🖖USS-Ethernet@startrek.website to Selfhosted@lemmy.worldEnglish · 10 hours agoI've been busystartrek.websiteimagemessage-square46fedilinkarrow-up1241arrow-down18file-text
arrow-up1233arrow-down1imageI've been busystartrek.website🖖USS-Ethernet@startrek.website to Selfhosted@lemmy.worldEnglish · 10 hours agomessage-square46fedilinkfile-text
minus-squarequick_snail@feddit.nllinkfedilinkEnglisharrow-up2arrow-down1·2 hours agoDocker will happily download malicious containers. It doesn’t use cryptography to verify what it downloads during the layer pull.
minus-squarekrashmo@lemmy.worldlinkfedilinkEnglisharrow-up2·2 hours agoThat’s overly dramatic phrasing and you know it. Adding this kind of hyper technical quip to a thread aimed at beginners is insane. Stop doing that.
minus-squareirmadlad@lemmy.worldlinkfedilinkEnglisharrow-up1·2 hours agoLinux can do that too from miners, backdoors/SSH credential stealers, bots, rare ransomware but they exist, rootkits, spyware, and supply‑chain attacks
Docker will happily download malicious containers. It doesn’t use cryptography to verify what it downloads during the layer pull.
That’s overly dramatic phrasing and you know it. Adding this kind of hyper technical quip to a thread aimed at beginners is insane. Stop doing that.
Linux can do that too from miners, backdoors/SSH credential stealers, bots, rare ransomware but they exist, rootkits, spyware, and supply‑chain attacks