Hacker News new | past | comments | ask | show | jobs | submit login

It can be detected if your adversaries are clever enough: https://lukespademan.com/blog/the-dangers-of-curlbash/



Tbh, I’m put on more on alert by the spelling errors in the linked post than I am by the ostensible threat of a server timing my requests in order to serve malware.

It’s good practice to check anything that you’ll pipe to `sudo`, but this article’s level of paranoia is kind of self-defeating, no?

At some point, we all trust the things we run on our machines. We rely on communities — and our participation in them — to vet installations.

There is no perfect solution. Someone will always be misled.


Congrats, you just defeated the attack by manually downloading the script before running it!




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: