this post was submitted on 17 May 2026
980 points (99.4% liked)

Technology

84796 readers
4289 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] michaelmrose@lemmy.world 14 points 1 day ago (1 children)

Why are you lying? One is a privilege exploit that has been patched. It lets someone who can already run software on your machine do more. This is a backdoor that could allow hostile governments or thieves to steal your files from any machine in their possession. Things what would always have been secure on any Linux machine from the last 20 years.

[–] Greyghoster@aussie.zone -5 points 1 day ago (1 children)

Lying? Copy Fail is big news and was introduced into the kernel years ago. Sounds very similar in the way it was introduced and the ease of exploitation if you have access to a machine.

[–] michaelmrose@lemmy.world 2 points 23 hours ago

Encryption is security at rest. An encrypted drive on a system that isn't backdoored cannot be accessed no matter what tricks you have in store because you can't read its storage even insofar as booting it up. It's literally mathematically impossible insofar as it requires more cpu power than exists to guess the key required to decrypt the drive. In order to use the Linux exploits you must get the target to enter the encryption passphrase and run your malware.

What you are complaining of is weak interior doors that don't provide much additional help if a crew of armed thugs break down your secure exterior door.and get by your armed guard.

The MS exploit is a key to your house hidden under the welcome mat with a post it note with the combo to your safe. It appears to have been deliberately put their by MS to help the government hack your machine if you ever did anything naughty but now means that every corporate machine in the last several years that was swiped or lost which was believed to be secured is now an open question as far as what data on it may yet be gleaned and by whom.