• 0 Posts
  • 11 Comments
Joined 3 months ago
cake
Cake day: August 5th, 2024

help-circle





  • You need to bridge your network adapter so you are on the same network subnet. When you bridge the VM appears on the same network. The default is NAT which by default is a different subnet. Like you, the host are on 192.168.1.0/24 and the VM, the guest is on 192.168.122.0/24. Unless you have two network adapters(if so you could let the VM have it) unlike most people bridged is what you’re looking for. VPN tunnel is usually when you are remote of your VM so unnecessary IMO.



  • Your comparison was with random exes on the most targeted, malware infested operating system out there.

    Many eyes are always better than no eyes. I’m not saying you shouldn’t vet the code stop misinterpreting but no one knows or catches everything by themselves. That’s why security needs transparency. If it’s as insecure as you’re saying we would have way bigger problems but we don’t. AUR is not as safe as the Arch repository sure, but definitely safer than installing random exes on Windows. It’s a flawed comparison you’re making.

    If you’re paranoid you should be on an immutable distro cause xz backdoor was in some official repos. Repo maintainers do not catch everything either it was just a mere coincidence someone caught it(again thanks to transparency & many eyes on code) before mass deployment. Installing anything with root access is a risk. Going online is a risk. But there are ways to mitigate risk. Some security you’re always gonna have to trade for convenience.




  • Well there is far less malware on Linux tbf so comparison is not completely accurate. But same caution applies, try to vet and understand what you install. That part is also easier with the AUR as it’s transparent in the packagebuild what it does unlike random exes with closed source. It’s also a large community with many eyes on the code so unless it’s a package with few users then it’s gonna get caught pretty quickly.