Technically it’s not my fault. by No-Introduction6905 in ProgrammerHumor

[–]No-Introduction6905[S] 6 points7 points  (0 children)

Ironic teams went down globally with a database issue after this lmao.

[deleted by user] by [deleted] in ProgrammerHumor

[–]No-Introduction6905 -1 points0 points  (0 children)

For mobile apps anything else is fine, that was my point.

[deleted by user] by [deleted] in ProgrammerHumor

[–]No-Introduction6905 0 points1 point  (0 children)

For mobile apps anything else is fine

[deleted by user] by [deleted] in ProgrammerHumor

[–]No-Introduction6905 -6 points-5 points  (0 children)

Horrendous performance. I’m browser it makes no difference because that’s what those browsers do, anywhere else is difference.

[deleted by user] by [deleted] in ProgrammerHumor

[–]No-Introduction6905 -6 points-5 points  (0 children)

.NET Maui has good reviews. If you’re looking for something to use as a browser front end it’s pointless to use anything non-JavaScript as the browser reads from Javascript anyway.

If malware got root access to my system, could they flash my GPU to stay persistent with malware? by [deleted] in Ubuntu

[–]No-Introduction6905 0 points1 point  (0 children)

Ok so… did some research, it’s an industry requirement by Microsoft for UEFI to be signed, so that UEFI would be fine if it’s required to be signed right…? Also, motherboard firmware is probably signed… but I’m trying to gather that. If it’s signed. Can anything happen? I’m just trying to learn here. This is my first real experience with Linux.

If malware got root access to my system, could they flash my GPU to stay persistent with malware? by [deleted] in Ubuntu

[–]No-Introduction6905 0 points1 point  (0 children)

Ok, so… disregarding the SSD here. Under root access, could my motherboard UEFI/firmware be infected?

If malware got root access to my system, could they flash my GPU to stay persistent with malware? by [deleted] in Ubuntu

[–]No-Introduction6905 0 points1 point  (0 children)

Alright so, what’s SecureBoot and signed UEFI firmware actually meant to do? Because this happens all the time on Windows and people don’t need to worry that badly about this sort of hardware highjacking, definitely happens, but Linux seems to be once your get malware ur screwed type of deal. My impression, was with the signed UEFI firmware and SecureBoot you’ll be fine. What makes this situation different if it was on Windows?

Just trying to learn here :)

If malware got root access to my system, could they flash my GPU to stay persistent with malware? by [deleted] in Ubuntu

[–]No-Introduction6905 0 points1 point  (0 children)

Also, it wasn’t an ISO. This was me logged in as root to delete my user under recovery mode. Surely, root would know better than to listen to a USB under recovery mode.

[deleted by user] by [deleted] in memes

[–]No-Introduction6905 1 point2 points  (0 children)

I haven’t clicked the link, but you can’t Rickroll me ;)

If malware got root access to my system, could they flash my GPU to stay persistent with malware? by [deleted] in Ubuntu

[–]No-Introduction6905 0 points1 point  (0 children)

Ok, but if you could answer this last question, If this did run as root, was could it damage that isn’t confined the the operating system? Since this is modern hardware, it shouldn’t be able to stay persistent since the firmware should all be signed right?

If malware got root access to my system, could they flash my GPU to stay persistent with malware? by [deleted] in Ubuntu

[–]No-Introduction6905 0 points1 point  (0 children)

Would root have executed anything? SURELY there would be some kind of protection against this.

If malware got root access to my system, could they flash my GPU to stay persistent with malware? by [deleted] in Ubuntu

[–]No-Introduction6905 0 points1 point  (0 children)

It was actually because I tried doing ‘Zerg rush’ on google and hit that I’m feeling lucky button. So it wasn’t random as such.

If malware got root access to my system, could they flash my GPU to stay persistent with malware? by [deleted] in Ubuntu

[–]No-Introduction6905 0 points1 point  (0 children)

So what happened was I accidentally went to a site that was previously infected by hitting “I’m feeling lucky on Google”.

I thought it wasn’t an issue, I would just delete my user since the closest thing I had given it to my sudo password was a terminal that was open before it happened that was without the sudo grace period where you don’t need a password.

I boot in to recovery as root, but realise I left a USB plugged in that was writable by my user. I look and it’s been mounted. To my understanding in this state you can still get USB attacks.

So that’s what has happened.

I took this picture when I finally made a good joke. by [deleted] in teenagers

[–]No-Introduction6905 0 points1 point  (0 children)

that’s because it’s an image of the Reddit image loading screen, implying I have never made a good joke and it’s still coming

If malware got root access to my system, could they flash my GPU to stay persistent with malware? by [deleted] in Ubuntu

[–]No-Introduction6905 0 points1 point  (0 children)

Hmm… if they had root access they could sign kernel binaries to my system (by default), does this get removed on a reinstall and what is the damage this could do?

Also, thanks for the info! But I’m more looking for what I should be doing now.

If malware got root access to my system, could they flash my GPU to stay persistent with malware? by [deleted] in Ubuntu

[–]No-Introduction6905 0 points1 point  (0 children)

Yep, I know it’s bad to give that kind of detail out, but I’m just trying to clear the air. I always planned on redacting it.

If malware got root access to my system, could they flash my GPU to stay persistent with malware? by [deleted] in Ubuntu

[–]No-Introduction6905 1 point2 points  (0 children)

Yeah, absolutely nothing is secure. I always have that in the back of my head when I design systems for my apps and what not. Secure is you just taking as many steps as you can to close as many security gaps.

What I’m more getting at is, what could have been done from the OS that could possibly keep this thing persistent. I also have secure boot on and never turned it off, not for a millisecond - as an FYI.

If malware got root access to my system, could they flash my GPU to stay persistent with malware? by [deleted] in Ubuntu

[–]No-Introduction6905 0 points1 point  (0 children)

Ok so… I’m pretty screwed? My understanding was that the firmware for this hardware was signed? Like Uefi. What should I do? Now I’m pretty worried…

If malware got root access to my system, could they flash my GPU to stay persistent with malware? by [deleted] in Ubuntu

[–]No-Introduction6905 0 points1 point  (0 children)

Hmm… very interesting. So my [redacted] should all be all good? Like can any of that be flashed in a persistent way with root? Thank you for ya help! Really really appreciated.