(no title)
zvmaz | 4 months ago
EDIT: further comment below:
On second thought, Qubes OS does not prevent such types of malicious downloads; it can also happen to Qubes images. Verify your downloads with checksums and cryptographic signatures [2].
[2] https://doc.qubes-os.org/en/latest/project-security/verifyin...
zvmaz|4 months ago
[1] https://doc.qubes-os.org/en/latest/project-security/verifyin...
kachapopopow|4 months ago
baobun|4 months ago
Using Qubes would limit the blast radius for a scenario like this. In QubesOS, you would use disposable VMs (with no access to your crypto wallets or other user files) to download and flash an ISO. So even if this malware was targeting Linux, it wouldn't get zit and disappear when you finish flashing and shut down that VM (as long as there isn't an unpatched exploit breaking the VM isolation involved).
Of course, if the ISO is bad then this won't save you from compromise once you boot it. But that's not what happened here.
zvmaz|4 months ago
[1] https://doc.qubes-os.org/en/latest/project-security/verifyin...
nekusar|4 months ago
Its not perfect... but its better than nothing.