Ventoy is a tool to make a USB with multiple ISOs bootable, letting you select which ISO to use on boot. Another newly-created account claims to be the dev’s friend and translator and has received no contact from the maintainer.

  • Aatube@kbin.melroy.orgOP
    link
    fedilink
    arrow-up
    3
    ·
    30 days ago

    The claim of the person you’re replying to is that even if the binaries were tampered, Ventoy wouldn’t be able to do anything.

    • nyan@sh.itjust.works
      link
      fedilink
      arrow-up
      2
      ·
      30 days ago

      Even if the original issue had anything to do with ISOs, he’s way overestimating the level of protection on many install ISOs, in my experience—they’re just disk images, and presumably all the files read off them are passing through Ventoy itself. Even if you find one that performs some kind of verification, easy enough to change a jump instruction to a no-op somewhere in the machine code guts of a file as it passes through Ventoy, and prevent the verification from executing. (The difficult part is figuring out which instruction to change, but people have done it before.)

      • just_another_person@lemmy.world
        link
        fedilink
        arrow-up
        2
        ·
        30 days ago

        No, I’m saying the way ISOs are written, you couldn’t just, say, inject changes via text tools or whatever like the xz attack.

        I’m not aware of HOW a binary blob not knowing specifically what it was going to attack COULD attack anything in a resting and isolated state like it would be with Ventoy.