• 0 Posts
  • 5 Comments
Joined 1 year ago
cake
Cake day: February 27th, 2025

help-circle

  • While my personal belief is that relgions should be abolished and I would much prefer no relgious individuals ran for government positions trying to ban someone off of thier beliefs like that with how prevelant relgion is today would just be setting bad precedent that could be turned against a population when you have people like the pedo in chief out governing the world. I will say any devout relgious person running would have me question how unbiased they could be as truly believing in fairtales and myths just already shows a severe deficiency in critical thinking skills.

    With that being said I would still vote a sock into office over the domestic terrorist group that is the republican party. Perfect is the enemy of good so if this indivual at least truly believes in separation of church and state I am not going to dwell on their cognitive dissonance regarding religion as it seems to be helping keep them objective and move us in the right direction again.


  • I would just follow their advice, download the newest version from their site directly and use the new versions installer to update manually. I would probably do the same thing when the newest version with certificate and signature verification releases, after that I would assume you should be good to go. However its probably also worth scanning your system for malware just incase you updated during the time frame the attack was live.



  • While I agree with you I did just want to point out one thing.

    This:

    it’s mathematically impossible to fake.

    Is not entirely true persay, every hashing function does have collisions that can occur. But the likely hood that someone baked an exploit in that kept the application functioning while adding their backdoor all the while somehow creating a hash collision with the original fingerprint is practically zero and honestly if someone did pull that off, fucking hats off because that has to be some sort of math and coding wizard beyond most. I should also point out that the file size would most likely/have to be different so there should be other methods of detecting the compromised build regardless.

    Sorry I know that was very pedantic of me but I did want to call that out because its technically possible but the actual likely hood has to be so miniscule its almost irrelevant along with the fact that other tells would surely exist.