• 0 Posts
  • 40 Comments
Joined 5 months ago
cake
Cake day: February 17th, 2025

help-circle

  • Yes. Memory allocated, but not written to, still counts toward your limit, unlike in overcommit modes 0 or 1.

    The default is to hope that not enough applications on the system cash out on their memory and force the system OOM. You get more efficient use of memory, but I don’t like this approach.

    And as a bonus, if you use overcommit 2, you get access to vm.admin_reserve_kbytes which allows you to reserve memory only for admin users. Quite nice.







  • unhrpetby@sh.itjust.workstolinuxmemes@lemmy.worldStallman
    link
    fedilink
    English
    arrow-up
    36
    ·
    edit-2
    2 months ago

    If such a project were to become compromised (the way XZ-Utils was), it would eventually spread to Ventoy.

    What a lot of people don’t know is that the XZ attack entirely relied on binary blobs: Partially in the repo as binary test files, and partially in only the github release (binary).

    If someone actually built it from source, they weren’t vulnerable. So contrary to some, it wasn’t a vulnerability that was in plain view that somehow passed volunteer review.

    This is why allowing binary data in open-source repos should be heavily frowned upon.


  • Really Linux distros just didn’t work with it right out of the box…

    From what I’ve read, this is misleading. Default secureboot within Windows will only boot a bootloader signed with Microsoft’s key. Although Microsoft does seem to provide a signing service for signing with their keys, this is at their mercy. Windows made a change that broke booting alternative operating systems unless they use a service that Windows provides to fix it, or disable secureboot.

    The “I hate change.” Mindset.

    Or maybe it’s extra complexity that often leads to the first recommendation to fixing Linux not booting being “disable secureboot” and how this is an extra hurdle to jump through for new users. As well as increased likelihood of problems, due to secureboot.










  • Simply: Do the protections against someone taking your computer and installing a malicious program before/as your OS, or a program that has attained root on your machine and installs itself before/as your OS, matter enough to you to justify the increased risk of being locked out of your machine and the effort to set it up and understand it.

    If you don’t understand and don’t want to put in the effort to, then my advice would be to leave it off. Its simple, and the likelihood it saves you is probably very miniscule.



  • A threat model in which you don’t trust the Linux Foundation and volunteers but do trust Microsoft.

    Its all about what you want to protect. If a security breach is worse for you on Linux than it is on Windows because of which party has the data, then for you, Windows might be more secure.

    Some people get confused because they think there is some objective measurable security rating one can apply to a system for every person. There isn’t. We may use the same systems but have different threat models and thus rate the security different.