It won’t be a security risk once it’s in use, IT across Germany will know within days of deployment. It will almost definitely be a modified version of some probably well known Linux.
No sense in giving an adversary info on the distro before it’s fully implemented though I imagine. (I would consider that a head-start even if they heavily modify a popular distro)
Giving the See👁️Aye advanced notice wouldn’t be smart, no matter how they wanted to play it.
I don’t think it really matters whether a potential adversary has a ‘head start’ all that much, security through obscurity doesn’t work super well when it’s going to be deployed to thousands of easily accessible devices anyway. It’d only just be a defense in depth, but even then meh. But it’s neither here nor there, they’ll do it whatever way they feel is best.
Basically all of social engineering is to get exactly what you’re talking about, a “head start”
Go to their LinkedIn: does the head engineer have MySQL version X on his skills, resume, job description, etc? Maybe somebody even endorsed them for it? “Wow they are THE best database administrator”
Now you know who you need to hack for their database access AND what zero days to research.
Social engineering is to gain access circumventing downcode, not really “get a head start”…
Most attacks are entirely social engineering. You’re not breaking into secure databases by pulling ridiculous zero day backdoors when it’s much easier to convince an intern to download a file or give you access directly. These super involved attacks are state actors, and no amount of trying to hide what Linux version is being modified will do anything for you there.
State actors of course also use social engineering
Ultimately the point is hacking really doesn’t involve the kind of subterfuge you’re describing here in a way where " what Linux is it " matters at all. I mean, windows is used for secure systems across the world, it’s hardly secretive.
Exactly why the Brazilian and German governments are switching to linux machines
And my houshold 😁
Ther is for sure a 2.5k line powershell script from someone totally trustworthy which fixes this issue though
The French National Police also use Linux machines with its modified Ubuntu distro Gendbuntu.
Plus, Russia uses Astra, based on vanilla Debian.
Not like Russia can legally nor want to be dependant on MS/american software.
Which distro are the Germans switching to?
Can’t find out the flavor on any websites. It might be a custom one and I imagine sharing the info would be more of a security risk.
It won’t be a security risk once it’s in use, IT across Germany will know within days of deployment. It will almost definitely be a modified version of some probably well known Linux.
No sense in giving an adversary info on the distro before it’s fully implemented though I imagine. (I would consider that a head-start even if they heavily modify a popular distro)
Giving the See👁️Aye advanced notice wouldn’t be smart, no matter how they wanted to play it.
I agree
I don’t think it really matters whether a potential adversary has a ‘head start’ all that much, security through obscurity doesn’t work super well when it’s going to be deployed to thousands of easily accessible devices anyway. It’d only just be a defense in depth, but even then meh. But it’s neither here nor there, they’ll do it whatever way they feel is best.
Basically all of social engineering is to get exactly what you’re talking about, a “head start”
Go to their LinkedIn: does the head engineer have MySQL version X on his skills, resume, job description, etc? Maybe somebody even endorsed them for it? “Wow they are THE best database administrator”
Now you know who you need to hack for their database access AND what zero days to research.
ANY info will be an attack vector
Social engineering is to gain access circumventing downcode, not really “get a head start”…
Most attacks are entirely social engineering. You’re not breaking into secure databases by pulling ridiculous zero day backdoors when it’s much easier to convince an intern to download a file or give you access directly. These super involved attacks are state actors, and no amount of trying to hide what Linux version is being modified will do anything for you there.
State actors of course also use social engineering
Ultimately the point is hacking really doesn’t involve the kind of subterfuge you’re describing here in a way where " what Linux is it " matters at all. I mean, windows is used for secure systems across the world, it’s hardly secretive.
deleted by creator