It already is pretty rampant, however most Linux admins have minimal if any detection strategy.
Additionally, while there’s plenty of binaries about like VoidLink, almost all campaigns against Linux hosts target SSH, or RCE vulnerabilities, and deliver shell scripts that orchestrate the attack.
Why compile a binary when the shell has everything you need? The threat models are pretty different between Windows and the *nix world.
When you look at botnet composition, they’re usually made up of outdated Linux hosts with SSH open with password-based authentication.
Seriously people, switch to key-based auth and disable password auth entirely.
I’ve been supporting Crisis and Shelter every month for years now. I’d gladly pay more tax so people have a right to somewhere safe to live.
Growing up, my sister would never ignore someone who was homeless and would get to know them and support them however she should (a coffee, help with forms and letters, even just a general chat). Every day, everywhere we’d go. She drilled it into us that there’s never an excuse to ignore someone who needs help and luck could turn and we could easily be in the same situation ourselves.
As a society, we shouldn’t view a roof over our heads as an asset but a right. We spend plenty of money on nuclear reactors for submarines that can launch the apocalypse, I think we can spend some more on helping the most vulnerable not be forced onto the streets.
It started with making office computers personable for home use in Windows 95 e.g. “My Computer”, “My Documents”.
This carried on into web services like My Yahoo, or terms like My Account.
Smashing it into one word was also a thing back in the late 90s / early 00s because it (a) was easy for searching in older search engines and (b) sounded like Apple’s iPod, iMac etc (MyPod, MyMac).
Continued use today is usually because of either (a) it’s been called that for a couple of decades already or (b) the product manager is themselves old and has forgotten how old the trend of trying to make those new fangled computerybobs sound welcoming and friendly.
If Epic spent half as much money as they are suing organisations and instead funded developing their shop into a gaming community platform like Steam, they’d probably have caught up by now.
I agree with you as I’m an old FOSS beard - we wouldn’t have gotten here without GPL/MIT/BSD etc.
But things aren’t working for a huge number of projects. And is it right that so many critical dependencies are maintained by so few with so little resources, if any? Just look at the xz fiasco we narrowly avoided catastrophe over.
The Linux Foundation is a good model for core infrastructure and projects that underpin the ecosystem like the kernel - LF are turning over $300M or something a year.
But for smaller projects that aren’t critical or aren’t looking to be a core dependency like xz, dual licensing seems the only obvious way forward.
Most corporate owned devices are managed with some kind of tool (for restricting what users can do, pushing out software and updates, etc). These tools are called Mobile Device Management (MDM).
The developer is detecting the presence of MDM tools and using that to present a splash page to the user about the licensing requirements etc.
Some educational institutes use MDM to manage students, even so far as to require it be installed on personal owned devices. The developer has been working with edu users to except them.
I’m a huge FOSS advocate but I understand where this developer is coming from. It sucks to have huge orgs take your work and monetize it heavily without contributing back. The number of maintainers I know suffering from huge volumes of bug reports from corporations using AI tools yet not financially supporting the project is pretty heartbreaking.
I wonder if it’s time FOSS projects started taking the view that liberty is for individuals and not corporate use, and license accordingly.
I don’t think you understand what “the engine supports saving at any time” entails.
Having the ability to serialise objects is not the same as handling the input and output of serialisation.
You might as well be annoyed by why aren’t all developers letting us rewind time in games? Load from our last save? No thanks. Developers are so disrespectful of our time. They just need to log all the changes that happen and play them backwards. Every engine supports that!
I recommend you try implementing a save feature in a game engine then you might have a little more respect for the difficulty of the problem you’re irritated by.
Developers aren’t being unthoughtful or lazy, you’re just trivialising a rather complex software engineering problem that isn’t easy to solve and one solution over another has trade offs / weaknesses.
It already is pretty rampant, however most Linux admins have minimal if any detection strategy.
Additionally, while there’s plenty of binaries about like VoidLink, almost all campaigns against Linux hosts target SSH, or RCE vulnerabilities, and deliver shell scripts that orchestrate the attack.
Why compile a binary when the shell has everything you need? The threat models are pretty different between Windows and the *nix world.
When you look at botnet composition, they’re usually made up of outdated Linux hosts with SSH open with password-based authentication.
Seriously people, switch to key-based auth and disable password auth entirely.