From my Linux laptop? Or I guess I could have downloaded it using an Android tablet and torrents and copied it to a usb stick. Is this one of those threads where we keep asking 'and where did that come from?' until we reach the first dollar earned from selling lemonade?
No. That recursive process can be short-circuited by verifying the secure hashes, and establishing the integrity of the installer binaries and source tarballs you've been using to install Linux.
RyanZAG|12 years ago
DanBC|12 years ago
At some point you have to trust someone. But who should you trust, and how much should you trust them?
Most people do not think about that and so we live with an Internet where privacy is almost impossible and most people just don't care about that.
stonemetal|12 years ago
Yeah, pretty much. As soon as I say I trust X, then you know the first place to attack because I haven't secured it.
negativity|12 years ago
technomancy|12 years ago