NoGoolag
4.64K subscribers
19.6K photos
10.9K videos
752 files
19.7K links
Live free!

📡 @NoGoolag

FAQ:
http://t.me/NoGoolag/169

★Group:
https://t.me/joinchat/nMOOE4YJPDFhZjZk

📡 @Libreware

📚 @SaveAlexandria

📡 @BallMemes

FORWARDS ARE NOT ENDORSEMENTS

💯 % satire OSINT
Download Telegram
Lennart Poettering intends to replace "sudo" with #systemd's run0. Here's a quick PoC to demonstrate root permission hijacking by exploiting the fact "systemd-run" (the basis of uid0/run0, the sudo replacer) creates a user owned pty for communication with the new "root" process.

This isn't the only bug of course, it's not possible on Linux to read the environment of a root owned process but as systemd creates a service in the system slice, you can query D-BUS and learn sensitive information passed to the process env, such as API keys or other secrets.

https://fixupx.com/hackerfantastic/status/1785495587514638559

Nitter mirror: https://xcancel.com/hackerfantastic/status/1785495587514638559
#Movuan #PINE64

The Movuan project was started by community member lxb and announced in a forum post as an alternative to mobile distributions using the #systemd init system. Thanks to being forked from Mobian, the project makes use of modified Mobian debos to build it’s images.

One of the modifications that lxb makes is an optional script which can customize a Movuan image to install extra software like AndroidImpEx for importing contacts and sms messages from an Android phone, Ungoogled Chromium, local caching DNS (bind) tunnelled through TLS (stubby) to privacy minded servers and an inbuilt adblocker through a caching proxy (squid). These modifications are a personal preference of lxb’s but anyone is free to use them to help improve their privacy.

https://pine64.org/2025/08/27/august_2025_movuan/