🖖USS-Ethernet@startrek.website to Selfhosted@lemmy.worldEnglish · 9 hours agoI've been busystartrek.websiteimagemessage-square46fedilinkarrow-up1231file-text
arrow-up1231imageI've been busystartrek.website🖖USS-Ethernet@startrek.website to Selfhosted@lemmy.worldEnglish · 9 hours agomessage-square46fedilinkfile-text
minus-squarequick_snail@feddit.nllinkfedilinkEnglisharrow-up2·2 hours agoDocker will happily download malicious containers. It doesn’t use cryptography to verify what it downloads during the layer pull.
minus-squareirmadlad@lemmy.worldlinkfedilinkEnglisharrow-up1·51 minutes agoLinux can do that too from miners, backdoors/SSH credential stealers, bots, rare ransomware but they exist, rootkits, spyware, and supply‑chain attacks
minus-squarekrashmo@lemmy.worldlinkfedilinkEnglisharrow-up1·57 minutes agoThat’s overly dramatic phrasing and you know it. Adding this kind of hyper technical quip to a thread aimed at beginners is insane. Stop doing that.
Docker will happily download malicious containers. It doesn’t use cryptography to verify what it downloads during the layer pull.
Linux can do that too from miners, backdoors/SSH credential stealers, bots, rare ransomware but they exist, rootkits, spyware, and supply‑chain attacks
That’s overly dramatic phrasing and you know it. Adding this kind of hyper technical quip to a thread aimed at beginners is insane. Stop doing that.