Never-before-seen Linux malware gets installed using 1-day exploits

catculation@lemmy.zip to Technology@lemmy.world – 398 points –
Never-before-seen Linux malware gets installed using 1-day exploits
arstechnica.com
86

You are viewing a single comment

I pay for ProtonVPN, and I still run my traffic through OpenVPN.

Hate to victim blame, but unless you're going to audit every line of code yourself, don't use obscure software.

As TonyTonyChopper this thread said, sometimes that obscure software is what you are required to use in your institution, or they don't offer support for anything else.

Yeah it sucks. Of course there are outlying situations where people are obliged to use shit software.

But for those with a choice, just don't use shit software.

Are these tools implementing proprietary protocols or something? So far I have not found a VPN I couldn't make work with openvpn or wireguard.

To be fair you should be using wire guard then. Because multiple of the largest and most well-known security auditing firms in the world have said that openvpn is impossible to truly audit. It's too large, you can audit individual parts of it, and you can audit individual interactions between parts. But it's not possible to fully audit.

Meanwhile wireguard is quite small so it can be fairly easily audited by a small team and has been multiple times

But it could be banned by DPI. Russia does it, China also obviously

You can wrap it into https with nginx if you wanna get super fancy so it just looks like web traffic even with dpi. Takes a latency and speed hit but it works