DNS poisoning attack worked even when targets used DNS from Google and Cloudflare.

  • vrek@programming.dev
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    3 months ago

    At that point it’s a single point of failure, hack that central repo and infect everything. Plus Linux is not centralized… That’s kinda the point, suse, Debian, arch, red hat all have their own repos…

    • kolorafa@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      edit-2
      3 months ago

      Yes, but you as a user are in control of when/how you update, you can first update some test server and only then propagate it to other.

      But still better have single (hopefully secure) risk point/target that you need to pay attention than have multiple god know when/how updating that you dont even dont know about.