• eldain@feddit.nl
    link
    fedilink
    arrow-up
    73
    arrow-down
    2
    ·
    2 days ago

    Ah yes, a Linux teenagers power fantasy. Hardened Gentoo and Selinux beats deblobbing btw, noob.

      • eldain@feddit.nl
        link
        fedilink
        arrow-up
        2
        ·
        15 hours ago

        Good old days :') I only noticed yesterday the grsec patches are no longer available, such a shame.

        • redsand@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          1
          ·
          15 hours ago

          The maintainer had an epic meltdown over hardware vendors using the code and both breaking the license agreement and implementing it wrong so it didn’t work right.

      • eldain@feddit.nl
        link
        fedilink
        arrow-up
        9
        ·
        2 days ago

        You can’t impress me with a bog standard Gentoo. If you want to show power, build a fortress. At least put some tripwire you mostly trip yourself on (program that keeps an encrypted hash database of your system files to find intrusion changes, needs an update with every update of course or it alerts only your negligence).

          • eldain@feddit.nl
            link
            fedilink
            arrow-up
            2
            ·
            15 hours ago

            I always wondered, did anyone ever find something with it? Wouldn’t a rootkit that is known enough to be in the detection file be outdated? But yes, you read the docs, points to you!

            • redsand@lemmy.dbzer0.com
              link
              fedilink
              English
              arrow-up
              2
              ·
              15 hours ago

              Yeah rkhunter looks for all the common kits BUT ALSO checks for suspicious changes if enabled as a service.

        • Petter1@discuss.tchncs.de
          link
          fedilink
          arrow-up
          4
          ·
          2 days ago

          Tripwire should encrypt everything and store key in RAM. Shutdown after 30s, if not emergency overwrite string is entered stored coded on real life paper in a vault with a 9 digits alphanumeric lock. 😏