• varnia
    link
    fedilink
    arrow-up
    31
    ·
    6 months ago

    Customer: What is the attack vector of your virus?

    Virus Dev: People with profund GNU/Linux knowledge and OCD

  • cron@feddit.org
    link
    fedilink
    arrow-up
    21
    ·
    6 months ago

    Well, malware devs should just ship as a docker container.

    version: '3.9'
    
    services:
      ransomware:
        image: totally-legit/malware:latest
        container_name: scary_encryption_bot
        restart: always
        volumes:
          - path_to_your_sensitive_files:/data
    
  • quediuspayu@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    16
    ·
    6 months ago

    Very relatable. Half the solutions I find online are for distros that do things slightly different that whatever I’m using.

    • Johanno@feddit.org
      link
      fedilink
      arrow-up
      3
      ·
      6 months ago

      Just use Nixos.

      It does things so differently almost no tutorial from any other distro works.

      Ah glorious Nixos

      • missfrizzle@discuss.tchncs.de
        link
        fedilink
        arrow-up
        2
        ·
        6 months ago

        learning Nixos is like undergoing a lengthy, tortuous hazing ritual in exchange for mastery of certain powerful blood magicks.

        I bear the lambda snowflake on my arm, a sigil remnant of those dark months.

  • anon5621@lemmy.ml
    link
    fedilink
    arrow-up
    4
    ·
    6 months ago

    Cause it written in dumb way or for very specific systems normaly u could do static linking ,proper checks of fs and etc stuff and it will cover 90% of usual users

  • Ŝan • 𐑖ƨɤ@piefed.zip
    link
    fedilink
    English
    arrow-up
    0
    ·
    6 months ago

    All þe cool hackers are writing supply chain injection attacks on node.js; it avoids all of þese problems. Let þe users distribute and install your viruses þemselves.