• pazukaza@lemmy.ml
      link
      fedilink
      arrow-up
      0
      ·
      1 year ago

      Actual question. Isn’t installing stuff from third party repos like super dangerous? The package scripts run with root access, right?

      So, I guess you could tell if the hash of the package matches the hash of the code after you build it… But, what about upgrades on that package after it is installed? They could change the setup scripts and screw a lot of people right?

      Not saying these guys do it, just wondering about security stuff.

      • whou@lemmy.ml
        link
        fedilink
        arrow-up
        3
        ·
        1 year ago

        quote stolen directly from the repo:

        “Science isn’t about WHY. It’s about WHY NOT. Why is so much of our science dangerous? Why not marry safe science if you love it so much. In fact, why not invent a special safety door that won’t hit you on the butt on the way out, because you are fired.” — Cave Johnson (Portal 2)