Please correct my English.

The lemming formerly known as:

  • 0 Posts
  • 18 Comments
Joined 1 year ago
cake
Cake day: December 31st, 2024

help-circle











  • And nope, not named after the Farscape character…

    https://aerynos.com/blog/2025/02/14/evolve-this-os/

    Pronounced like “Erin”, it’s a name that we feel is more befitting of the project. Pulling from multiple etymologies, it’s a name that better describes the project now versus the project that started as Serpent OS.

    “Aer” is rather obvious, Latin in origin. The phonetic “Erin” is a nod to the Irish roots of the project, and of course a home. There are a number of reasons for the name, which will form part of the initial documentation on the new website.

    Our intent is to have a name that is more inviting, and more descriptive of the project’s goals and aspirations. We’re not anti-establishment or anti-corporation - if anything, we’re a statement that without the fiscal handcuffs, we can produce a technically sound and user-friendly operating system.

    https://aerynos.dev/aerynos/faq/

    What does AerynOS mean and how do I pronounce it?

    AerynOS is a stylised spelling of “Erin”, alluding to the project’s Irish roots. It is pronounced exactly the same as “Erin” - “AIR-in” OS. It’s also a play on “aer” and the phonetic “air” sound, indicative of our desire to produce an open, trusted and high-performance operating system.

    It’s pronounced as “AIR-in” OS.





  • Yes, this particular incident.

    https://en.wikipedia.org/wiki/XZ_Utils_backdoor

    In February 2024, a malicious backdoor was introduced to the Linux build of the xz utility within the liblzma library in versions 5.6.0 and 5.6.1 by an account using the name “Jia Tan”.[b][4] The backdoor gives an attacker who possesses a specific Ed448 private key remote code execution through OpenSSH on the affected Linux system. The issue has been given the Common Vulnerabilities and Exposures number CVE-2024-3094 and has been assigned a CVSS score of 10.0, the highest possible score.[5]

    Microsoft employee and PostgreSQL developer Andres Freund reported the backdoor after investigating a performance regression in Debian Sid.[8] Freund noticed that SSH connections were generating an unexpectedly high amount of CPU usage as well as causing errors in Valgrind,[9] a memory debugging tool.[10]