this post was submitted on 09 Jul 2025
23 points (96.0% liked)

Linux

56343 readers
1762 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 6 years ago
MODERATORS
 

So, a while back I installed Xfce with Chicago95, but was disappointed. Xfce just doesn't vibe with me, and a strict emulation of Windows95 is not really what I wanted, I just wanted something that "felt" that classic.

So I was gonna give up and just use KDE, until I saw TDE. I think TDE is probably what I'm looking for but I'm concerned about using anything so minor because security.

It TDE secure (for personal use)?

Can a DE even be insecure, or are they all generally as secure as each-other as long as you follow the rules (trustworthy software, closed firewall, install patches fast, and disaster recovery plans)?

What vulnerabilities can a desktop environment even have (edit)?

you are viewing a single comment's thread
view the rest of the comments
[–] Tenderizer78@lemmy.ml 3 points 3 days ago (1 children)

The question I want to ask here is, what does "secure" and "insecure" mean in the context of a DE. What distinguishes a secure and insecure DE from a practical perspective (physical access, privilege escalation, rootkits, etc.).

[–] LeFantome@programming.dev 2 points 1 day ago (1 children)

As one practical example, a malicious program may monitor your key presses to extract your passwords (in web browsers or sudo).

Or it could be taking screenshots behind the scenes and sending that data remotely or to a local AI.

Or turning on your mic and….

[–] Tenderizer78@lemmy.ml 1 points 1 day ago* (last edited 1 day ago)

So basically they still require arbitrary code execution as a starting point.

Another guy shared this link from Secureblue that goes into thumbnail generation, which can be done programmatically and has been documented in the past as an avenue for infection in Nautilus.