This is a well-meant guide from the IPFire development team. Of course, every IPFire system belongs to the person who set it up, and you are free (as in free speech) to do whatever you want with it. However, we would like to give you a couple of things to think about first...
This is how to compromise your system in two easy steps:
We would like to urge you to never ever do this. We spend so much time on auditing every single line of code that goes into IPFire; we pick certain versions of software because it is most compatible; we patch software to make it work better in IPFire; and in the end we cryptographically sign all releases so that no third party can change any of this and inject anything unwanted.
It could not be easier to get malware onto a system than having the administrator install it themselves.
Older Revisions • June 22, 2021 at 11:58 am • Michael Tremer