![]() ![]() The title of the link read as “ Linux bans University of Minnesota for sending buggy patches in the name of research”. TBH, you're now just trying to cross the bridge before you come to it. And you're doing this by first estimating how much damage you can bear in case of security breach, and for most casual users, a good backup plan, regular update and malware scanner is more than enough. That said, you need to determine what's your target security level, then put corresponding resources into it. But truth be told: no one can stare at CVE announcement 7/24, unless you're running a business that may cause life-and-property loss. You still need to keep alert to all the security information about packages you're using. No I'm not mocking open source community but pointing out that open source isn't equal to problem-free. A lot of people have the myth that nothing will go wrong in open source projects since "they're under public scrutiny". The real security risk is not the package manger but the open source softwares themselves. If Homebrew suffers from attacks like DNS hijack, same thing will happen if you're compiling everything from tarball yourself. It's no less secure than installing these packages manually. It doesn't require any authentication or user credential to initiate the download. It's tracking package dependency locally and nothing is "exposed" to the internet. Homebrew itself is only a package manager that download and install packages for you. I am not so much worried about the very specific software I would get via these methods, but what setting up/using Home-brew/Mac Ports could do to impact security.ĮDIT: Seems like the consensus and my research as shown that Homebrew (not many people chimed in about Mac Ports) seems relatively trust worthy and safe/secure. Doing so for a small, select few bits of software wouldn't be worth a meaningful lapse in security to me.Ĭan anyone weigh in on how secure/insecure using these options are?įinal thought, I am aware that any system is only as secure as the person using it and how well (or poorly) it is configured. I am very security conscious and am worried using something like the above mentioned package managers/repos could expose my system (vs only using the App Store/direct installing software I trust). ![]() While most of my software/app needs are met just fine there are occassions when I start looking for software and it leads me to needing to use something like Home-brew or Mac Ports. I am new to Macs (2021 16" MacBook Pro), coming from using Linux (mostly Fedora) for my daily computing. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |