this post was submitted on 19 Jan 2026
170 points (99.4% liked)
Linux
13226 readers
314 users here now
A community for everything relating to the GNU/Linux operating system (except the memes!)
Also, check out:
Original icon base courtesy of lewing@isc.tamu.edu and The GIMP
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I one time got an E-mail claiming my computer had been hacked and they'd installed monitoring software in my root/system location and I was like, "In my
/gnu/store? Doubtful…"If the attacker controlled the domain wouldnt they control the source?
Except if you use a third-party channel for some software, in which case you get all the same problems again.