Calameres Installer Log Has Strange information
2025-03-31 - 15:11:33 [6]: Running QList("rsync", "-aHAXSr", "--filter=-x
This entry is very perplexing. I scratch my head.
Question:
Is rsync a tool targeted to be used for exploitation?
Can an attacker, middling the network activity, modify an ISO to contain backdoor code?
Would using a backdoored in transit OS make verifying the ISO is good impossible?
When Calameres is altered in transit, would shasum identify the ISO as not matching hashed values?
When I was using non-Artix Arch, when I would do an update, the network would slow to a crawl when downloading GCC and Firefox, 54kib/s->10kib/s. The other files would download at 200kib/s->300kib/s.
In Artix updates there isn't GCC and Firefox updates. Instead, linux headers and firmware are now being slowed to a crawl.
When I downloaded the ISO for Artix, the download suffered speed degradation issues also.
I did not verify the ISO.
When I saw the speed degradation of the Artix ISO download, I contemplated trashing the degradated ISO and downloading another copy.
It appears to be selective in which files are attacked within a download group. It is consistent in which files get the speed reductions.
Speed changes to modify files doesn't mean it's local, unless it's the network administrator level at the University.
It could also be an entity between my connection and where I'm downloading from, like some evil DNS provider.