The author addresses the issue.

  • HayadSont@discuss.online
    link
    fedilink
    arrow-up
    4
    ·
    11 hours ago

    Would anyone that installed their current system using ventoy be at risk?

    In absolute sense; we don’t know for sure. It’s possible to interpret this[1] in widely different ways:

    • Just the unfortunate occurrence of a set of uneventful events from an innocent party that tries to make up.
    • (OR) A facade (from a malignant/malicious party) in order to keep the communities’ trust so that people continue to get caught in the web.
    • (AND) Anything in between*

    Should I reinstall?

    You should make up your own mind on that. The last time I installed an OS, I had become aware of this concern (i.e. the blobs). At that time, trusting it for what it was, would go against the threat model I’ve set for myself. And, consequently, if I had any (other) systems that were installed with it, then I would have proceeded to reinstall. But I’m not you, nor are you me… So, at the end of day, if you had something that resembled a threat model, then you would have used that to answer this question for yourself. As you don’t seem to have one, making one just for this seems overkill. However, you could (re)assess how safe your system is in its current state and act accordingly. (Just to name a couple of examples:)

    • Do you just randomly run scripts that you’ve found on GitHub? Well, then this ventoy situation shouldn’t be very concerning.
    • Do you deliberately refuse to install the unverified software on Flathub and only[2] stick to its verified offering? Then, you should seriously consider reinstalling.

    1. i.e. The lack of communication regarding this issue for more than a year, the recent finding in which fake root certificates are injected. And, of course, the maintainer finally addressing the issue. ↩︎

    2. Within the context of Flathub*. The packages found in the repo of your distro are trusted by default. ↩︎