permalink
report
reply
8 points

XD had me rollin’!

permalink
report
parent
reply
6 points

Sorry, I’m new here and to Linux. I’ve read a little about git versioning, but I don’t get the joke. Can someone provide some insight?

permalink
report
parent
reply
9 points
*

Yeah, you can push and pull code to your repository with git. With this joke, you use the condom to stop all operations. XDXDXD

permalink
report
parent
reply
39 points

I don’t see how “scammers creating scam repos” [2] is newsworthy at all. At least the headline seems like a big nothing-burger to me.

farther down in the article are 2 interesting informations, namely this diagram [1] and the fact that scammers seem to have moved from pip to github, and then started to use forks to make their scam-clones appear more believable.

[1] https://apiiro.com/wp-content/uploads/2024/02/Malicious-Package-Timeline.png

[2] 1000 guys make 1000 clones of 1000 legit libraries, and than create 1000 forks of their clones, to make them seem more legit than the original lib. 999 of each 1000 clones get autofiltered by github

–> 100010001000*1000/1000 = 1.000.000.000 infected repos(inkluding forks) and 1.000.000 (wihout forks).

so the number of 100.000 infected repos doesn’t seem to be interesting or unexpected in any way.

permalink
report
reply
17 points
*

Do we see this very often with APK repos? I mean, for those using Obtainium to download apps from Github can one get malware via malicious apks?

permalink
report
reply
5 points

Of course you can. The actual question is: do you trust the author(s) of the repositories you’re pulling the APKs from? Including that they are keeping the repo secure from malicious influences? If the answer is “no”, then you shouldn’t add the repo, obviously. Every repository acts as an individual trust anchor. Unlike F-Droid or the play store, where the store itself acts as the trust anchor (or should, at least)

To be clear, I’m using obtainium for quite a few apps, but I’m rather rather careful which I add there and what apps I’m getting elsewhere.

permalink
report
parent
reply
2 points

If you installed the original legit package it can’t be updated with such fake one (without uninstalling and installing the bad one) as the signatures won’t match. If you initially install the bad package then yes of course.

permalink
report
parent
reply
1 point

If possible I get the Git repo from the F-Droid entry for this app. And I usually look at the activities and commits. I hope that helps.

permalink
report
parent
reply
1 point

You can get malware with the download of any soft, independent of it is FOSS or not. The clue is that it is for crackers easier to infect OpenSource if the soft has a deficient maintenance or it is abandoned, as is seen a lot on GitHub with apps that have not been updated for several years, like sadly this one, which was a very good app.

There is a lot of misunderstanding regarding OpenSource, the meaning of this type of software is to allow collaborative development, not limited to a small group of a company’s developers, as in the case of proprietary software, but as many believe, OpenSource is not a guarantee of security or privacy at all, this depends solely on the intentions of the author (not all of these are good guys) of this and that, as I said, that the software has maintenance and if possible an active community. Nothing worse than an abandoned and outdated OpenSorce, worse than an outdated proprietary soft.

It is essential in GitHub or another Git, to look at when it was last updated and, as in the case of any software, to review it with an AV before using or installing it and ALWAYS read the PP and TOS.

permalink
report
parent
reply
-2 points

No, apt has signatures and a team of maintainers whose job it is to verify the packages match what the Dev produced

permalink
report
parent
reply
17 points

Friends dont let friends install software that isn’t signed.

Use apt.

permalink
report
reply
12 points
*

Lol apt

Or to frame it differently, use a package manager and not appimages etc.

permalink
report
parent
reply
3 points

AppImages actually do have (optional) support for signatures.

permalink
report
parent
reply
2 points

They have no update feature afaik, how does this work? What verified this signature, the user?

permalink
report
parent
reply
1 point

Bu-bu-but mah flatpaaaaaacks

permalink
report
parent
reply
1 point

Flatpaks are a good system that tick every checkbox except “zero permissions by default” and “efficient by design”

permalink
report
parent
reply
3 points

I mean, yeah but not everything is available over apt. I try to use it whenever I can though

permalink
report
parent
reply
15 points

cries in AUR

permalink
report
reply
1 point

You mean laughs!

permalink
report
parent
reply
10 points

AUR has just as much ability to fuck you over as piping curl to sh as an installation method.

Check your PKGBUILDs every single time and make sure you (still!) trust whatever repos it’s pulling the source/binaries from.

permalink
report
parent
reply
7 points
*

I completely agree with you on the ability part. There already have been cases where there was malware in the AUR.

But the wiki specifically states to read the PKGBUILD and check the source url content before installing.

I don’t think the system is at fault here. I mean, getting viruses/malware has always been mostly due to lazyness, user error and lack of knowledge.

permalink
report
parent
reply

Open Source

!opensource@lemmy.ml

Create post

All about open source! Feel free to ask questions, and share news, and interesting stuff!

Useful Links

Rules

  • Posts must be relevant to the open source ideology
  • No NSFW content
  • No hate speech, bigotry, etc

Related Communities

Community icon from opensource.org, but we are not affiliated with them.

Community stats

  • 3.9K

    Monthly active users

  • 1.8K

    Posts

  • 30K

    Comments