So, essentially, really poorly written malware? Given the number of assumptions it makes without any sort of robustness around system configuration it’s about as good as any first-pass bash script.
It’d be a stretch to call it malware, it’s probably an outright fabrication to call it a virus.
Not too long ago, when Fracturiser was a concern on Minecraft, and I read up on it, I got a chuckle when I read that stage 2 was a systemd service, and therefore couldn’t have run on my machine even if it had gotten that far (of course, I still checked for signs of infection)
They’re great! Otherwise I would have to install some random deb from github which obviously doesn’t get automatically updated (for example for PrusaSlicer which is my most used flatpak). Though I’m not sure it’s something you’ll appreciate given your username.
I know your shitposting, but I used to run into shit like this all the time back when I used to try to run Loki software games on Linux back in the day. Within 6 months all the games I had were un-fucking-runnable.
It’s still a thing now depending how crazy you want to get with your system (let’s pretend you don’t run Linux on an x86 system for example - good luck lol)
So, essentially, really poorly written malware? Given the number of assumptions it makes without any sort of robustness around system configuration it’s about as good as any first-pass bash script.
It’d be a stretch to call it malware, it’s probably an outright fabrication to call it a virus.
This is… clearly a meme…
I wasn’t sure about it either. There’s security researchers out there who might genuinely want to get a virus to run in a VM.
But yeah, the
cmalw-lib-2.0
gives it away…Yeah, nobody uses
cmalw-lib-2.0
Its deprecated, now we use
hack-lib-client-1.17
systemd-malwared
and its front-endmalctl
are how the cool kids are doing it.systemd haters will moan and groan about ‘bloat’ and ‘unnecessary end-user hacking libraries’ smh
Not too long ago, when Fracturiser was a concern on Minecraft, and I read up on it, I got a chuckle when I read that stage 2 was a systemd service, and therefore couldn’t have run on my machine even if it had gotten that far (of course, I still checked for signs of infection)
It ends with them donating money to the malware’s creator…
Yes, that is odd, but not impossible either. I’ve seen influencers do dumb shit like that for the attention.
So you’re saying it’s about as robust as a typical Linux application then?
“It works on my machine”
He said the thing!
Packagers job to make it fit their distro, innit?
As a package maintainer, it’s a lot of fun sometimes!
I bet, both ironically and genuinely, depending on the cade. Flatpak must feel like a godsend to a lot of people haha
I’ve actually never used flatpak, I still prefer distro-specific package managers
Flatpak is really nice imo. You can have stable distro with up-to-date apps. And sandboxing for proprietary stuff, which is really nice.
Username checks out
They’re great! Otherwise I would have to install some random deb from github which obviously doesn’t get automatically updated (for example for PrusaSlicer which is my most used flatpak). Though I’m not sure it’s something you’ll appreciate given your username.
I think it was a fun post about what we go through sometimes just to get X or Y working. It was quite clever.
I know your shitposting, but I used to run into shit like this all the time back when I used to try to run Loki software games on Linux back in the day. Within 6 months all the games I had were un-fucking-runnable.
It’s still a thing now depending how crazy you want to get with your system (let’s pretend you don’t run Linux on an x86 system for example - good luck lol)