"To this day all I ever run are Live systems, because the operating system “just works” out of the box without any installation or configuration on my side, and every time I reboot the machine I have a “factory new”, known-good state."
itsfoss.com/appimage-interview

#AppImage

This confuses me. If you use a live system as your daily driver, how do you get security patches that were issued since the last release of the OS? Also, AFAIK even the live systems on 64-bit install images usually launch into a 32-bit session, so they can be used for recovery etc on any computer they are inserted into.

Show thread

@strypey

For daemons and apps regular apt/yum update will work, of course until the next reboot when you need to reinstall all updates.

For kernel the only option is livepatch.

In practice I suspect the answer is however: you don't. "We're defaced? Oh we just reboot and we're no longer defaced!"

And granted that any possible instability may be usually only by updates, I don't think it's a viable solution at all.

@kravietz
> "We're defaced? Oh we just reboot and we're no longer defaced!"

I don't think he's talking about servers. He's talking about a desktop system. In which case there are much more serious potential consequences to getting pwned than your website being defaced (eg Bad Actors getting your banking/ crypto passwords).

@kravietz I'm not saying a properly installed system completely prevents this (nothing is perfectly secure), but surely regular security patching majorly reduces the attack surface?

Follow

@strypey

Absolutely, web browsers are one the most complex and most frequently patched software out there. Some of the recent CPU attacks (Meltdown/Spectre) can be exploited through the browsers specifically and were mitigated at the kernel level. They can be exploited in targeted manner (email) or passively (watering hole attacks).

Sign in to participate in the conversation
Mastodon 🔐 privacytools.io

Fast, secure and up-to-date instance. PrivacyTools provides knowledge and tools to protect your privacy against global mass surveillance.

Website: privacytools.io
Matrix Chat: chat.privacytools.io
Support us on OpenCollective, many contributions are tax deductible!