Most mainstream distros are based on Ubuntu or ReadHat, but there really
is no difference twixt the two.
The central theme of Ubuntu is SECURITY. Yes, ridiculous SECURITY.
To satisfy the delusions of brain-dead maintainers, Ubuntu is literally riddled,
and hence crippled, with security "features." Check 'em out:
https://wiki.ubuntu.com/Security/FeaturesHoly godzilla mutherfuckers! They got more security shit than I have hairs on
my testicles!
Any desktop workstation user that installs Ubuntu, or its derivatives, is a seriously
fucked idiot.
Check out my vulnerability report:
[~]# grep . /sys/devices/system/cpu/vulnerabilities/*
/sys/devices/system/cpu/vulnerabilities/gather_data_sampling:Vulnerable: No microcode
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Processor vulnerable
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/mmio_stale_data:Vulnerable
/sys/devices/system/cpu/vulnerabilities/reg_file_data_sampling:Not affected
/sys/devices/system/cpu/vulnerabilities/retbleed:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spec_rstack_overflow:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Vulnerable: __user pointer sanitization and user
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerable; IBPB: disabled; STIBP: disabled; PBR
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Vulnerable
[~]# uname -a
Linux odysseus.xxxxxxxxxx 6.9.1 #1 SMP Sun May 19 10:12:55 EDT 2024 x86_64 Intel(R) Xeon(R) W-2223 CPU @ 3.60GHz GenuineIntel GNU/Linux
Whoa baby! I is vulnerable everywhere!
And I am damned glad of it.
My system runs totally free of any and all security encumbrances.
Hey lackey. Don't you wish that you could do the same?
Maybe some day.
Ha, ha, ha, ha, ha, ha, ha, ha, ha, ha, ha, ha!