@nixCraft@mastodon.social
Co-worker: You know there is a GUI for that kind of settings in Linux.
Me: Ignores the co-worker.
Co-worker: Why do you do things hard way?
Me: Look, I'm not going to trust a bunch of pixel pushing code to protect my data. I prefer to stare directly into the abyss of my terminal and type my own commands. That's true security and gist of it. I like it that way. π₯Ή![]()
@codehorse@infosec.exchange
@nixCraft@mastodon.social well actually you still have to trust the terminal emulator, the execution environment, cli program, the cli programβs dependencies, file system, β¦ we always work with the concept of a TCB. Its more about keeping the TCB as small as reasonable with all the tradeoffs to accept when you expand it, for example with network manager