Viruses do adapt and mutate though. Look at all the various strains of H1N1 and SARS-COV-2.
Just because they don’t reproduce without a host cell doesn’t mean evolution doesn’t happen. If a trait emerges that is beneficial to future generations, viruses carrying that trait can infect more cells and spread further.
Usually it’s evolution itself that people give too much agency to. Mutations are a crapshoot. They can be beneficial or they can cause birth defects, sterility, prevent reaching sexual maturity, or make finding a mate excessively difficult. Or all of the above.
Ubuntu LTS and 23.x are both Xorg. Latest has Wayland. If 24.04 is to be LTS though, I don’t think they’d release it with Wayland as default. I’d think they’d switch to Wayland on 24.10 so there’s 3 more releases to get good before the next LTS build.
I don’t usually “trust” vendor support for Linux though…Linux is usually a second-class citizen and “support” means there is either a single grey-beard or an intern that’s answering emails about it. Idk about StudioOne, but unfortunately it’s usually expected to not have feature parity or complete documentation for commercial software on Linux. IME, YMMV, etc.
I don’t disagree with you but dude people are sick of the politicization of everything and their operating system doesn’t even get onto that radar. They are ignorant and quite happy of it. Please let the pigs eat their shit in peace.
That said, it is quite telling that Microsoft apparently finds it more advantageous to have two divergent feature sets than to apply the change universally.
Literally everybody does SSH wrong. The point of host keys is to exchange them out-of-band so you know you have the right host on the first connection.
And guess what certificates are.
Also keep in mind that although MS and Apple both publish trusted root lists, Mozilla is also one of, if not the, biggest player. They maintain the list of what ultimately gets distributed as ca-certificates in pretty much every Linux distro. It’s also the source of the Python certifi trusted root bundle, that required by requests, and probably makes its way into every API script/bot/tool using Python (which is probably most of them).
And there’s literally nothing stopping you from curating your own bundle or asking people to install your cert. And that takes care of the issue of TOFU. The idea being that somebody that accepts your certificate trusts you to verify that any entity using a certificate you attach your name to was properly vetted by you or your agents.
You are also welcome to submit your CA to Mozilla for consideration on including it on their master list. They are very transparent about the process.
Hell, there’s also nothing stopping you from rolling a CA and using certificates for host and client verification on SSH. Thats actually preferable at-scale.
A lot of major companies also use their own internal CA and bundle their own trusted root into their app or hardware (Sony does this with PlayStation, Amazon does this a lot of AWS Apps like workspaces, etc)
In fact, what you are essentially suggesting is functionally the exact same thibg as self-signed certificates. And there’s absolutely (technically) nothing wrong with them. They are perfectly fine, and probably preferable for certain applications (like machine-to-machine communication or a closed environment) because they expire much longer than the 1yr max you can get from most public CAs. But you still aren’t supposed to TOFU them. That smacks right in the face of a zero-trust philosophy.
The whole point of certificates is to make up for the issue of TOFU by you instead agreeing that you trust whoever maintains your root store, which is ultimately going to be either your OS or App developer. If you trust them to maintain your OS or essential app, then you should also trust them to maintain a list of companies they trust to properly vet their clientele.
And that whole process is probably the number one most perfect example of properly working, applied, capitalism. The top-level CAs are literally selling honesty. Fucking that up has huge business ramifications.
Not to mention, if you don’t trust Bob’s House of Certificate’s, there’s no reason you can’t entrust it from your system. And if you trust Jimbo’s Certificate Authority, you are welcome to tell your system to accept certificates they issue.
But you only really need one to say it’s authentic. There are levels of validation that require different levels of effort. Domain Validation (DV) is the most simple and requires that you prove you own the domain, which means making a special domain record for them to validate (usually a long string that they provide over their HTTPS site), or by sending an email to the registered domain owner from their WHOIS record. Organization Validation (OV) and extended verification (EV) are the higher tiers, and usually require proof of business ownership and an in-person interview, respectively.
Now, if you want to know if the site was compromised or malicious, that’s a different problem entirely. Certificates do not and cannot serve that function, and it’s wrong to place that role on CAs. That is a security and threat mitigation problem and is better solved by client-based applications, web filtering services, and next-gen firewalls, that use their own reputation databases for that.
A CA is not expected to prevent me from hosting rootkits. Doesn’t matter if my domain is rootkits-are.us or totallylegitandsafe.net. It’s their job to make sure I own those domains. Nothing more. For a DV cert at least.
Public key cryptography, and certificates in particular, are an amazing system. They don’t need to be scrapped because there’s a ton of misunderstanding as to its role and responsibilities.
I’ve honestly been using Linux on and off for nearly 25 years, and daily the past 6 or so…and somehow just found out about this, and now my life is changed.
IT support work be like (lemmy.world)
Shame. (mander.xyz)
Pragernant (lemmy.world)
Apple Confirms Governments Using Push Notifications to Surveil Users (www.macrumors.com)
Wayland vs X11 be like (lemmy.world)
Hallmark channel go brrrrr (lemmy.ml)
deleted_by_author
Jaunty (feddit.de)
As joking about German words works incredibly well in English, here’s the original:...
Bye bye edge (lemmy.ml)
Article 45 Will Roll Back Web Security by 12 Years (www.eff.org)
no window (feddit.de)
Best daily use Tips for Desktop Linux, that make life easier but are not well known? (itsfoss.com)
There are many Distros out there, but what they all do is make useful and modern systems....