this post was submitted on 20 Apr 2024
565 points (90.9% liked)

linuxmemes

21637 readers
739 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack members of the community for any reason.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • These rules are somewhat loosened when the subject is a public figure. Still, do not attack their person or incite harrassment.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn. Even if you watch it on a Linux machine.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, and wants to interject for a moment. You can stop now.
  •  

    Please report posts and comments that break these rules!


    Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't fork-bomb your computer.

    founded 2 years ago
    MODERATORS
     
    you are viewing a single comment's thread
    view the rest of the comments
    [–] baseless_discourse@mander.xyz 8 points 8 months ago* (last edited 8 months ago) (1 children)

    Let's not pretend regedit is a good thing, it is littered with unreadable keys and has terrible UI and UX. And it requires root privileges to edit anything.

    I believe one of the worst disservice Windows has done to secure computing is to make users desensitized about root privileges. Every single action you do need root privileges, install app, changing config, people would just click allow whenever UAC pops up...

    This means any program can easily inject rootkit into Windows during install, without the users noticing a thing, like LoL.

    [–] Crashumbc@lemmy.world 4 points 8 months ago (1 children)
    [–] baseless_discourse@mander.xyz -1 points 8 months ago* (last edited 8 months ago) (1 children)

    You don't need to use sudo command that much on linux. I personally only need to use it to edit two config files when setting up my system, that is it.

    One for pre-connection mac randomization, one to enable a kernel module I need, because my distro disable many of them by default. I am very conscious of the changes I am making. However on Windows, I have no idea what the app installers are doing.

    Not to mention, most users don't even need to make these changes. Per-network randomization is likely good enough for most user, and they probably not on a security-hardened distro which disables tons of kernel modules.

    For a office work and entertainments, flatpak apps are more than enough. And developers can choose to get their sdk via flatpak or podman dev containers. None of them requires sudo.

    Is there a good reason for a everyday user (not a tinker nor a system admin) to use sudo in linux?

    [–] Aux@lemmy.world 4 points 8 months ago (2 children)

    Not sure what you're doing there, but it's pretty much every other command needs sudo here... Can't even install updates without it.

    [–] uis@lemm.ee 3 points 8 months ago (1 children)

    Except when you install something on linux package manager of your distro is executed as opposed to installer that was made by developer of package you are installing. And you probably install install packages from your distro's repos, unless you are on Debian of course.

    Or you can run package manager as user that usually installs in ~/.local. Or unpack yourself.

    [–] areyouevenreal@lemm.ee 1 points 8 months ago

    Package managers have post install scripts and hooks that would allow you to install a rootkit. Then again they can also just add services on many Linux systems, which can run as root. Just put a systemd unit file in the right place and enable it.

    The security advantage of Linux is having trusted repos and using things like FlatPak. System packages being malicious would very much be able to infect a system. Just look at the XZ backdoor for an example.

    [–] baseless_discourse@mander.xyz 1 points 8 months ago* (last edited 8 months ago)

    The safest way to install update is via offline updates, which don't need sudo on the user side, but requires a restart. See https://fedoramagazine.org/offline-updates-and-fedora-35/ for a good explanation.

    I believe offline upgrade is also the default on every OS out there, for example gnome software only installs updates offline.

    Even if you have to use sudo to upgrade (or journalctl, dmesg, both are sysadmin tasks and not typically done by a normal user), you are still only giving root privileges to these trusted programs distributed by your distro, not some random installers on the internet, unless you are using AUR.

    I am genuinely curious what other commands with sudo that you need to run on a daily bases, for tasks that is unrelated to system administration?