this post was submitted on 21 May 2026
155 points (99.4% liked)

Technology

84817 readers
4340 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] chloroken@lemmy.ml 1 points 1 hour ago (2 children)

You don't actually believe this, right?

[–] altkey@lemmy.dbzer0.com 2 points 38 minutes ago (1 children)

My uneducated guess is that it would run inside the prefix but would have troubles with basic Windows dependencies not availiable/running, prefix's folder structure being cut down to the most basic components and barebones, and that nothing actually runs like in Windows but is rather translated from Linux commands to Windows one and back? Meaning there's no processes or services like in a VM, no way to run cmd or powershell scripts, nothing to steal without leaving containment? Am I wrong somewhere?

I recall there was a wave of dread about Proton leaving host system easily accessible and not implementing any security measures as they are out of scope, but if we assume it's a virus targeting Windows, I'm half sure it would have troubles doing anything the usual way.

[–] cmnybo@discuss.tchncs.de 1 points 4 minutes ago

The malware won't be able to do as much as it could on windows, but it can still access all of the files your user account has access to. It can steal, encrypt or delete all of your files. It can also access your microphone if you have one connected.

You can run Wine as a different user or run it with firejail to limit what it has access to.