Liste des Groupes | Revenir à col advocacy |
On 10/21/24 3:07 PM, Lester Thorpe wrote:I think the point that Linus was making was just that, even if these 'theoretical' attack vectors were actual issues, the CPU manufacturer's need to be the one patching it with a firmware update. Hardware related attacks need to be fixed by the hardware MFG and Linux should only fix software related attack vectors. I think that was the point Linus was making here. The kernel should not be the go-to agency for fixing hardware-specific security issues, nor should it be the kernel's job anyways. It's like, Boeing having a problem with an engine from another manufacturer. Who fixes the engine? It should be the engine manufacturer not some Boeing software engineer adding something to the throttle control system to 'mitigate' the issue.Distro maintainers, and their lackey consumers, who bloat their GNU/LinuxLinus is "kind-of right", but "kind-of not".
distros with performance degrading security "features" should take note
of the latest exclamations of Linus Torvalds:
>
"Honestly, I'm pretty damn fed up with buggy hardware and completely theoretical
attacks that have never actually shown themselves to be used in practice."
>
https://linux.slashdot.org/story/24/10/21/1533228/linus-torvalds- growing-frustrated-by-buggy-hardware-theoretical-cpu-attacks
>
Tell 'em, Linus! Those paranoid freaks are ruining desktop computing!
The problem is State-funded actors these days
and the MASSIVE computing power they can bring
to bear. At least SOME of those "theoretical"
attack vectors CAN become real attack vectors.
But WHICH ???
Yes, you can go totally overboard on "security",
and, mostly, it won't do much good. Paranoia can
push this to extremes where you can barely use
the system/apps (think Vista) - and I think that's
what Linus is concerned with.
However there ARE 'sensible' security measures
that go beyond mere Linux passwords and a few
port blocks.
Les messages affichés proviennent d'usenet.