sudo apt install microsoft-edge-stable
Asklemmy
A loosely moderated place to ask open-ended questions
Search asklemmy ๐
If your post meets the following criteria, it's welcome here!
- Open-ended question
- Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
- Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
- Not ad nauseam inducing: please make sure it is a question that would be new to most members
- An actual topic of discussion
Looking for support?
Looking for a community?
- Lemmyverse: community search
- sub.rehab: maps old subreddits to fediverse options, marks official as such
- !lemmy411@lemmy.ca: a community for finding communities
~Icon~ ~by~ ~@Double_A@discuss.tchncs.de~
Look, a heretic!
I actually like Edge more than Chrome.
I don't use either, die-hard Firefox user for decades but if I'm forced to pick one...
Someone put it in AUR: https://aur.archlinux.org/packages/microsoft-edge-stable-bin
Is it really available in a Debian or Ubuntu repo?
it's in basically every distro: https://linuxiac.com/install-microsoft-edge-on-linux/
Many people have given great suggestions for the most destroying commands, but most result in an immediately borked system. While inconvenient, that doesn't have a lasting impact on users who have backups.
I propose writing a bash script set up to run daily in cron, which picks a random file in the user's home directory tree and randomizes just a few bytes of data in the file. The script doesn't immediately damage the basic OS functionality, and the data degradation is so slow that by the time the user realizes something fishy is going on a lot of their documents, media, and hopefully a few months worth of backups will have been corrupted.
Calm down there Satan.
So basically malware by a sadistic internet troll?
Some generative AI is going to swallow this thread and burp it up later
My wife's job is to train AI to not do that. It's pretty interesting, actually.
A bad actor doesn't care what your wife does. :)
I too choose this guys wife
Most orgs doing AI research should be assumed to be bad actors until proven otherwise
vim
Everyone else talking about how to shred files or even the BIOS is missing a big leap, yeah. Not just destroying the computer: destroying the person in front of it! And vim is happy to provide. ๐
Emotional damage
Everyone is deleting data, but with proper backups that's not a problem. How about:
curl insert_url_here | sudo bash
This can really mess up your life.
Even if the script isn't malicious, if the internet drops out halfway the download you might end up with a "rm -r /", or similar, command.
So many things these days use that install.sh piping stuff, very bad practice.
Mistaking if= and of= when using dd.
After all, it is known as the Dick Destroyer.
Edit: Disk Destroyer, I meant to write "Disk Destroyer"...
Everyone is talking about rm -rf /
and damage to storage drives, but I read somewhere about EFI variables having something to do with bricking the computer. If this is possible, then it's a lot more damage than just disk drives.
Edit: this is interesting SE post https://superuser.com/questions/313850
Probably dd if=/dev/zero of=/dev/sda or whatever your system volume is
Posible to recover data, use /dev/urandom.
Only on very old hard disks, on newer disks there's no difference between overwrite patterns
"wipefs -a" instantly removes filesystem signatures. It's fast, doesn't actually delete data but is just as effective in most cases where you're not worried about someone trying to recover it. Much faster than rm on /. As far as the OS is concerned the drive is then empty.
"nvme format" is also fast.
:(){:|:&};:
That 'amp;' does not belong in there, it's probably either a copy-paste error or a Lemmy-error.
What this does (or would do it it were done correctly) is define a function called ":" (the colon symbol) which recursively calls itself twice, piping the output of one instance to the input of the other, then forks the resulting mess to the background. After defining that fork bomb of a function, it is immediately called once.
It's a very old trick that existed even on some of the ancient Unix systems that predated Linux. I think there's some way of defending against using cgroups, but I don't know how from the top of my head.
I think however you're accessing Lemmy is rendering it wrong. I see the usual function.
I was going to suggest a fork bomb, but it is recovered easily. Then I thought about inserting a fork bomb into .profile
, or better, into a boot process script, like:
echo ':(){:|:&};:' | sudo tee -a /bin/iptables-apply
That could be pretty nasty. But still, pretty easy to recover from, so not really "destructive."
./self_destruct.sh
Assuming you have a script that triggers explosives to destroy your computer.
I don't know about how exactly to do it, but I do have an idea or two.
-
Something that will reflash the firmware on as many devices as possible using garbage data. At least the UEFI.
-
Filling most of the drive space, leaving let's say 50MB, then overwriting those 50MB repeatedly to damage the hardware itself. I suppose you could do the same with RAM. If we're dealing with PMR/CMR HDD, then you should just be able to write to specific sectors without doing it by filling the rest.
-
If present, keep ejecting the DVD drive. Either the mechanism dies or someone accidentally bumps into the open tray and breaks it off.
-
Keep hard rebooting the laptop after some time. It may corrupt some data, and put the blame on hardware. The hard reboot can be done by
echo b > /proc/sysrq-trigger
This will need magic SysRq compiled into the kernel, and power off/reboot enabled. The latter can be done by enabling all magic SysRq functionsecho 1 > /proc/sys/kernel/sysrq
or just reboot/power off with "128".
1.- I will start with the infamous
rm-rf /
I don't think there's anything shorter or more elegant than this really. When you're right you're right.
emacs
(Runs away....)
I can't remember but having my hard drive encrypted, I believe there is a single file that messing with it would render the drive not decryptable.
The LUKS headers. If those are corrupted you can't decrypt the drive. The good news is that you can back up the headers to prevent that from happening.
smbios-token-ctl pick one of the "dangerous - permanent write once" tokens
sudo apt install gnome
That wouldn't work on my system.
Typing apt just opens the man page for pacman.
alias cp="rm -rf"
bonus points for putting it into the shells RC file.
Not as destructive as deleting root, but a lot more sneakier
dd if=/dev/urandom of=/dev/sdx
will overwrite every single byte of /dev/sdx with random data. Replace /dev/sdx with the drive you want to wipe. Optionally, specify a larger block size to speed it up more.