I… actually can’t tell if you’re taking the piss or if that’s a real episode.
I have so many questions about the whales.
I… actually can’t tell if you’re taking the piss or if that’s a real episode.
I have so many questions about the whales.
Tarballs are not built from source?
I have heard multiple times from different sources that building from git source instead of using tarballs invalidates this exploit, but I do not understand how. Is anyone able to explain that?
If malicious code is in the source, and therefore in the tarball, what’s the difference?
In 99% of cases I have seen, people pick their OS because it came preinstalled
Lutris can be pretty handy for many things…
I don’t have too much exp with these things, but I would suggest (as an IT support person) narrowing down and isolating problems into specifics, like:
You’ll be able to get better answers. I’m pretty interested in the suggestions, my usual solution is ‘find something open source that is not as good but works.’