They don't need to guess the password. If you don't have full disk encryption I can just run another os in live mode and mount your drive and read everything. And even change the password to your fedora, by changing the hash in shadow file
AnnaFrankfurter
Hey we need people like that, remember when an autistic person discovered few hundred millisecond delay in ssh which uncovered Jia Tan backdoor.
Welp that escalated quickly
From my experience that is fairly normal
Hexagons are bestagons
Switch to rolling distro, it will break so many things with each update you'll learn stuff by fixing it. Also you can check https://overthewire.org/wargames/bandit/
OK I was wrong it's not default EXE it is the only option https://wiki.osdev.org/UEFI
UEFI executables are regular PE32 / PE32+ (Windows x32 / x64) images, with a specific subsystem. Every UEFI application is basically a windows EXE (or DLL) without symbol tables.
If I remember correctly you can just put the exe file in an empty flash drive and go to your bios select update bios you don't need to do anything else since UEFI by default runs exe. If you're on uefi your os should also have a exe file in /boot
You forgot to add Iran, Russia, and Saudi Arabia, and I think rest of world altogether.
This is the original email by the person who discovered this backdoor. But if you want you can search for xz backdoor and you'll find a lot more articles which explain timelines and other things. https://www.openwall.com/lists/oss-security/2024/03/29/4
That's a 500ms or 0.5s difference