this post was submitted on 20 Sep 2024
524 points (96.6% liked)

linuxmemes

21234 readers
21 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack members of the community for any reason.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • These rules are somewhat loosened when the subject is a public figure. Still, do not attack their person or incite harrassment.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn. Even if you watch it on a Linux machine.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, and wants to interject for a moment. You can stop now.

  • Please report posts and comments that break these rules!

    founded 1 year ago
    MODERATORS
     
    you are viewing a single comment's thread
    view the rest of the comments
    [–] [email protected] 5 points 1 month ago (3 children)

    It’s more about security if I recall correctly

    [–] [email protected] 2 points 1 month ago (2 children)

    How so? Is there a way for malicious code to start injecting itself into calls to 127.0.0.1?

    [–] [email protected] 3 points 1 month ago* (last edited 1 month ago) (1 children)

    Sorry, I am not an expert myself, but I think there are some recourses about that in the internet

    Or, this file on x.org:

    “But the X protocol is still unsecure by design…”

    https://www.x.org/wiki/Events/XDC2014/XDC2014DodierPeresSecurity/xorg-talk.pdf

    [–] [email protected] 4 points 1 month ago

    Yeah, to send it naked over the wire would be nuts, which is why everybody uses SSH. But unless there’s insecurity within the computer, that’s a moot point.