
No love for x86?
Still waiting on an update of their last version for x86 from 2022...
Debian bookworm is getting what could be its last hurrah as the basis for Raspberry Pi's operating system, with what's likely to be its final appearance on a release for the diminutive computers. The last major release of Raspberry Pi OS was in November 2024, meaning that there are plenty of changes in this latest update, both …
To quote the maintainer on the official Raspberry Pi site:
"I very much hope so – I’ve been trying to get the time to update that for months now, but other things have got in the way – we were actually discussing it this week. So yes, I hope we will get the chance to update it, but we may well end up skipping bookworm completely and moving straight to trixie for it."
I can’t say enough about how amazing the raspberry pi has been for me.
My raspberry pi running as a DNS level adblocker (aka PiHole) alerted me to the fact that I had a rootkit running on my Linux Mint virtual machine on my desktop computer.
I had a small monitor next to my nightstand that showed DNS requests made by all my devices from my PiHole in real time and noticed a request made from an unknown local IP address
When I scanned the IP address using nmap it showed it was running an Nginx server.
I used grep to look through the kernel logs of my internet connected VM for the local IP address but grep responded by showing me several instances of a different benign foreign IP address which showed that I had a rootkit or that my programs had been tampered with and that they could not be trusted.
I created a disk image of the VM’s virtual storage and scanned it with TestDisk and on deeper scan uncovered several hidden partitions that contained floppy disk images of malware from the late 1980’s and early 1990’s as a calling card which I believed was to not only troll me but to slow down any incidence response as it did considerably.
There were also hidden partitions that contained several dozen folders that used invalid names and were owned by root so that none of my programs could view the contents before using ls to determine the naming scheme (which was a mess of hex and escape characters) so that I could run commands to first rename the folders and then run command to take ownership of the folders and tgen run another command to make them readable so I could open them and had to do the same process to the files contained in them as they also used invalid naming schemes and wete ownened by root with no read permissions just to find out that they were files that contained malware examples and commentary from an old hacking bulletin board from 1889-1990.
This did alleviate some of the anxiety however as it showed that whomever hacked my VM at least had a sense of humor.
Well worth the $40 I spent on the raspberry pi!