• 1 Post
  • 9 Comments
Joined 1 year ago
cake
Cake day: July 21st, 2023

help-circle






  • Love it when people speak with authority and are confidently incorrect. Eugenia is right.

    You could potentially use flatseal to grant the flatpak the necessary permissions, and you might find out what those permissions are by looking for other users experiences with the flatpak version.

    Or, you find the .deb file and it installs natively without being sandboxed. OR, you can find a PPA repository for it, load said repository and install your software.

    But those things require learning a little. Linux rewards self starters who can use a search engine and forums. Hope this maybe points you in the right direction.




  • Chances are very, very high, that you are not nearly interesting enough to warrant someone utilizing said back door to discover your stash of furry lewds. The primary target for an exploit like this, is either nation state level (industrial/political espionage, tampering with financial markets, etc.) or criminal enterprise level going after high value targets. Trying to dragnet every random whoever to see if they have data worth compromising wouldn’t be much of a money maker.

    That said, this is one of the dangers of using a rolling release. I was running endeavourOS and was likely exposed to the back door for a while. I’ve since switched back to Fedora, which was only exposed on its testing branch (rawhide).