Gizmos Freeware Reviews  

Go Back   Gizmo's Freeware Forum > Freeware Forum > Linux

Reply
 
Thread Tools Display Modes
Old 19. Oct 2013, 02:13 PM   #11 (permalink)
Editor [Android]
 
Cthulhux's Avatar
 
Join Date: Aug 2013
Posts: 271
Default

Quote:
Originally Posted by J_L View Post
Do you seriously think it only applies to old Windows versions?
"It was so in 1999, hence it also has to be in 2013" is a bad joke - at least I hope you weren't serious...

Quote:
Originally Posted by J_L View Post
Since when does exploit equal backdoor?
Since the NSA is known to buy exploits for spying users.

Quote:
Originally Posted by MidnightCowboy View Post
Still waiting for evidence of a single one that a Linux user can pick up during normal and correct usage of their system?
There you go. More?
__________________
Hi. I'm new here.
Cthulhux is offline   Reply With Quote
Old 19. Oct 2013, 04:07 PM   #12 (permalink)
Site Manager
 
MidnightCowboy's Avatar
 
Join Date: Aug 2008
Location: South American Banana Republic, third bunch from the left
Posts: 15,190
Default

But this is more server stuff again, plus..

"but that how the attackers gained the root privileges necessary to install the rootkit remains an open question".

Not even close to what a Linux desktop user is ever likely to encounter.
__________________
Buy a Hoover and prove technology sucks.
MidnightCowboy is offline   Reply With Quote
Old 19. Oct 2013, 04:08 PM   #13 (permalink)
Editor [Android]
 
Cthulhux's Avatar
 
Join Date: Aug 2013
Posts: 271
Default

I sat on a Linux desktop last week again. Took me three minutes to gain root access by exploiting the kernel.

(And no, infection by visiting a website is not server stuff...)
__________________
Hi. I'm new here.
Cthulhux is offline   Reply With Quote
Old 19. Oct 2013, 04:17 PM   #14 (permalink)
Site Manager
 
MidnightCowboy's Avatar
 
Join Date: Aug 2008
Location: South American Banana Republic, third bunch from the left
Posts: 15,190
Default

Quote:
Originally Posted by Cthulhux View Post
I sat on a Linux desktop last week again. Took me three minutes to gain root access by exploiting the kernel.

(And no, infection by visiting a website is not server stuff...)
So how does this self inflicted "exploit" affect general Linux users?

Also, there is absolutely no evidence that any Linux desktop user was ever compromised by the rootkit listed in the link you provided which is now almost a year old.
__________________
Buy a Hoover and prove technology sucks.
MidnightCowboy is offline   Reply With Quote
Old 19. Oct 2013, 04:21 PM   #15 (permalink)
Editor [Android]
 
Cthulhux's Avatar
 
Join Date: Aug 2013
Posts: 271
Default

Quote:
Originally Posted by MidnightCowboy View Post
So how does this self inflicted "exploit" affect general Linux users?
This particular exploit probably doesn't, I just wanted to mention that Linux is generally quite open for being exploited. (Why do you wrap that in quotation marks?) - As any local user can gain root access easily, what makes you think that trojans/rootkits distributed through compromised websites can't?

Quote:
Originally Posted by MidnightCowboy View Post
there is absolutely no evidence that any Linux desktop user was ever compromised
That's how rootkits work: You can't see them. This one seems to have spread quite a lot.
__________________
Hi. I'm new here.
Cthulhux is offline   Reply With Quote
Old 19. Oct 2013, 06:15 PM   #16 (permalink)
Site Manager
 
MidnightCowboy's Avatar
 
Join Date: Aug 2008
Location: South American Banana Republic, third bunch from the left
Posts: 15,190
Default

You are still quoting server based exploits without offering one shred of evidence about how these can infect an average Linux desktop user unless said user offers the malicious code physical root privileges to execute.

"what makes you think that trojans/rootkits distributed through compromised websites can't?"

You tell me how, because obviously I'm not smart enough to know.
__________________
Buy a Hoover and prove technology sucks.
MidnightCowboy is offline   Reply With Quote
Old 19. Oct 2013, 06:23 PM   #17 (permalink)
Editor [Android]
 
Cthulhux's Avatar
 
Join Date: Aug 2013
Posts: 271
Default

So the fact that even Linux servers (which should have a more "secure" setup than desktops) can easily be infected does not make you think that desktops are insecure?

Right, you don't (seem to) be smart enough to know. I'll try to make it easier for you: Search the web for "drive-by downloads".
__________________
Hi. I'm new here.
Cthulhux is offline   Reply With Quote
Old 19. Oct 2013, 07:43 PM   #18 (permalink)
J_L
Co-Author, Best Free Security List
 
J_L's Avatar
 
Join Date: Dec 2008
Posts: 2,003
Default

Quote:
Originally Posted by Cthulhux View Post
"It was so in 1999, hence it also has to be in 2013" is a bad joke - at least I hope you weren't serious...

Since the NSA is known to buy exploits for spying users.
You're the illogical one thinking Microsoft and the NSA loosened their grip from those days, especially with recent revelations.

No evidence once again, I wonder why? Please, enough with the opinions.

And since you seem to only have answers for some of my counterarguments by selectively quoting (amongst other issues), I don't think this conversation is going anywhere (just like in the past).
__________________
http://www.t7j7l.blogspot.com/
J_L is offline   Reply With Quote
Old 19. Oct 2013, 07:47 PM   #19 (permalink)
Editor [Android]
 
Cthulhux's Avatar
 
Join Date: Aug 2013
Posts: 271
Default

Quote:
Originally Posted by J_L View Post
You're the illogical one thinking Microsoft and the NSA loosened their grip from those days
Where have I said so? Please read my postings more carefully.

Most relevant PRISM stuff (including evidences that the NSA buys exploits) should have been published as of now, and I don't remember a Snowden document saying "we can easily access Windows machines remotely". Do you?

The "grip" between Microsoft and the NSA is bond to their "cloud" services, like Outlook.com and SkyDrive. They won't be more secure if you access them from Linsux, nor will other cloud services by other companies as long as they're (US-)American.

Once again: I hope you weren't serious...

Quote:
Originally Posted by J_L View Post
No evidence once again, I wonder why? Please, enough with the opinions.
Precisely. Please bring evidence for your NSAKEY allegation or admit that you just don't know.

Which relevant question have I missed to answer?
__________________
Hi. I'm new here.
Cthulhux is offline   Reply With Quote
Old 19. Oct 2013, 07:58 PM   #20 (permalink)
J_L
Co-Author, Best Free Security List
 
J_L's Avatar
 
Join Date: Dec 2008
Posts: 2,003
Default

Oh interesting, I thought you accepted the evidence and argued Linux has backdoors as well. Since your experience and Secunia can't even prove any backdoors on open-source Linux, you expect me to bring concrete evidence on closed-source Windows? Sorry, no can do; try Google or all the Windows exploits on Secunia.
__________________
http://www.t7j7l.blogspot.com/
J_L is offline   Reply With Quote
Reply

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are Off
Pingbacks are Off
Refbacks are Off



All times are GMT +1. The time now is 03:07 AM.


Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2019, vBulletin Solutions, Inc.