Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 29 days agoCritical Linux Vulnerabilities Expose Password Hashes on Millions of Linux Systems Worldwidecybersecuritynews.comexternal-linkmessage-square5fedilinkarrow-up125arrow-down14
arrow-up121arrow-down1external-linkCritical Linux Vulnerabilities Expose Password Hashes on Millions of Linux Systems Worldwidecybersecuritynews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 29 days agomessage-square5fedilink
minus-squareChristoph Schmees@social.tchncs.delinkfedilinkarrow-up13·29 days ago@kid Much ado about nothing. An attacker needs at least physical access to the device. Wow, what a danger. cf. “The 10 Immutable Laws Of Security” “Law #3: If a bad guy has unrestricted physical access to your computer, it’s not your computer anymore.” https://uptakedigital.zendesk.com/hc/en-us/articles/115000412533-10-Immutable-Laws-Of-Security-Version-2-0
minus-squareClemaX@lemm.eelinkfedilinkEnglisharrow-up1·28 days agoIt is an issue in a managed environment such as on corporation or school PCs.
@kid
Much ado about nothing.
An attacker needs at least physical access to the device. Wow, what a danger.
cf. “The 10 Immutable Laws Of Security”
“Law #3: If a bad guy has unrestricted physical access to your computer, it’s not your computer anymore.”
https://uptakedigital.zendesk.com/hc/en-us/articles/115000412533-10-Immutable-Laws-Of-Security-Version-2-0
It is an issue in a managed environment such as on corporation or school PCs.