☆ Yσɠƚԋσʂ ☆@lemmy.ml to Linux@lemmy.mlEnglish · 9 months agoShim vulnerability exposes most Linux systems to attackwww.zdnet.comexternal-linkmessage-square6fedilinkarrow-up139arrow-down113
arrow-up126arrow-down1external-linkShim vulnerability exposes most Linux systems to attackwww.zdnet.com☆ Yσɠƚԋσʂ ☆@lemmy.ml to Linux@lemmy.mlEnglish · 9 months agomessage-square6fedilink
minus-squarePossibly linux@lemmy.ziplinkfedilinkEnglisharrow-up8·9 months agoThe author sounds like they don’t fully understand Linux or how Linux boots. Anyone can just boot off of a USB or remove and modify the disk. The really protection for Linux is full disk encryption with a strong password.
The author sounds like they don’t fully understand Linux or how Linux boots.
Anyone can just boot off of a USB or remove and modify the disk. The really protection for Linux is full disk encryption with a strong password.