Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Operating Systems
ChromeOS & Linux
Meet the Linux Desktop that will Embarrass Windows 10 and macOS in 2020
Message
<blockquote data-quote="Lenny_Fox" data-source="post: 851901" data-attributes="member: 82776"><p>I am ready with my study (webdesign - online marketing), but my final thesis was rejected because the company which offered me a workplace for my thesis, decided to use it commercially to fast breaking some rules related to thesis topics. The company compensated me by offering a part time job (part time because I need time to finish a new thesis). Because I had to pay school for a whole year, I bargained a deal that I could folllow another minor without needing to pass the exams <img class="smilie smilie--emoji" loading="lazy" alt="👍" title="Thumbs up :thumbsup:" src="https://cdn.jsdelivr.net/joypixels/assets/6.6/png/unicode/64/1f44d.png" data-shortname=":thumbsup:" /></p><p></p><p>So I am doing a minor on security now. Last topic was how safe is open source software?</p><p></p><p>The answer was a bit disappointing: Transparency is no guarantee for security. The Deepin Linux OS was mentioned as an example:</p><p></p><p>1. An OS has just to many lines of code to be checked manually, reducing transparency to something meaningless in practice. Automated checks (like some play stores have), even miss ' active leaks' while the code base of an extension or App is just a fraction of the code base of an entire Operating System plus Desktop environment</p><p></p><p>2. The ' hole' does not have to be an ' active leak' like ' ET phone home' type of backdoor, but could be a well crafted 'passive leak' like a vulnerability, which could be used when needed. The vulnability reports are a living proof that this happens for software of which their developers don't want them to have any bugs at all.</p><p></p><p>3 A vulnerability is easier to use in a predictable manner (which is the requirement for a vulnerability to be promoted to an exploit) when context information is available about the targets computer hard- en software. Deepin sends home telemetry data (the CNZZ analysis service) which is no worse or better than Google's telemetry data collection (like user agent and screen resolution).</p><p></p><p>Conclusion: ..... all conditions are set to misuse Deepin and it is up to your trust in people in general on whether to use this splendid linux distro or not (It is developed by a Chinese company), but ..... the same applies to software of Google and Facebook, so what else is new?</p><p></p><p>My teacher ended the this topic with a scene out of House of Cards in which Frank Underwood says "Good things happen to good people". <img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class="smilie smilie--sprite smilie--sprite132" alt=":unsure:" title="Unsure :unsure:" loading="lazy" data-shortname=":unsure:" /></p></blockquote><p></p>
[QUOTE="Lenny_Fox, post: 851901, member: 82776"] I am ready with my study (webdesign - online marketing), but my final thesis was rejected because the company which offered me a workplace for my thesis, decided to use it commercially to fast breaking some rules related to thesis topics. The company compensated me by offering a part time job (part time because I need time to finish a new thesis). Because I had to pay school for a whole year, I bargained a deal that I could folllow another minor without needing to pass the exams 👍 So I am doing a minor on security now. Last topic was how safe is open source software? The answer was a bit disappointing: Transparency is no guarantee for security. The Deepin Linux OS was mentioned as an example: 1. An OS has just to many lines of code to be checked manually, reducing transparency to something meaningless in practice. Automated checks (like some play stores have), even miss ' active leaks' while the code base of an extension or App is just a fraction of the code base of an entire Operating System plus Desktop environment 2. The ' hole' does not have to be an ' active leak' like ' ET phone home' type of backdoor, but could be a well crafted 'passive leak' like a vulnerability, which could be used when needed. The vulnability reports are a living proof that this happens for software of which their developers don't want them to have any bugs at all. 3 A vulnerability is easier to use in a predictable manner (which is the requirement for a vulnerability to be promoted to an exploit) when context information is available about the targets computer hard- en software. Deepin sends home telemetry data (the CNZZ analysis service) which is no worse or better than Google's telemetry data collection (like user agent and screen resolution). Conclusion: ..... all conditions are set to misuse Deepin and it is up to your trust in people in general on whether to use this splendid linux distro or not (It is developed by a Chinese company), but ..... the same applies to software of Google and Facebook, so what else is new? My teacher ended the this topic with a scene out of House of Cards in which Frank Underwood says "Good things happen to good people". :unsure: [/QUOTE]
Insert quotes…
Verification
Post reply
Top