Thread #108679394
File: OIP45.jpg (18.4 KB)
18.4 KB JPG
https://en.wikipedia.org/wiki/Ventoy#Concerns_over_software_security_a nd_validity_of_open_source_claim
Ventoy might contain backdoors or other malicious code:
The author(s?) long refused to react on questions about the source code for the precompiled code inside their git repository.
They long refused to react on questions about the security risks.
When an answer was finally given, it boiled down to a simple "There is no reason to assume that we would have placed malware inside."
Again after a really long time the authors finally mentioned what other source code they used to generate some−but not all−of the pre-compiled code. They did not mention the build methods and refused to prove that this really was the used source code.
The real identities of the authors is unknown.
https://wiki.archlinux.org/title/Ventoy#Known_issues
> opinion?
48 RepliesView Thread
>>
>>
>>
>>
>>
I don't recommend using closed source software but the only reason people are assuming this shit is backdoored is because it was made by a heckin unwholesome yellow man from a country that doesn't tolerate faggotry. These same retards don't care that their own governments were indirectly responsible for WannaCry.
>>
>>
>>
>>
>>108679456
It's real.
https://github.com/ventoy/Ventoy/issues/2795
>>
>>
>>
>>108679447
curious as well I tried other options
>Yumi
Linus distros seems to be working fine but it windows installs are crapping out sometimes
>Balena Etcher
tried it 5 years ago, piece of shit, apperantly also turned out to be possible malware
>>
>>
>>108679447
https://wiki.archlinux.org/title/Multiboot_USB_drive#Automated_tools
>>
>>
>>
>>
>>108679486
Depending on sophistication it could be anything from a runtime injected keylogger script sending your shit off somewhere to preboot kernel patching (after the iso was read but before it's executed) or even a persistent uefi rootkit.
A keylogger would be easy to prove with just wireshark, something more sophisticated on the level of preboot kernel patching or an uefi rootkit not so much. Ventoy does in-flight and preboot injections anyways (because it needs to) so they could also hide something malicious. Personally I don't use ventoy because I don't trust it but that said >>108679756 this is as good an explanation as malware is.
>>
>>
>>
>>
>>
>>
>>
File: image.png (553.6 KB)
553.6 KB PNG
>>108679447
Hardware DVD emulator with SSD inside.
It does not have a software bootloader and streams ISO content as is, secureboot signed etc.
>>
>>
>>
>>
>>
>>108679394
have been following this issue for years now.
it's suspicious but nothing proven so far. the developer responded recently (i mean like almost a year ago by this time) he seems interested in making a proper build system that pulls and compiles the blob from their source at build time.
however it doesn't seem to have gone far beyond just listing the blobs and showing interest in helping.
i think a huge part of the suspicion has to do with the author being Chinese. which is unfortunate. as the the american accusations towards the chinese government of backdooring software and hardware are grossly overexaggerated, and as we know from the recent iran war, it seems like american products are the ones containing backdoors.
i checked the blobs. a lot of them seem to be legit binaries downloaded from different project repos and websites. and the checksums can be verified.
but some are just a mystery box.
idk.
>>
>>
>>
>>108680211
anyway here is the dev's response
https://github.com/ventoy/Ventoy/issues/3224
>>
>>
>>
>>
>>108679394
>>108679462
Problem solved
https://aur.archlinux.org/packages/ventoy
>>
>>108680390
in the wiki for ventoy they say it about this exact package https://wiki.archlinux.org/title/Ventoy#Known_issues read above
>>
>>108680144
You can read most of the code. You can't read the binary blobs (or reproduce them) that are responsible for the preboot hooks necessary for ventoy to work. With those same hooks you could do the shit I described up above. Since no one but the dev has access to what these blobs actually are it's impossible to prove it is or isn't malware either way.
>>
>>
>>
>>
File: 1776742174406640.jpg (93.5 KB)
93.5 KB JPG
>>108680872
and my ass farts on you
>>
>>
>>
>>108680985
https://wiki.archlinux.org/title/Multiboot_USB_drive#Automated_tools
>>
>>
>>108680985
I have one of those external drive enclosures which can read & mount ISO onto virtual optical drives. I pick the ISO from the menu and the PC sees a USB optical drive with the corresponding disc in there.