this post was submitted on 17 May 2026
980 points (99.4% liked)
Technology
84796 readers
4267 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Copy Fail in Linux sounds similar.
One is a backdoor, another is a bug. How are they similar?
Both allow access to secure systems both were introduced years ago. I don’t know the Linux developer so I have no access to as to what was influencing so it can be just a bug, however it the type of bug that a lot of people would like to introduce into the kernel. Given that, they look very similar to me.
Why are you lying? One is a privilege exploit that has been patched. It lets someone who can already run software on your machine do more. This is a backdoor that could allow hostile governments or thieves to steal your files from any machine in their possession. Things what would always have been secure on any Linux machine from the last 20 years.
Lying? Copy Fail is big news and was introduced into the kernel years ago. Sounds very similar in the way it was introduced and the ease of exploitation if you have access to a machine.
Encryption is security at rest. An encrypted drive on a system that isn't backdoored cannot be accessed no matter what tricks you have in store because you can't read its storage even insofar as booting it up. It's literally mathematically impossible insofar as it requires more cpu power than exists to guess the key required to decrypt the drive. In order to use the Linux exploits you must get the target to enter the encryption passphrase and run your malware.
What you are complaining of is weak interior doors that don't provide much additional help if a crew of armed thugs break down your secure exterior door.and get by your armed guard.
The MS exploit is a key to your house hidden under the welcome mat with a post it note with the combo to your safe. It appears to have been deliberately put their by MS to help the government hack your machine if you ever did anything naughty but now means that every corporate machine in the last several years that was swiped or lost which was believed to be secured is now an open question as far as what data on it may yet be gleaned and by whom.
It does not.
It’s very similar in that it was introduced years ago, requires access to a machine, allows privileged access and is easy to exploit. There are a lot of people that would love it.