this post was submitted on 26 May 2025
-13 points (34.1% liked)

Linux

8602 readers
534 users here now

A community for everything relating to the GNU/Linux operating system (except the memes!)

Also, check out:

Original icon base courtesy of lewing@isc.tamu.edu and The GIMP

founded 2 years ago
MODERATORS
top 9 comments
sorted by: hot top controversial new old
[–] refalo@programming.dev 14 points 2 months ago (3 children)

sudo curl

sudo random binary

Umm

[–] Successful_Try543@feddit.org 4 points 2 months ago* (last edited 2 months ago) (1 children)

sudo curl

I'd use curl to download with user permissions and then sudo mv to the desired place.

sudo random binary

The official binary of your vpn provider isn't exactly "random". They probably also provide means to check whether the downloaded binary is authentic. Yet, they don't elaborate on that here.

[–] refalo@programming.dev 1 points 2 months ago (1 children)

To me, any binary I do not have the source code for is random. I have no idea what's in it and it could be doing any number of malicious things.

[–] Successful_Try543@feddit.org 1 points 2 months ago* (last edited 2 months ago)

Yes, but as it's the official binary of your VPN provider, you're going to need to trust them anyways when using their servers.

[–] bjoern_tantau@swg-empire.de 3 points 2 months ago

Especially considering that every distribution can set up a VPN without any external tools.

[–] nyan@lemmy.cafe 2 points 2 months ago

They did state it was easy, not safe. Unsafe is always easier. (Until it isn't—I'd get back "-bash: sudo: command not found" if I just followed those directions without understanding.)

[–] MangoPenguin@lemmy.blahaj.zone 4 points 2 months ago

Wouldn't using the built in Wireguard VPN on your system be the easiest method? Nothing to install, just import the config.

[–] andybytes@programming.dev 1 points 2 months ago
[–] malin@thelemmy.club 0 points 2 months ago