My Journey to Becoming a Linux End User on Linux Mint
-
@BRRABill said:
Even the hacker agrees (from an article on ZDNET)...
The hacker then used their access to the site to change the legitimate checksum -- used to verify the integrity of a file -- on the download page with the checksum of the backdoored version.
"Who the f**k checks those anyway?" the hacker said.
Maybe people who use Linux Mint don't, but people who install things regularly do. Figuring out your ISO doesn't work by trying to install and it failing is a waste of time.
Plus it may install, but packages could be missing or other strange things.
-
@johnhooks
No I meant that he changed the legitimate checksum.
-
@BRRABill said:
@johnhooks
No I meant that he changed the legitimate checksum.
Right, but he asked who checks them anyway. I was answering that part.
-
@johnhooks
Ah. Yeah, probably a small percentage.
And if they can also be hacked, what's the difference really?
-
@BRRABill said:
And if they can also be hacked, what's the difference really?
At least you'll know it will install correctly
I pretty much download ISOs from torrents if it's possible. It's faster, and these kinds of things don't happen.
-
@BRRABill said:
Even the hacker agrees (from an article on ZDNET)...
The hacker then used their access to the site to change the legitimate checksum -- used to verify the integrity of a file -- on the download page with the checksum of the backdoored version.
"Who the f**k checks those anyway?" the hacker said.
lol - even Scott said - do as I say, not as I do.. LOL
-
@johnhooks said:
I pretty much download ISOs from torrents if it's possible. It's faster, and these kinds of things don't happen.
You trust a torrent more than a site such as linuxmint?
-
@BRRABill said:
@johnhooks said:
I pretty much download ISOs from torrents if it's possible. It's faster, and these kinds of things don't happen.
You trust a torrent more than a site such as linuxmint?
Exactly - why would you trust a torrent more than a website download?
-
The torrent file comes from the website, then it builds from the seeders.
-
@johnhooks said:
The torrent file comes from the website, then it builds from the seeders.
What prevents the hacker from seeding a bad torrent?
-
@Dashrender said:
@johnhooks said:
The torrent file comes from the website, then it builds from the seeders.
What prevents the hacker from seeding a bad torrent?
They would be the only one seeding it.
Everything sent through a torrent is hashed, so they would somehow have to change everyone's copy of the ISO.
-
@johnhooks said:
@Dashrender said:
@johnhooks said:
The torrent file comes from the website, then it builds from the seeders.
What prevents the hacker from seeding a bad torrent?
They would be the only one seeding it.
Everything sent through a torrent is hashed, so they would somehow have to change everyone's copy of the ISO.
hack the page, call it a new version - seed the fake one to torrents - ok probably to many places to get caught.. but still possible.
-
@Dashrender said:
@johnhooks said:
@Dashrender said:
@johnhooks said:
The torrent file comes from the website, then it builds from the seeders.
What prevents the hacker from seeding a bad torrent?
They would be the only one seeding it.
Everything sent through a torrent is hashed, so they would somehow have to change everyone's copy of the ISO.
hack the page, call it a new version - seed the fake one to torrents - ok probably to many places to get caught.. but still possible.
Right, it would take so long for that to happen that it would kind of be useless. If you change the direct download ISO then you've got everyone who downloaded it. However that's not the case with the torrents.
There is also no guarantee that anyone will seed from you either. You could sit there all day and maybe only a couple people seed a few parts from you.
-
@Dashrender said:
@johnhooks said:
The torrent file comes from the website, then it builds from the seeders.
What prevents the hacker from seeding a bad torrent?
MD5 Checksumming
-
@scottalanmiller said:
@Dashrender said:
@johnhooks said:
The torrent file comes from the website, then it builds from the seeders.
What prevents the hacker from seeding a bad torrent?
MD5 Checksumming
I meant doing their own seed, not trying to replace the real one.
-
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
@johnhooks said:
The torrent file comes from the website, then it builds from the seeders.
What prevents the hacker from seeding a bad torrent?
MD5 Checksumming
I meant doing their own seed, not trying to replace the real one.
Nothing prevents it and it is happening all the time.
-
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
@johnhooks said:
The torrent file comes from the website, then it builds from the seeders.
What prevents the hacker from seeding a bad torrent?
MD5 Checksumming
I meant doing their own seed, not trying to replace the real one.
MD5 doesn't prevent them from doing it, it prevents anyone from downloading it. Torrents, as we know, are just random upload / download systems. You always checksum something coming from them.
-
@JaredBusch said:
Nothing prevents it and it is happening all the time.
It's what BT is best known for, in fact.
-
@scottalanmiller said:
@JaredBusch said:
Nothing prevents it and it is happening all the time.
It's what BT is best known for, in fact.
Only in your opinion.
-
@JaredBusch said:
@scottalanmiller said:
@JaredBusch said:
Nothing prevents it and it is happening all the time.
It's what BT is best known for, in fact.
Only in your opinion.
Well, my opinion too. Probably more out of ignorance, of the finer workings & uses, as I've never needed to download anything via BT. Most people that who use it, that I know (which isn't many), only use if for movies/TV shows.