1
0
Fork 0
mirror of https://github.com/ventoy/Ventoy.git synced 2026-03-03 00:07:49 -05:00

[issue]: Remove BLOBs from the source tree #2162

Closed
opened 2026-02-20 21:19:56 -05:00 by deekerman · 170 comments
Owner

Originally created by @FairyTail2000 on GitHub (Apr 3, 2024).

What happened?

Due to the recent XZ-Utils drama I checked the code and I'm appalled. There are more BLOBS than source code.
github.com/ventoy/Ventoy@3f65f0ef03/cryptsetup
github.com/ventoy/Ventoy@3f65f0ef03/Unix/ventoy_unix
github.com/ventoy/Ventoy@3f65f0ef03/DMSETUP

There is no reason to have those not be build in the release process. Of course it's convenient, they are prebuild, it's fast and nobody has a problem with it.

Recent events however showed that these BLOBs can contain everything and nothing. The build instructions would not produce the exact same executable for everyone. It's better to have GitHub build it on-push and use them out of the build cache.

I would do it myself, but unfortunately I'm not familiar enough with the Ventoy build process to actually do it. I understand that removing BLOBs isn't a priority over new and shiny features. But due to recent events, this should be rethought.

Thank you for reading this and I hope for a productive conversation

Originally created by @FairyTail2000 on GitHub (Apr 3, 2024). ### What happened? Due to the recent XZ-Utils drama I checked the code and I'm appalled. There are more BLOBS than source code. https://github.com/ventoy/Ventoy/tree/3f65f0ef03e4aebcd14f233ca808a4f894657802/cryptsetup https://github.com/ventoy/Ventoy/tree/3f65f0ef03e4aebcd14f233ca808a4f894657802/Unix/ventoy_unix https://github.com/ventoy/Ventoy/tree/3f65f0ef03e4aebcd14f233ca808a4f894657802/DMSETUP There is no reason to have those not be build in the release process. Of course it's convenient, they are prebuild, it's fast and nobody has a problem with it. Recent events however showed that these BLOBs can contain everything and nothing. The build instructions would not produce the exact same executable for everyone. It's better to have GitHub build it on-push and use them out of the build cache. I would do it myself, but unfortunately I'm not familiar enough with the Ventoy build process to actually do it. I understand that removing BLOBs isn't a priority over new and shiny features. But due to recent events, this should be rethought. Thank you for reading this and I hope for a productive conversation
deekerman 2026-02-20 21:19:56 -05:00
Author
Owner

@REALERvolker1 commented on GitHub (Apr 3, 2024):

Hear hear!

@REALERvolker1 commented on GitHub (Apr 3, 2024): Hear hear!
Author
Owner

@FairyTail2000 commented on GitHub (Apr 3, 2024):

For those that are not familiar with the xz-utils backdoor, here is the original email send by Andres Freund who discovered the backdoor:

https://www.openwall.com/lists/oss-security/2024/03/29/4

@FairyTail2000 commented on GitHub (Apr 3, 2024): For those that are not familiar with the xz-utils backdoor, here is the original email send by Andres Freund who discovered the backdoor: [https://www.openwall.com/lists/oss-security/2024/03/29/4](https://www.openwall.com/lists/oss-security/2024/03/29/4)
Author
Owner

@elypter2 commented on GitHub (Apr 3, 2024):

Ventoy is in a quite unique position to be the target of state and non-state adversaries as malware and exploits could not only target certain installations or distros but the whole user base. In the face of headlines about linux desktop percentages ventoy could attract focus in search for new vectors.

@elypter2 commented on GitHub (Apr 3, 2024): Ventoy is in a quite unique position to be the target of state and non-state adversaries as malware and exploits could not only target certain installations or distros but the whole user base. In the face of headlines about linux desktop percentages ventoy could attract focus in search for new vectors.
Author
Owner

@jeekkd commented on GitHub (Apr 3, 2024):

Ventoy is in a quite unique position to be the target of state and non-state adversaries as malware and exploits could not only target certain installations or distros but the whole user base. In the face of headlines about linux desktop percentages ventoy could attract focus in search for new vectors.

I fully agree, I use this not just at home but work too!

@jeekkd commented on GitHub (Apr 3, 2024): > Ventoy is in a quite unique position to be the target of state and non-state adversaries as malware and exploits could not only target certain installations or distros but the whole user base. In the face of headlines about linux desktop percentages ventoy could attract focus in search for new vectors. I fully agree, I use this not just at home but work too!
Author
Owner

@exalented commented on GitHub (Apr 7, 2024):

Don't get your hopes up this has been an issue for a very long time. Use something else!
https://github.com/ventoy/Ventoy/issues/132

@exalented commented on GitHub (Apr 7, 2024): Don't get your hopes up this has been an issue for a very long time. Use something else! https://github.com/ventoy/Ventoy/issues/132
Author
Owner

@digitalspaceport commented on GitHub (Apr 7, 2024):

Regardless of recent events, this should be addressed. Ventoy is an excellent concept and pretty solid execution, but security should be a critical focus. If the developer does or does not want to address this, hopefully some community members can contribute to alleviate this as a concern. For now I think it is a good idea to not use Ventoy myself.

@digitalspaceport commented on GitHub (Apr 7, 2024): Regardless of recent events, this should be addressed. Ventoy is an excellent concept and pretty solid execution, but security should be a critical focus. If the developer does or does not want to address this, hopefully some community members can contribute to alleviate this as a concern. For now I think it is a good idea to not use Ventoy myself.
Author
Owner

@catherinedoyel commented on GitHub (Apr 8, 2024):

An XZ style attack is a once every few years worst case.
You can do harmless things with blobs and harmful things with source.

I would do it myself, but unfortunately I'm not familiar enough with the Ventoy build process to actually do it.

Do you want Jia Tan to come in and save us from these blobs?

The main maintainer has been on vacation for a while has only just gotten back online a few days ago.

Regarding the specifically attached binaries.
Nearby in these folders (that were last modified years ago) they show how they were built in plain text.
The build process already takes 15 to 20 minutes.

There are certainly security considerations when using Ventoy. #135
But becoming Richard Stallman and demanding no binaries at any cost is not very useful.

@catherinedoyel commented on GitHub (Apr 8, 2024): An XZ style attack is a once every few years worst case. You can do harmless things with blobs and harmful things with source. > I would do it myself, but unfortunately I'm not familiar enough with the Ventoy build process to actually do it. Do you want Jia Tan to come in and save us from these blobs? The main maintainer has been on vacation for a while has only just gotten back online a few days ago. Regarding the specifically attached binaries. Nearby in these folders (that were last modified years ago) they show how they were built in plain text. The build process already takes 15 to 20 minutes. There are certainly security considerations when using Ventoy. #135 But becoming Richard Stallman and demanding no binaries at any cost is not very useful.
Author
Owner

@OboTheHobo commented on GitHub (Apr 27, 2024):

An XZ style attack is a once every few years worst case.
You can do harmless things with blobs and harmful things with source.

You're missing the point. No there's nothing inheritly more dangerous about the blobs themselves. The issue is that one can't verify if it's safe or not. Source code can be audited, vulnerabilities discovered. You can't really do that with binary blobs. That's a major part of the open-source ethos.

@OboTheHobo commented on GitHub (Apr 27, 2024): > An XZ style attack is a once every few years worst case. > You can do harmless things with blobs and harmful things with source. You're missing the point. No there's nothing inheritly more dangerous about the blobs themselves. The issue is that one can't verify if it's safe or not. Source code can be audited, vulnerabilities discovered. You can't really do that with binary blobs. That's a major part of the open-source ethos.
Author
Owner

@escape0707 commented on GitHub (Apr 30, 2024):

It's been a month. I think the developer should have enough time to respond to both the xz attack and this issue. I really hope to hear some official response.

从 XZ 的攻击到现在已经过了一个月了,我想开发者应该有足够的时间就这个 issue 所谈及的问题做出回应了。我真诚希望能够看到开发者官方的回应。

Thanks for developing this useful software.

感谢你开发这个软件的时间精力。

@escape0707 commented on GitHub (Apr 30, 2024): It's been a month. I think the developer should have enough time to respond to both the xz attack and this issue. I really hope to hear some official response. 从 XZ 的攻击到现在已经过了一个月了,我想开发者应该有足够的时间就这个 issue 所谈及的问题做出回应了。我真诚希望能够看到开发者官方的回应。 Thanks for developing this useful software. 感谢你开发这个软件的时间精力。
Author
Owner

@bernardgut commented on GitHub (Jun 7, 2024):

SO how is this coming ?

@bernardgut commented on GitHub (Jun 7, 2024): SO how is this coming ?
Author
Owner

@simon1tan commented on GitHub (Jun 15, 2024):

An XZ style attack is a once every few years worst case. You can do harmless things with blobs and harmful things with source.

I would do it myself, but unfortunately I'm not familiar enough with the Ventoy build process to actually do it.

Do you want Jia Tan to come in and save us from these blobs?

The main maintainer has been on vacation for a while has only just gotten back online a few days ago.

Regarding the specifically attached binaries. Nearby in these folders (that were last modified years ago) they show how they were built in plain text. The build process already takes 15 to 20 minutes.

There are certainly security considerations when using Ventoy. #135 But becoming Richard Stallman and demanding no binaries at any cost is not very useful.

I found Jia Tan ^^

@simon1tan commented on GitHub (Jun 15, 2024): > An XZ style attack is a once every few years worst case. You can do harmless things with blobs and harmful things with source. > > > I would do it myself, but unfortunately I'm not familiar enough with the Ventoy build process to actually do it. > > Do you want Jia Tan to come in and save us from these blobs? > > The main maintainer has been on vacation for a while has only just gotten back online a few days ago. > > Regarding the specifically attached binaries. Nearby in these folders (that were last modified years ago) they show how they were built in plain text. The build process already takes 15 to 20 minutes. > > There are certainly security considerations when using Ventoy. #135 But becoming Richard Stallman and demanding no binaries at any cost is not very useful. I found Jia Tan ^^
Author
Owner

@sneurlax commented on GitHub (Jun 15, 2024):

I would like to volunteer to help. I guess I should get to a-forking, eh?

What's a good place to start?

@sneurlax commented on GitHub (Jun 15, 2024): I would like to volunteer to help. I guess I should get to a-forking, eh? What's a good place to start?
Author
Owner

@code959437957 commented on GitHub (Jun 16, 2024):

  1. develop software make cost
  2. you cannot blame an OSS developer for such much security reason
  3. we can set up an OSS foundation to support that software development and growth。
  4. Hire more author to contribute this project。 pay for their jobs。
@code959437957 commented on GitHub (Jun 16, 2024): 1. develop software make cost 2. you cannot blame an OSS developer for such much security reason 3. we can set up an OSS foundation to support that software development and growth。 4. Hire more author to contribute this project。 pay for their jobs。
Author
Owner

@no-usernames-left commented on GitHub (Jun 16, 2024):

Regarding the specifically attached binaries.
Nearby in these folders (that were last modified years ago) they show how they were built in plain text.
The build process already takes 15 to 20 minutes.

Does following the documented process result in blobs which are byte-for-byte identical?

If not, then the directions serve no purpose.

@no-usernames-left commented on GitHub (Jun 16, 2024): > Regarding the specifically attached binaries. > Nearby in these folders (that were last modified years ago) they show how they were built in plain text. > The build process already takes 15 to 20 minutes. Does following the documented process result in blobs which are byte-for-byte identical? If not, then the directions serve no purpose.
Author
Owner

@escape0707 commented on GitHub (Jun 16, 2024):

  1. develop software make cost
  2. you cannot blame an OSS developer for such much security reason
  3. we can set up an OSS foundation to support that software development and growth。
  4. Hire more author to contribute this project。 pay for their jobs。

You didn't understand it. OP literally said they would like to "do it myself". It's just the developer has a better understanding of their own project and it's better for them to explain the reason why these blobs exist first so that others can contribute. It's not that the community is blaming the developer for not developing a perfect program. It's because the community wants an explanation, and the fact that it never comes after months is frustrating.

@escape0707 commented on GitHub (Jun 16, 2024): > 1. develop software make cost > 2. you cannot blame an OSS developer for such much security reason > 3. we can set up an OSS foundation to support that software development and growth。 > 4. Hire more author to contribute this project。 pay for their jobs。 > You didn't understand it. OP literally said they would like to "do it myself". It's just the developer has a better understanding of their own project and it's better for them to explain the reason why these blobs exist first so that others can contribute. It's not that the community is blaming the developer for not developing a perfect program. It's because the community wants an explanation, and the fact that it never comes after months is frustrating.
Author
Owner

@catherinedoyel commented on GitHub (Jun 16, 2024):

It's because the community wants an explanation, and the fact that it never comes after months is frustrating.

The three files explicitly mentioned on the original message opening the thread.
They have either direct source code / notes referencing where the source code came from in the same folder.

Cryptsetup: https://github.com/ventoy/Ventoy/tree/v1.0.99/cryptsetup
BSD: https://github.com/ventoy/Ventoy/tree/v1.0.99/Unix
Dmsetup: https://github.com/ventoy/Ventoy/tree/v1.0.99/DMSETUP

Until you can point out a binary that has no source/readme next to it there isn't a point in yapping in this thread any more about blobs.

Regarding

  1. develop software make cost
  2. you cannot blame an OSS developer for such much security reason
  3. we can set up an OSS foundation to support that software development and growth。
  4. Hire more author to contribute this project。 pay for their jobs。

I agree, and incentivized funding as been tried. It seemed like very few took up the offer of the "Ventoy Subcription". So it was removed.
https://web.archive.org/web/20230930033229/https://www.ventoy.net/en/doc_subscription.html
github.com/ventoy/Ventoy@2be340d2e8

Now all that remains is generic donation pages.
Looking at the publicly viewable Bitcoin donations in total 0.0273 BTC had been received over 3 years. At the current price that equates to $600 a year. (Which has never been spent.)
I would have to guess similar amounts have been donated through PayPal, Liberapay, & WeChat.
This isn't enough income to quit job and focus on Ventoy development.

The way most of these post are written it sounds like you are accusing Longpanda is like Jia Tan.
If anything they are closer to Lasse Collin.

@catherinedoyel commented on GitHub (Jun 16, 2024): > It's because the community wants an explanation, and the fact that it never comes after months is frustrating. The three files explicitly mentioned on the original message opening the thread. They have either direct source code / notes referencing where the source code came from in the same folder. Cryptsetup: https://github.com/ventoy/Ventoy/tree/v1.0.99/cryptsetup BSD: https://github.com/ventoy/Ventoy/tree/v1.0.99/Unix Dmsetup: https://github.com/ventoy/Ventoy/tree/v1.0.99/DMSETUP Until you can point out a binary that has no source/readme next to it there isn't a point in yapping in this thread any more about blobs. Regarding > 1. develop software make cost > 2. you cannot blame an OSS developer for such much security reason > 3. we can set up an OSS foundation to support that software development and growth。 > 4. Hire more author to contribute this project。 pay for their jobs。 I agree, and incentivized funding as been tried. It seemed like very few took up the offer of the "Ventoy Subcription". So it was removed. https://web.archive.org/web/20230930033229/https://www.ventoy.net/en/doc_subscription.html https://github.com/ventoy/Ventoy/commit/2be340d2e8db0fa70fb4f132a99dfe8824ede6c8 Now all that remains is generic donation pages. Looking at the publicly viewable Bitcoin donations in total 0.0273 BTC had been received over 3 years. At the current price that equates to $600 a year. (Which has never been spent.) I would have to guess similar amounts have been donated through PayPal, Liberapay, & WeChat. This isn't enough income to quit job and focus on Ventoy development. The way most of these post are written it sounds like you are accusing Longpanda is like Jia Tan. If anything they are closer to Lasse Collin.
Author
Owner

@KucharczykL commented on GitHub (Jul 17, 2024):

Until you can point out a binary that has no source/readme next to it there isn't a point in yapping in this thread any more about blobs.

If you look at the linked https://github.com/ventoy/Ventoy/issues/132 and rerun the same commands (with added "grep -v script" to remove executable scripts which are not binary blobs) you get this:

find . -type f -print0 | xargs -0 file | grep -v "ASCII" | grep "executable" | grep -v "script"
Ventoy/BUSYBOX/chmod/vtchmod32:                                                                       ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, BuildID[sha1]=6064638b7e9c2cd083dd3ab9282f2c93f635c70b, not stripped
Ventoy/BUSYBOX/chmod/vtchmod64:                                                                       ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=b6dc6b695c263ea8417515131d184a33f1777987, not stripped
Ventoy/BUSYBOX/chmod/vtchmod64_musl:                                                                  ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
Ventoy/BUSYBOX/chmod/vtchmodaa64:                                                                     ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped
Ventoy/BUSYBOX/chmod/vtchmodm64e:                                                                     ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), statically linked, stripped
Ventoy/DMSETUP/dmsetup32:                                                                             ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, BuildID[sha1]=6d3f888cec25c6c09092a8968d9244021978ab97, stripped
Ventoy/DMSETUP/dmsetup64:                                                                             ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
Ventoy/DMSETUP/dmsetupaa64:                                                                           ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped
Ventoy/DMSETUP/dmsetupm64e:                                                                           ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), statically linked, stripped
Ventoy/FUSEISO/vtoy_fuse_iso_32:                                                                      ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
Ventoy/FUSEISO/vtoy_fuse_iso_64:                                                                      ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
Ventoy/FUSEISO/vtoy_fuse_iso_aa64:                                                                    ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped
Ventoy/IMG/cpio_arm64/ventoy/busybox/a64:                                                             ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped
Ventoy/IMG/cpio_arm64/ventoy/busybox/vtchmodaa64:                                                     ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped
Ventoy/IMG/cpio_arm64/ventoy/busybox/xzminidecaa64:                                                   ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped
Ventoy/IMG/cpio_arm64/ventoy/tool/lz4cataa64:                                                         ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped
Ventoy/IMG/cpio_arm64/ventoy/tool/zstdcataa64:                                                        ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped
Ventoy/IMG/cpio_mips64/ventoy/busybox/m64:                                                            ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), statically linked, stripped
Ventoy/IMG/cpio_mips64/ventoy/busybox/vtchmodm64e:                                                    ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), statically linked, stripped
Ventoy/IMG/cpio_mips64/ventoy/busybox/xzminidecm64e:                                                  ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), statically linked, stripped
Ventoy/IMG/cpio_mips64/ventoy/tool/lz4catm64e:                                                        ELF 64-bit LSB executable, MIPS, MIPS-III version 1 (SYSV), statically linked, stripped
Ventoy/IMG/cpio_x86/ventoy/busybox/64h:                                                               ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
Ventoy/IMG/cpio_x86/ventoy/busybox/ash:                                                               ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
Ventoy/IMG/cpio_x86/ventoy/busybox/vtchmod32:                                                         ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, BuildID[sha1]=6064638b7e9c2cd083dd3ab9282f2c93f635c70b, not stripped
Ventoy/IMG/cpio_x86/ventoy/busybox/vtchmod64:                                                         ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=b6dc6b695c263ea8417515131d184a33f1777987, not stripped
Ventoy/IMG/cpio_x86/ventoy/busybox/vtchmod64_musl:                                                    ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
Ventoy/IMG/cpio_x86/ventoy/busybox/xzminidec32:                                                       ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, BuildID[sha1]=23b67ba67cdb35d22addd9d0c5a544c8c540e15e, stripped
Ventoy/IMG/cpio_x86/ventoy/busybox/xzminidec64:                                                       ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=e7ee6503212fbcbb75c73caa726f8123f1b04282, stripped
Ventoy/IMG/cpio_x86/ventoy/busybox/xzminidec64_musl:                                                  ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
Ventoy/IMG/cpio_x86/ventoy/tool/ar:                                                                   ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
Ventoy/IMG/cpio_x86/ventoy/tool/inotifyd:                                                             ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
Ventoy/IMG/cpio_x86/ventoy/tool/lz4cat:                                                               ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
Ventoy/IMG/cpio_x86/ventoy/tool/lz4cat64:                                                             ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
Ventoy/IMG/cpio_x86/ventoy/tool/zstdcat:                                                              ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, BuildID[sha1]=c35922b16c95c17cf28c85d014256fab67aa54ca, stripped
Ventoy/IMG/cpio_x86/ventoy/tool/zstdcat64:                                                            ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=86d8285467856e17f7837cf6a6302ac5c54b1801, stripped
Ventoy/INSTALL/EFI/BOOT/BOOTAA64.EFI:                                                                 PE32+ executable (EFI application) Aarch64 (stripped to external PDB), for MS Windows, 4 sections
Ventoy/INSTALL/EFI/BOOT/BOOTIA32.EFI:                                                                 PE32 executable (EFI application) Intel 80386 (stripped to external PDB), for MS Windows, 8 sections
Ventoy/INSTALL/EFI/BOOT/BOOTMIPS.EFI:                                                                 PE32+ executable (EFI application) MIPS R4000 (stripped to external PDB), for MS Windows, 4 sections
Ventoy/INSTALL/EFI/BOOT/BOOTX64.EFI:                                                                  PE32+ executable (EFI application) x86-64 (stripped to external PDB), for MS Windows, 10 sections
Ventoy/INSTALL/EFI/BOOT/MokManager.efi:                                                               PE32+ executable (EFI application) x86-64 (stripped to external PDB), for MS Windows, 7 sections
Ventoy/INSTALL/EFI/BOOT/grub.efi:                                                                     PE32+ executable (EFI application) x86-64 (stripped to external PDB), for MS Windows, 7 sections
Ventoy/INSTALL/EFI/BOOT/grubia32.efi:                                                                 PE32 executable (EFI application) Intel 80386 (stripped to external PDB), for MS Windows, 7 sections
Ventoy/INSTALL/EFI/BOOT/grubia32_real.efi:                                                            PE32 executable (EFI application) Intel 80386 (stripped to external PDB), for MS Windows, 4 sections
Ventoy/INSTALL/EFI/BOOT/grubx64_real.efi:                                                             PE32+ executable (EFI application) x86-64 (stripped to external PDB), for MS Windows, 4 sections
Ventoy/INSTALL/EFI/BOOT/mmia32.efi:                                                                   PE32 executable (EFI application) Intel 80386 (stripped to external PDB), for MS Windows, 6 sections
Ventoy/INSTALL/Ventoy2Disk.exe:                                                                       PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
Ventoy/INSTALL/Ventoy2Disk_ARM.exe:                                                                   PE32 executable (GUI) ARMv7 Thumb, for MS Windows, 6 sections
Ventoy/INSTALL/Ventoy2Disk_ARM64.exe:                                                                 PE32+ executable (GUI) Aarch64, for MS Windows, 6 sections
Ventoy/INSTALL/Ventoy2Disk_X64.exe:                                                                   PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
Ventoy/INSTALL/VentoyGUI.aarch64:                                                                     ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, for GNU/Linux 3.7.0, BuildID[sha1]=755ca11d96d5c472021afff32268dd3d75c3c95f, with debug_info, not stripped
Ventoy/INSTALL/VentoyGUI.i386:                                                                        ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=981b66653589b35c3f966b1d93eff892d75a0d92, not stripped
Ventoy/INSTALL/VentoyGUI.mips64el:                                                                    ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), dynamically linked, interpreter /lib64/ld.so.1, for GNU/Linux 3.2.0, with debug_info, not stripped
Ventoy/INSTALL/VentoyGUI.x86_64:                                                                      ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=79025f55cc0c88ab787a1596389c0e652f7697ea, not stripped
Ventoy/INSTALL/tool/aarch64/Plugson:                                                                  ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, for GNU/Linux 3.7.0, BuildID[sha1]=21915a75b711b542f38c0df00c14a8fa1a199e1c, stripped
Ventoy/INSTALL/tool/aarch64/V2DServer:                                                                ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, for GNU/Linux 3.7.0, BuildID[sha1]=9f966188d6690d114d3fe930f7999a1d485d6b8c, stripped
Ventoy/INSTALL/tool/aarch64/Ventoy2Disk.gtk3:                                                         ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, for GNU/Linux 3.7.0, BuildID[sha1]=76bb90bca2cd372655aba81d79c78b2003938359, stripped
Ventoy/INSTALL/tool/aarch64/Ventoy2Disk.qt5:                                                          ELF 64-bit LSB executable, ARM aarch64, version 1 (GNU/Linux), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, for GNU/Linux 3.7.0, BuildID[sha1]=d387dbb5e1a70f6c7e44d1925e4d069dc53ec379, with debug_info, not stripped
Ventoy/INSTALL/tool/aarch64/ash:                                                                      ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped
Ventoy/INSTALL/tool/aarch64/hexdump:                                                                  ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped
Ventoy/INSTALL/tool/aarch64/mkexfatfs:                                                                ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, for GNU/Linux 3.7.0, BuildID[sha1]=369804983c3e61db317cafaa846193f1c9d36496, stripped
Ventoy/INSTALL/tool/aarch64/mount.exfat-fuse:                                                         ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, for GNU/Linux 3.7.0, BuildID[sha1]=89c87cfdb74b75aac11ff1c30c7fb6bfd65185b1, stripped
Ventoy/INSTALL/tool/aarch64/vlnk:                                                                     ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped
Ventoy/INSTALL/tool/aarch64/vtoycli:                                                                  ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped
Ventoy/INSTALL/tool/aarch64/xzcat:                                                                    ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped
Ventoy/INSTALL/tool/i386/Plugson:                                                                     ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=dde0dccb89cf362e46d6e140e2776face2804691, stripped
Ventoy/INSTALL/tool/i386/V2DServer:                                                                   ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=0063887c7d75403133837397bb56b080a557bf20, stripped
Ventoy/INSTALL/tool/i386/Ventoy2Disk.gtk2:                                                            ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=488292276e5880270a4a3d44e55a120e2355bfb7, stripped
Ventoy/INSTALL/tool/i386/Ventoy2Disk.gtk3:                                                            ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=b26dc7c057b35b724138cd60a022adfa9b768b18, stripped
Ventoy/INSTALL/tool/i386/Ventoy2Disk.qt5:                                                             ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 3.2.0, BuildID[sha1]=1059f8c9d096164d3686144e9cff2d9933a2d28c, not stripped
Ventoy/INSTALL/tool/i386/ash:                                                                         ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
Ventoy/INSTALL/tool/i386/hexdump:                                                                     ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
Ventoy/INSTALL/tool/i386/mkexfatfs:                                                                   ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 2.6.18, BuildID[sha1]=453067475dcb3ebfbe9118fd9ab6d0310e920aaf, stripped
Ventoy/INSTALL/tool/i386/mount.exfat-fuse:                                                            ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 2.6.18, BuildID[sha1]=2abc015964733cd9fb96c552fde04bd2777db3f3, stripped
Ventoy/INSTALL/tool/i386/vlnk:                                                                        ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, BuildID[sha1]=3f099a86afbaa096d56bea6dd9d56a8981889378, stripped
Ventoy/INSTALL/tool/i386/vtoycli:                                                                     ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, BuildID[sha1]=6c6908c9a1f6a0f6b487b4eb3ea1b26191f5b362, stripped
Ventoy/INSTALL/tool/i386/xzcat:                                                                       ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
Ventoy/INSTALL/tool/mips64el/Plugson:                                                                 ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), dynamically linked, interpreter /lib64/ld.so.1, for GNU/Linux 3.2.0, stripped
Ventoy/INSTALL/tool/mips64el/V2DServer:                                                               ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), dynamically linked, interpreter /lib64/ld.so.1, for GNU/Linux 3.2.0, stripped
Ventoy/INSTALL/tool/mips64el/Ventoy2Disk.gtk3:                                                        ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), dynamically linked, interpreter /lib64/ld.so.1, for GNU/Linux 3.2.0, stripped
Ventoy/INSTALL/tool/mips64el/Ventoy2Disk.qt5:                                                         ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), dynamically linked, interpreter /lib64/ld.so.1, for GNU/Linux 3.2.0, with debug_info, not stripped
Ventoy/INSTALL/tool/mips64el/ash:                                                                     ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), statically linked, stripped
Ventoy/INSTALL/tool/mips64el/hexdump:                                                                 ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), statically linked, stripped
Ventoy/INSTALL/tool/mips64el/mkexfatfs:                                                               ELF 64-bit LSB pie executable, MIPS, MIPS64 rel2 version 1 (SYSV), dynamically linked, interpreter /lib64/ld.so.1, BuildID[sha1]=508fab5369120a3c4707454df5c516ea962c1647, for GNU/Linux 3.2.0, stripped
Ventoy/INSTALL/tool/mips64el/mount.exfat-fuse:                                                        ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), dynamically linked, interpreter /lib64/ld.so.1, BuildID[sha1]=450dde6154b74dff444503e150a7ac1f85f709c0, for GNU/Linux 3.2.0, stripped
Ventoy/INSTALL/tool/mips64el/vlnk:                                                                    ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), statically linked, stripped
Ventoy/INSTALL/tool/mips64el/vtoycli:                                                                 ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), statically linked, stripped
Ventoy/INSTALL/tool/mips64el/xzcat:                                                                   ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), statically linked, stripped
Ventoy/INSTALL/tool/x86_64/Plugson:                                                                   ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=9665da3616f8ad132a625d4004ba674ab6d0ef76, stripped
Ventoy/INSTALL/tool/x86_64/V2DServer:                                                                 ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=e2a94f53bbe0274ba2a5285e5bf3e5720c4c00cc, stripped
Ventoy/INSTALL/tool/x86_64/Ventoy2Disk.gtk2:                                                          ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=a77656e9f7fe8fb5ba8978388d99113ed0fd1a20, stripped
Ventoy/INSTALL/tool/x86_64/Ventoy2Disk.gtk3:                                                          ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=d3ab1d1d67b2d41b7d878e7147e30188e9244e5e, stripped
Ventoy/INSTALL/tool/x86_64/Ventoy2Disk.qt5:                                                           ELF 64-bit LSB executable, x86-64, version 1 (GNU/Linux), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=935364d813327806214b8d2edd194496a7dde69d, not stripped
Ventoy/INSTALL/tool/x86_64/ash:                                                                       ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
Ventoy/INSTALL/tool/x86_64/hexdump:                                                                   ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
Ventoy/INSTALL/tool/x86_64/mkexfatfs:                                                                 ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=de003a5ae097b4004e6b77e6cd71d2410df7b310, stripped
Ventoy/INSTALL/tool/x86_64/mount.exfat-fuse:                                                          ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=02eed644b421446629c592b31da15b94d9f5c0de, stripped
Ventoy/INSTALL/tool/x86_64/vlnk:                                                                      ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
Ventoy/INSTALL/tool/x86_64/vtoycli:                                                                   ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
Ventoy/INSTALL/tool/x86_64/xzcat:                                                                     ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
Ventoy/INSTALL/ventoy/imdisk/32/imdisk.cpl:                                                           PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 4 sections
Ventoy/INSTALL/ventoy/imdisk/32/imdisk.exe:                                                           PE32 executable (console) Intel 80386, for MS Windows, 4 sections
Ventoy/INSTALL/ventoy/imdisk/32/imdisk.sys:                                                           PE32 executable (native) Intel 80386, for MS Windows, 7 sections
Ventoy/INSTALL/ventoy/imdisk/64/imdisk.cpl:                                                           PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 5 sections
Ventoy/INSTALL/ventoy/imdisk/64/imdisk.exe:                                                           PE32+ executable (console) x86-64, for MS Windows, 5 sections
Ventoy/INSTALL/ventoy/imdisk/64/imdisk.sys:                                                           PE32+ executable (native) x86-64, for MS Windows, 7 sections
Ventoy/INSTALL/ventoy/ipxe.krn:                                                                       Linux kernel x86 boot executable bzImage, version 1.0.0+, RO-rootFS,
Ventoy/INSTALL/ventoy/iso9660_aa64.efi:                                                               PE32+ executable (EFI boot service driver) Aarch64, for MS Windows, 3 sections
Ventoy/INSTALL/ventoy/iso9660_ia32.efi:                                                               PE32 executable (EFI boot service driver) Intel 80386, for MS Windows, 3 sections
Ventoy/INSTALL/ventoy/iso9660_x64.efi:                                                                PE32+ executable (EFI boot service driver) x86-64, for MS Windows, 3 sections
Ventoy/INSTALL/ventoy/memdisk:                                                                        Linux kernel x86 boot executable bzImage, version MEMDISK 6.03 2014-10-06, RW-rootFS,
Ventoy/INSTALL/ventoy/udf_aa64.efi:                                                                   PE32+ executable (EFI boot service driver) Aarch64, for MS Windows, 3 sections
Ventoy/INSTALL/ventoy/udf_ia32.efi:                                                                   PE32 executable (EFI boot service driver) Intel 80386, for MS Windows, 3 sections
Ventoy/INSTALL/ventoy/udf_x64.efi:                                                                    PE32+ executable (EFI boot service driver) x86-64, for MS Windows, 3 sections
Ventoy/INSTALL/ventoy/ventoy_aa64.efi:                                                                PE32+ executable (EFI application) Aarch64, for MS Windows, 3 sections
Ventoy/INSTALL/ventoy/ventoy_ia32.efi:                                                                PE32 executable (EFI application) Intel 80386, for MS Windows, 3 sections
Ventoy/INSTALL/ventoy/ventoy_x64.efi:                                                                 PE32+ executable (EFI application) x86-64, for MS Windows, 3 sections
Ventoy/INSTALL/ventoy/vtoyjump32.exe:                                                                 PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
Ventoy/INSTALL/ventoy/vtoyjump64.exe:                                                                 PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
Ventoy/INSTALL/ventoy/vtoyutil_aa64.efi:                                                              PE32+ executable (EFI application) Aarch64, for MS Windows, 3 sections
Ventoy/INSTALL/ventoy/vtoyutil_ia32.efi:                                                              PE32 executable (EFI application) Intel 80386, for MS Windows, 3 sections
Ventoy/INSTALL/ventoy/vtoyutil_x64.efi:                                                               PE32+ executable (EFI application) x86-64, for MS Windows, 3 sections
Ventoy/LZIP/lunzip32:                                                                                 ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, BuildID[sha1]=2c1b3b97e7aed54fb0b2872412ba9fc32c0d48c8, stripped
Ventoy/LZIP/lunzip64:                                                                                 ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=0333382234408c1840421dd6a017b4e30acc203e, stripped
Ventoy/LZIP/lunzipaa64:                                                                               ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped
Ventoy/LZIP/lz4cat64:                                                                                 ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
Ventoy/LZIP/lz4cataa64:                                                                               ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped
Ventoy/LZIP/lz4catm64e:                                                                               ELF 64-bit LSB executable, MIPS, MIPS-III version 1 (SYSV), statically linked, stripped
Ventoy/LiveCD/GRUB/bootx64.efi:                                                                       PE32+ executable (EFI application) x86-64 (stripped to external PDB), for MS Windows, 4 sections
Ventoy/LiveCD/ISO/EFI/boot/vmlinuz64:                                                                 Linux kernel x86 boot executable bzImage, version 5.4.3-tinycore64 (tc@box) #2020 SMP Tue Dec 17 17:38:30 UTC 2019, RO-rootFS, swap_dev 0X4, Normal VGA
Ventoy/LiveCDGUI/EXT/busybox-x86_64:                                                                  ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
Ventoy/LiveCDGUI/GRUB/bootx64.efi:                                                                    PE32+ executable (EFI application) x86-64 (stripped to external PDB), for MS Windows, 4 sections
Ventoy/Plugson/vs/VentoyPlugson/Release/VentoyPlugson.exe:                                            PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
Ventoy/Plugson/vs/VentoyPlugson/x64/Release/VentoyPlugson_X64.exe:                                    PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
Ventoy/SQUASHFS/unsquashfs_32:                                                                        ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 2.6.18, BuildID[sha1]=5fa2bcbb051368534632e48651b9c94d165e3fc6, stripped
Ventoy/SQUASHFS/unsquashfs_64:                                                                        ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=f47ea4abd04c876baa97a11c70638b2c9241df49, stripped
Ventoy/SQUASHFS/unsquashfs_aa64:                                                                      ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, for GNU/Linux 3.7.0, BuildID[sha1]=80a99c6f5078bf1b9f3c891c595000f7029c78cd, stripped
Ventoy/Unix/ventoy_unix/DragonFly/sbin/dmsetup:                                                       ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, for DragonFly 5.0.800, stripped
Ventoy/Unix/ventoy_unix/DragonFly/sbin/init:                                                          ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, for DragonFly 6.0.0, stripped
Ventoy/VBLADE/vblade-master/vblade_32:                                                                ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=ec92688e679ddda4e17f259b39ab2b69fb30a8ec, not stripped
Ventoy/VBLADE/vblade-master/vblade_64:                                                                ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=2144e0cfa04c8d177ab0b205248d0b2bc9661c8b, not stripped
Ventoy/VBLADE/vblade-master/vblade_aa64:                                                              ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, with debug_info, not stripped
Ventoy/Vlnk/vs/VentoyVlnk/Release/VentoyVlnk.exe:                                                     PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
Ventoy/VtoyTool/vtoytool/00/vtoytool_32:                                                              ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, BuildID[sha1]=bcec63a1a3d56a44a3d432665332d237bf4a8197, not stripped
Ventoy/VtoyTool/vtoytool/00/vtoytool_64:                                                              ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=31d8eb60136f024ee1a845cc27fda394438711be, not stripped
Ventoy/VtoyTool/vtoytool/00/vtoytool_aa64:                                                            ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped
Ventoy/VtoyTool/vtoytool/00/vtoytool_m64e:                                                            ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), statically linked, stripped
Ventoy/VtoyTool/vtoytool/01/vtoytool_64:                                                              ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, not stripped
Ventoy/VtoyTool/vtoytool/02/vtoytool_64:                                                              ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, not stripped
Ventoy/ZSTD/zstdcat:                                                                                  ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, BuildID[sha1]=c35922b16c95c17cf28c85d014256fab67aa54ca, stripped
Ventoy/ZSTD/zstdcat64:                                                                                ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=86d8285467856e17f7837cf6a6302ac5c54b1801, stripped
Ventoy/ZSTD/zstdcataa64:                                                                              ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped
Ventoy/cryptsetup/veritysetup32:                                                                      ELF 32-bit LSB pie executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 3.2.0, BuildID[sha1]=cc8595decd2f37155cf641acbae56c114d439d7f, with debug_info, not stripped
Ventoy/cryptsetup/veritysetup64:                                                                      ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.2.0, BuildID[sha1]=c7cfb96e5880b721dc22ca821676d33941d011eb, stripped

Compare that to this:

find . -type f -iname 'build.txt'
Ventoy/BUSYBOX/build.txt
Ventoy/DMSETUP/build.txt
Ventoy/SQUASHFS/build.txt
Ventoy/ZSTD/build.txt

Not only has the number of binary blobs grown from 39 to 153 but there aren't build instructions for even the original 39 blobs, not to mention today's 153.
But even if there was a build.txt for each blob, I daresay nobody is going to manually check 153 individual files once, not to mention regularly and automatically.

@KucharczykL commented on GitHub (Jul 17, 2024): > Until you can point out a binary that has no source/readme next to it there isn't a point in yapping in this thread any more about blobs. If you look at the linked https://github.com/ventoy/Ventoy/issues/132 and rerun the same commands (with added "grep -v script" to remove executable scripts which are not binary blobs) you get this: ```bash find . -type f -print0 | xargs -0 file | grep -v "ASCII" | grep "executable" | grep -v "script" Ventoy/BUSYBOX/chmod/vtchmod32: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, BuildID[sha1]=6064638b7e9c2cd083dd3ab9282f2c93f635c70b, not stripped Ventoy/BUSYBOX/chmod/vtchmod64: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=b6dc6b695c263ea8417515131d184a33f1777987, not stripped Ventoy/BUSYBOX/chmod/vtchmod64_musl: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped Ventoy/BUSYBOX/chmod/vtchmodaa64: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped Ventoy/BUSYBOX/chmod/vtchmodm64e: ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), statically linked, stripped Ventoy/DMSETUP/dmsetup32: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, BuildID[sha1]=6d3f888cec25c6c09092a8968d9244021978ab97, stripped Ventoy/DMSETUP/dmsetup64: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped Ventoy/DMSETUP/dmsetupaa64: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped Ventoy/DMSETUP/dmsetupm64e: ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), statically linked, stripped Ventoy/FUSEISO/vtoy_fuse_iso_32: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped Ventoy/FUSEISO/vtoy_fuse_iso_64: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped Ventoy/FUSEISO/vtoy_fuse_iso_aa64: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped Ventoy/IMG/cpio_arm64/ventoy/busybox/a64: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped Ventoy/IMG/cpio_arm64/ventoy/busybox/vtchmodaa64: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped Ventoy/IMG/cpio_arm64/ventoy/busybox/xzminidecaa64: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped Ventoy/IMG/cpio_arm64/ventoy/tool/lz4cataa64: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped Ventoy/IMG/cpio_arm64/ventoy/tool/zstdcataa64: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped Ventoy/IMG/cpio_mips64/ventoy/busybox/m64: ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), statically linked, stripped Ventoy/IMG/cpio_mips64/ventoy/busybox/vtchmodm64e: ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), statically linked, stripped Ventoy/IMG/cpio_mips64/ventoy/busybox/xzminidecm64e: ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), statically linked, stripped Ventoy/IMG/cpio_mips64/ventoy/tool/lz4catm64e: ELF 64-bit LSB executable, MIPS, MIPS-III version 1 (SYSV), statically linked, stripped Ventoy/IMG/cpio_x86/ventoy/busybox/64h: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped Ventoy/IMG/cpio_x86/ventoy/busybox/ash: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped Ventoy/IMG/cpio_x86/ventoy/busybox/vtchmod32: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, BuildID[sha1]=6064638b7e9c2cd083dd3ab9282f2c93f635c70b, not stripped Ventoy/IMG/cpio_x86/ventoy/busybox/vtchmod64: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=b6dc6b695c263ea8417515131d184a33f1777987, not stripped Ventoy/IMG/cpio_x86/ventoy/busybox/vtchmod64_musl: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped Ventoy/IMG/cpio_x86/ventoy/busybox/xzminidec32: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, BuildID[sha1]=23b67ba67cdb35d22addd9d0c5a544c8c540e15e, stripped Ventoy/IMG/cpio_x86/ventoy/busybox/xzminidec64: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=e7ee6503212fbcbb75c73caa726f8123f1b04282, stripped Ventoy/IMG/cpio_x86/ventoy/busybox/xzminidec64_musl: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped Ventoy/IMG/cpio_x86/ventoy/tool/ar: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped Ventoy/IMG/cpio_x86/ventoy/tool/inotifyd: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped Ventoy/IMG/cpio_x86/ventoy/tool/lz4cat: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped Ventoy/IMG/cpio_x86/ventoy/tool/lz4cat64: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped Ventoy/IMG/cpio_x86/ventoy/tool/zstdcat: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, BuildID[sha1]=c35922b16c95c17cf28c85d014256fab67aa54ca, stripped Ventoy/IMG/cpio_x86/ventoy/tool/zstdcat64: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=86d8285467856e17f7837cf6a6302ac5c54b1801, stripped Ventoy/INSTALL/EFI/BOOT/BOOTAA64.EFI: PE32+ executable (EFI application) Aarch64 (stripped to external PDB), for MS Windows, 4 sections Ventoy/INSTALL/EFI/BOOT/BOOTIA32.EFI: PE32 executable (EFI application) Intel 80386 (stripped to external PDB), for MS Windows, 8 sections Ventoy/INSTALL/EFI/BOOT/BOOTMIPS.EFI: PE32+ executable (EFI application) MIPS R4000 (stripped to external PDB), for MS Windows, 4 sections Ventoy/INSTALL/EFI/BOOT/BOOTX64.EFI: PE32+ executable (EFI application) x86-64 (stripped to external PDB), for MS Windows, 10 sections Ventoy/INSTALL/EFI/BOOT/MokManager.efi: PE32+ executable (EFI application) x86-64 (stripped to external PDB), for MS Windows, 7 sections Ventoy/INSTALL/EFI/BOOT/grub.efi: PE32+ executable (EFI application) x86-64 (stripped to external PDB), for MS Windows, 7 sections Ventoy/INSTALL/EFI/BOOT/grubia32.efi: PE32 executable (EFI application) Intel 80386 (stripped to external PDB), for MS Windows, 7 sections Ventoy/INSTALL/EFI/BOOT/grubia32_real.efi: PE32 executable (EFI application) Intel 80386 (stripped to external PDB), for MS Windows, 4 sections Ventoy/INSTALL/EFI/BOOT/grubx64_real.efi: PE32+ executable (EFI application) x86-64 (stripped to external PDB), for MS Windows, 4 sections Ventoy/INSTALL/EFI/BOOT/mmia32.efi: PE32 executable (EFI application) Intel 80386 (stripped to external PDB), for MS Windows, 6 sections Ventoy/INSTALL/Ventoy2Disk.exe: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections Ventoy/INSTALL/Ventoy2Disk_ARM.exe: PE32 executable (GUI) ARMv7 Thumb, for MS Windows, 6 sections Ventoy/INSTALL/Ventoy2Disk_ARM64.exe: PE32+ executable (GUI) Aarch64, for MS Windows, 6 sections Ventoy/INSTALL/Ventoy2Disk_X64.exe: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections Ventoy/INSTALL/VentoyGUI.aarch64: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, for GNU/Linux 3.7.0, BuildID[sha1]=755ca11d96d5c472021afff32268dd3d75c3c95f, with debug_info, not stripped Ventoy/INSTALL/VentoyGUI.i386: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=981b66653589b35c3f966b1d93eff892d75a0d92, not stripped Ventoy/INSTALL/VentoyGUI.mips64el: ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), dynamically linked, interpreter /lib64/ld.so.1, for GNU/Linux 3.2.0, with debug_info, not stripped Ventoy/INSTALL/VentoyGUI.x86_64: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=79025f55cc0c88ab787a1596389c0e652f7697ea, not stripped Ventoy/INSTALL/tool/aarch64/Plugson: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, for GNU/Linux 3.7.0, BuildID[sha1]=21915a75b711b542f38c0df00c14a8fa1a199e1c, stripped Ventoy/INSTALL/tool/aarch64/V2DServer: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, for GNU/Linux 3.7.0, BuildID[sha1]=9f966188d6690d114d3fe930f7999a1d485d6b8c, stripped Ventoy/INSTALL/tool/aarch64/Ventoy2Disk.gtk3: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, for GNU/Linux 3.7.0, BuildID[sha1]=76bb90bca2cd372655aba81d79c78b2003938359, stripped Ventoy/INSTALL/tool/aarch64/Ventoy2Disk.qt5: ELF 64-bit LSB executable, ARM aarch64, version 1 (GNU/Linux), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, for GNU/Linux 3.7.0, BuildID[sha1]=d387dbb5e1a70f6c7e44d1925e4d069dc53ec379, with debug_info, not stripped Ventoy/INSTALL/tool/aarch64/ash: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped Ventoy/INSTALL/tool/aarch64/hexdump: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped Ventoy/INSTALL/tool/aarch64/mkexfatfs: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, for GNU/Linux 3.7.0, BuildID[sha1]=369804983c3e61db317cafaa846193f1c9d36496, stripped Ventoy/INSTALL/tool/aarch64/mount.exfat-fuse: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, for GNU/Linux 3.7.0, BuildID[sha1]=89c87cfdb74b75aac11ff1c30c7fb6bfd65185b1, stripped Ventoy/INSTALL/tool/aarch64/vlnk: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped Ventoy/INSTALL/tool/aarch64/vtoycli: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped Ventoy/INSTALL/tool/aarch64/xzcat: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped Ventoy/INSTALL/tool/i386/Plugson: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=dde0dccb89cf362e46d6e140e2776face2804691, stripped Ventoy/INSTALL/tool/i386/V2DServer: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=0063887c7d75403133837397bb56b080a557bf20, stripped Ventoy/INSTALL/tool/i386/Ventoy2Disk.gtk2: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=488292276e5880270a4a3d44e55a120e2355bfb7, stripped Ventoy/INSTALL/tool/i386/Ventoy2Disk.gtk3: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=b26dc7c057b35b724138cd60a022adfa9b768b18, stripped Ventoy/INSTALL/tool/i386/Ventoy2Disk.qt5: ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 3.2.0, BuildID[sha1]=1059f8c9d096164d3686144e9cff2d9933a2d28c, not stripped Ventoy/INSTALL/tool/i386/ash: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped Ventoy/INSTALL/tool/i386/hexdump: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped Ventoy/INSTALL/tool/i386/mkexfatfs: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 2.6.18, BuildID[sha1]=453067475dcb3ebfbe9118fd9ab6d0310e920aaf, stripped Ventoy/INSTALL/tool/i386/mount.exfat-fuse: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 2.6.18, BuildID[sha1]=2abc015964733cd9fb96c552fde04bd2777db3f3, stripped Ventoy/INSTALL/tool/i386/vlnk: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, BuildID[sha1]=3f099a86afbaa096d56bea6dd9d56a8981889378, stripped Ventoy/INSTALL/tool/i386/vtoycli: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, BuildID[sha1]=6c6908c9a1f6a0f6b487b4eb3ea1b26191f5b362, stripped Ventoy/INSTALL/tool/i386/xzcat: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped Ventoy/INSTALL/tool/mips64el/Plugson: ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), dynamically linked, interpreter /lib64/ld.so.1, for GNU/Linux 3.2.0, stripped Ventoy/INSTALL/tool/mips64el/V2DServer: ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), dynamically linked, interpreter /lib64/ld.so.1, for GNU/Linux 3.2.0, stripped Ventoy/INSTALL/tool/mips64el/Ventoy2Disk.gtk3: ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), dynamically linked, interpreter /lib64/ld.so.1, for GNU/Linux 3.2.0, stripped Ventoy/INSTALL/tool/mips64el/Ventoy2Disk.qt5: ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), dynamically linked, interpreter /lib64/ld.so.1, for GNU/Linux 3.2.0, with debug_info, not stripped Ventoy/INSTALL/tool/mips64el/ash: ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), statically linked, stripped Ventoy/INSTALL/tool/mips64el/hexdump: ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), statically linked, stripped Ventoy/INSTALL/tool/mips64el/mkexfatfs: ELF 64-bit LSB pie executable, MIPS, MIPS64 rel2 version 1 (SYSV), dynamically linked, interpreter /lib64/ld.so.1, BuildID[sha1]=508fab5369120a3c4707454df5c516ea962c1647, for GNU/Linux 3.2.0, stripped Ventoy/INSTALL/tool/mips64el/mount.exfat-fuse: ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), dynamically linked, interpreter /lib64/ld.so.1, BuildID[sha1]=450dde6154b74dff444503e150a7ac1f85f709c0, for GNU/Linux 3.2.0, stripped Ventoy/INSTALL/tool/mips64el/vlnk: ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), statically linked, stripped Ventoy/INSTALL/tool/mips64el/vtoycli: ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), statically linked, stripped Ventoy/INSTALL/tool/mips64el/xzcat: ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), statically linked, stripped Ventoy/INSTALL/tool/x86_64/Plugson: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=9665da3616f8ad132a625d4004ba674ab6d0ef76, stripped Ventoy/INSTALL/tool/x86_64/V2DServer: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=e2a94f53bbe0274ba2a5285e5bf3e5720c4c00cc, stripped Ventoy/INSTALL/tool/x86_64/Ventoy2Disk.gtk2: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=a77656e9f7fe8fb5ba8978388d99113ed0fd1a20, stripped Ventoy/INSTALL/tool/x86_64/Ventoy2Disk.gtk3: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=d3ab1d1d67b2d41b7d878e7147e30188e9244e5e, stripped Ventoy/INSTALL/tool/x86_64/Ventoy2Disk.qt5: ELF 64-bit LSB executable, x86-64, version 1 (GNU/Linux), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=935364d813327806214b8d2edd194496a7dde69d, not stripped Ventoy/INSTALL/tool/x86_64/ash: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped Ventoy/INSTALL/tool/x86_64/hexdump: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped Ventoy/INSTALL/tool/x86_64/mkexfatfs: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=de003a5ae097b4004e6b77e6cd71d2410df7b310, stripped Ventoy/INSTALL/tool/x86_64/mount.exfat-fuse: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=02eed644b421446629c592b31da15b94d9f5c0de, stripped Ventoy/INSTALL/tool/x86_64/vlnk: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped Ventoy/INSTALL/tool/x86_64/vtoycli: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped Ventoy/INSTALL/tool/x86_64/xzcat: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped Ventoy/INSTALL/ventoy/imdisk/32/imdisk.cpl: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 4 sections Ventoy/INSTALL/ventoy/imdisk/32/imdisk.exe: PE32 executable (console) Intel 80386, for MS Windows, 4 sections Ventoy/INSTALL/ventoy/imdisk/32/imdisk.sys: PE32 executable (native) Intel 80386, for MS Windows, 7 sections Ventoy/INSTALL/ventoy/imdisk/64/imdisk.cpl: PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 5 sections Ventoy/INSTALL/ventoy/imdisk/64/imdisk.exe: PE32+ executable (console) x86-64, for MS Windows, 5 sections Ventoy/INSTALL/ventoy/imdisk/64/imdisk.sys: PE32+ executable (native) x86-64, for MS Windows, 7 sections Ventoy/INSTALL/ventoy/ipxe.krn: Linux kernel x86 boot executable bzImage, version 1.0.0+, RO-rootFS, Ventoy/INSTALL/ventoy/iso9660_aa64.efi: PE32+ executable (EFI boot service driver) Aarch64, for MS Windows, 3 sections Ventoy/INSTALL/ventoy/iso9660_ia32.efi: PE32 executable (EFI boot service driver) Intel 80386, for MS Windows, 3 sections Ventoy/INSTALL/ventoy/iso9660_x64.efi: PE32+ executable (EFI boot service driver) x86-64, for MS Windows, 3 sections Ventoy/INSTALL/ventoy/memdisk: Linux kernel x86 boot executable bzImage, version MEMDISK 6.03 2014-10-06, RW-rootFS, Ventoy/INSTALL/ventoy/udf_aa64.efi: PE32+ executable (EFI boot service driver) Aarch64, for MS Windows, 3 sections Ventoy/INSTALL/ventoy/udf_ia32.efi: PE32 executable (EFI boot service driver) Intel 80386, for MS Windows, 3 sections Ventoy/INSTALL/ventoy/udf_x64.efi: PE32+ executable (EFI boot service driver) x86-64, for MS Windows, 3 sections Ventoy/INSTALL/ventoy/ventoy_aa64.efi: PE32+ executable (EFI application) Aarch64, for MS Windows, 3 sections Ventoy/INSTALL/ventoy/ventoy_ia32.efi: PE32 executable (EFI application) Intel 80386, for MS Windows, 3 sections Ventoy/INSTALL/ventoy/ventoy_x64.efi: PE32+ executable (EFI application) x86-64, for MS Windows, 3 sections Ventoy/INSTALL/ventoy/vtoyjump32.exe: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections Ventoy/INSTALL/ventoy/vtoyjump64.exe: PE32+ executable (GUI) x86-64, for MS Windows, 6 sections Ventoy/INSTALL/ventoy/vtoyutil_aa64.efi: PE32+ executable (EFI application) Aarch64, for MS Windows, 3 sections Ventoy/INSTALL/ventoy/vtoyutil_ia32.efi: PE32 executable (EFI application) Intel 80386, for MS Windows, 3 sections Ventoy/INSTALL/ventoy/vtoyutil_x64.efi: PE32+ executable (EFI application) x86-64, for MS Windows, 3 sections Ventoy/LZIP/lunzip32: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, BuildID[sha1]=2c1b3b97e7aed54fb0b2872412ba9fc32c0d48c8, stripped Ventoy/LZIP/lunzip64: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=0333382234408c1840421dd6a017b4e30acc203e, stripped Ventoy/LZIP/lunzipaa64: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped Ventoy/LZIP/lz4cat64: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped Ventoy/LZIP/lz4cataa64: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped Ventoy/LZIP/lz4catm64e: ELF 64-bit LSB executable, MIPS, MIPS-III version 1 (SYSV), statically linked, stripped Ventoy/LiveCD/GRUB/bootx64.efi: PE32+ executable (EFI application) x86-64 (stripped to external PDB), for MS Windows, 4 sections Ventoy/LiveCD/ISO/EFI/boot/vmlinuz64: Linux kernel x86 boot executable bzImage, version 5.4.3-tinycore64 (tc@box) #2020 SMP Tue Dec 17 17:38:30 UTC 2019, RO-rootFS, swap_dev 0X4, Normal VGA Ventoy/LiveCDGUI/EXT/busybox-x86_64: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped Ventoy/LiveCDGUI/GRUB/bootx64.efi: PE32+ executable (EFI application) x86-64 (stripped to external PDB), for MS Windows, 4 sections Ventoy/Plugson/vs/VentoyPlugson/Release/VentoyPlugson.exe: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections Ventoy/Plugson/vs/VentoyPlugson/x64/Release/VentoyPlugson_X64.exe: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections Ventoy/SQUASHFS/unsquashfs_32: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 2.6.18, BuildID[sha1]=5fa2bcbb051368534632e48651b9c94d165e3fc6, stripped Ventoy/SQUASHFS/unsquashfs_64: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=f47ea4abd04c876baa97a11c70638b2c9241df49, stripped Ventoy/SQUASHFS/unsquashfs_aa64: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, for GNU/Linux 3.7.0, BuildID[sha1]=80a99c6f5078bf1b9f3c891c595000f7029c78cd, stripped Ventoy/Unix/ventoy_unix/DragonFly/sbin/dmsetup: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, for DragonFly 5.0.800, stripped Ventoy/Unix/ventoy_unix/DragonFly/sbin/init: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, for DragonFly 6.0.0, stripped Ventoy/VBLADE/vblade-master/vblade_32: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=ec92688e679ddda4e17f259b39ab2b69fb30a8ec, not stripped Ventoy/VBLADE/vblade-master/vblade_64: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=2144e0cfa04c8d177ab0b205248d0b2bc9661c8b, not stripped Ventoy/VBLADE/vblade-master/vblade_aa64: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, with debug_info, not stripped Ventoy/Vlnk/vs/VentoyVlnk/Release/VentoyVlnk.exe: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections Ventoy/VtoyTool/vtoytool/00/vtoytool_32: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, BuildID[sha1]=bcec63a1a3d56a44a3d432665332d237bf4a8197, not stripped Ventoy/VtoyTool/vtoytool/00/vtoytool_64: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=31d8eb60136f024ee1a845cc27fda394438711be, not stripped Ventoy/VtoyTool/vtoytool/00/vtoytool_aa64: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped Ventoy/VtoyTool/vtoytool/00/vtoytool_m64e: ELF 64-bit LSB executable, MIPS, MIPS64 rel2 version 1 (SYSV), statically linked, stripped Ventoy/VtoyTool/vtoytool/01/vtoytool_64: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, not stripped Ventoy/VtoyTool/vtoytool/02/vtoytool_64: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, not stripped Ventoy/ZSTD/zstdcat: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, BuildID[sha1]=c35922b16c95c17cf28c85d014256fab67aa54ca, stripped Ventoy/ZSTD/zstdcat64: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=86d8285467856e17f7837cf6a6302ac5c54b1801, stripped Ventoy/ZSTD/zstdcataa64: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, stripped Ventoy/cryptsetup/veritysetup32: ELF 32-bit LSB pie executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 3.2.0, BuildID[sha1]=cc8595decd2f37155cf641acbae56c114d439d7f, with debug_info, not stripped Ventoy/cryptsetup/veritysetup64: ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.2.0, BuildID[sha1]=c7cfb96e5880b721dc22ca821676d33941d011eb, stripped ``` Compare that to this: ```bash find . -type f -iname 'build.txt' Ventoy/BUSYBOX/build.txt Ventoy/DMSETUP/build.txt Ventoy/SQUASHFS/build.txt Ventoy/ZSTD/build.txt ``` Not only has the number of binary blobs grown from 39 to 153 but there aren't build instructions for even the original 39 blobs, not to mention today's 153. But even if there was a `build.txt` for each blob, I daresay nobody is going to manually check 153 individual files once, not to mention regularly and automatically.
Author
Owner

@bernardgut commented on GitHub (Jul 20, 2024):

Yeah this is extremely suspicious. I will recommend any IT companies that I work with to avoid Ventoy until this is cleared. There is a reason why RMS was demanding no binaries at any cost 20 years ago and we have seen why with XZ attack. Given the current climate "Just Send me More Money And Trust Me Bro" is not an acceptable answer to the person who raised this very valid issue.

Good luck with your project.

@bernardgut commented on GitHub (Jul 20, 2024): Yeah this is extremely suspicious. I will recommend any IT companies that I work with to avoid Ventoy until this is cleared. There is a reason why RMS was demanding no binaries at any cost 20 years ago and we have seen why with XZ attack. Given the current climate ***"Just Send me More Money And Trust Me Bro"*** is not an acceptable answer to the person who raised this very valid issue. Good luck with your project.
Author
Owner

@xcpn commented on GitHub (Aug 4, 2024):

Looks like I'm moving back to Etcher, even for home use.

It's been a long time since this came up, and devs are absent.

@xcpn commented on GitHub (Aug 4, 2024): Looks like I'm moving back to Etcher, even for home use. It's been a long time since this came up, and devs are absent.
Author
Owner

@TechnologyClassroom commented on GitHub (Aug 4, 2024):

I have been following this issue for some time. There is a lot of negativity here in the comments, but not a lot of people volunteering to work on this issue. Passive aggressive comments on GitHub issues are not helpful, do not help to get what you want, and make you look bad in the process. File the pull request you want to see in the world.

@TechnologyClassroom commented on GitHub (Aug 4, 2024): I have been following this issue for some time. There is a lot of negativity here in the comments, but not a lot of people volunteering to work on this issue. Passive aggressive comments on GitHub issues are not helpful, do not help to get what you want, and make you look bad in the process. File the pull request you want to see in the world.
Author
Owner

@KucharczykL commented on GitHub (Aug 5, 2024):

How are we supposed to file pull requests to replace closed source blobs when we don't even know how are they built?

@KucharczykL commented on GitHub (Aug 5, 2024): How are we supposed to file pull requests to replace closed source blobs when we don't even know how are they built?
Author
Owner

@TechnologyClassroom commented on GitHub (Aug 5, 2024):

How are we supposed to file pull requests to replace closed source blobs when we don't even know how are they built?

Try building one and see if the new binary works as a replacement. If it does, you just updated a dependency. A pull request for building one dependency would be helpful. A list can be found in this above comment and many of those are easy to find.

If the source of one binary cannot be found, create a new issue with a more narrow scope to figure out that piece.

@TechnologyClassroom commented on GitHub (Aug 5, 2024): > How are we supposed to file pull requests to replace closed source blobs when we don't even know how are they built? Try building one and see if the new binary works as a replacement. If it does, you just updated a dependency. A pull request for building one dependency would be helpful. A list can be found in this [above comment](https://github.com/ventoy/Ventoy/issues/2795#issuecomment-2233938098) and many of those are easy to find. If the source of one binary cannot be found, create a new issue with a more narrow scope to figure out that piece.
Author
Owner

@KucharczykL commented on GitHub (Aug 5, 2024):

I think you're failing to understand the scope and nature of the problem, and you're mistakenly putting the onus of providing the necessary information on volunteers whereas it should the author.

Not to mention some of the binaries are things like kernel builds. Good luck trying to guess which options did the author enable.

@KucharczykL commented on GitHub (Aug 5, 2024): I think you're failing to understand the scope and nature of the problem, and you're mistakenly putting the onus of providing the necessary information on volunteers whereas it should the author. Not to mention some of the binaries are things like kernel builds. Good luck trying to guess which options did the author enable.
Author
Owner

@catherinedoyel commented on GitHub (Aug 5, 2024):

How are we supposed to file pull requests to replace closed source blobs when we don't even know how are they built?

In your other post you only searched for build.txt, Some of theme have .sh files nearby as well.
I was going to list them all a few weeks ago but didn't have the time.

I think you're failing to understand the scope and nature of the problem, and you're mistakenly putting the onus of providing the necessary information on volunteers whereas it should the author.

Would you like to give it a try? I work more than full time in computer repair, I know a bit of scripting but C & build systems go over my head.

Given the current climate "Just Send me More Money And Trust Me Bro" is not an acceptable answer to the person who raised this very valid issue.

You are not understanding what I meant by that, they attempted to fund raise, very few took them up on the offer. Therefore the maintainer was not incentivized to put huge amounts of time and effort into the project. They attempted to make it more than a hobbyist project.

Since I have been mostly only working on UEFI computers where I work I don't use Ventoy as much as I used to. I have been using the generous partition count provided by GPT partitioning to have, memory test, live Linux images, WinPE, & Windows installers all on the same flash drive.
The way I do that is that I'd have majority of the drive for the NTFS partition for Windows installer & any programs or drivers I may need to install. Then unallocate 8GB from the end, put on UEFI:NTFS from Rufus onto a 16MB partition since some motherboards do not have or have broken NTFS drivers, use another 16MB for memory test, put on Linux Mint on a 4GB partition, Win10 PE on 3GB partition. This would be a real alternative to saying "I'm just going to use Etcher" since the main draw of Ventoy has always been multiple environments on the same drive.

@catherinedoyel commented on GitHub (Aug 5, 2024): > How are we supposed to file pull requests to replace closed source blobs when we don't even know how are they built? In your other post you only searched for build.txt, Some of theme have .sh files nearby as well. I was going to list them all a few weeks ago but didn't have the time. > I think you're failing to understand the scope and nature of the problem, and you're mistakenly putting the onus of providing the necessary information on volunteers whereas it should the author. Would you like to give it a try? I work more than full time in computer repair, I know a bit of scripting but C & build systems go over my head. > Given the current climate _**"Just Send me More Money And Trust Me Bro"**_ is not an acceptable answer to the person who raised this very valid issue. You are not understanding what I meant by that, they attempted to fund raise, very few took them up on the offer. Therefore the maintainer was not incentivized to put huge amounts of time and effort into the project. They attempted to make it more than a hobbyist project. Since I have been mostly only working on UEFI computers where I work I don't use Ventoy as much as I used to. I have been using the generous partition count provided by GPT partitioning to have, memory test, live Linux images, WinPE, & Windows installers all on the same flash drive. The way I do that is that I'd have majority of the drive for the NTFS partition for Windows installer & any programs or drivers I may need to install. Then unallocate 8GB from the end, put on UEFI:NTFS from Rufus onto a 16MB partition since some motherboards do not have or have broken NTFS drivers, use another 16MB for memory test, put on Linux Mint on a 4GB partition, Win10 PE on 3GB partition. This would be a real alternative to saying "I'm just going to use Etcher" since the main draw of Ventoy has always been multiple environments on the same drive.
Author
Owner

@TechnologyClassroom commented on GitHub (Aug 5, 2024):

I think you're failing to understand the scope and nature of the problem, and you're mistakenly putting the onus of providing the necessary information on volunteers whereas it should the author.

I understand the issue and that is why I was watching the issue for developments. The issue matters. What I found in my inbox was an anti-pattern of people who also think the issue is important passive aggressively demanding free labor without contributing. That behavior is toxic and unhelpful. Help if you want to help. Ask questions if you get stuck. Donate if you can't help with your time.

Edit: Saying you'll donate only if someone does what you want is toxic too. When this issue is closed, there is not a check on whether you followed through. Donate or not, but don't be a jerk to people doing good things on the Internet. I donated $25 today. Here is a link to ways to donate.

@TechnologyClassroom commented on GitHub (Aug 5, 2024): > I think you're failing to understand the scope and nature of the problem, and you're mistakenly putting the onus of providing the necessary information on volunteers whereas it should the author. I understand the issue and that is why I was watching the issue for developments. The issue matters. What I found in my inbox was an anti-pattern of people who also think the issue is important passive aggressively demanding free labor without contributing. That behavior is toxic and unhelpful. Help if you want to help. Ask questions if you get stuck. Donate if you can't help with your time. Edit: Saying you'll donate only if someone does what you want is toxic too. When this issue is closed, there is not a check on whether you followed through. Donate or not, but don't be a jerk to people doing good things on the Internet. I donated $25 today. Here is a link to [ways to donate.](https://www.ventoy.net/en/donation.html)
Author
Owner

@Long0x0 commented on GitHub (Aug 5, 2024):

I took a quick look at the repo and found most (142/153) of the blobs were built by scripts or documented:

BUSYBOX/chmod/vtchmod32:                        1=BUSYBOX/chmod/build.sh
BUSYBOX/chmod/vtchmod64:                        1
BUSYBOX/chmod/vtchmod64_musl:                   1
BUSYBOX/chmod/vtchmodaa64:                      1
BUSYBOX/chmod/vtchmodm64e:                      1
cryptsetup/veritysetup32:                       2=cryptsetup/cryptsetup-build.txt
cryptsetup/veritysetup64:                       2
DMSETUP/dmsetup32:                              3=DMSETUP/build.txt
DMSETUP/dmsetup64:                              3
DMSETUP/dmsetupaa64:                            3
DMSETUP/dmsetupm64e:                            3
FUSEISO/vtoy_fuse_iso_32:                       4=DOC/BuildVentoyFromSource.txt#4.10
FUSEISO/vtoy_fuse_iso_64:                       4
FUSEISO/vtoy_fuse_iso_aa64:                     5=FUSEISO/build_aarch64.sh
IMG/cpio_arm64/ventoy/busybox/vtchmodaa64:      1
IMG/cpio_arm64/ventoy/busybox/xzminidecaa64:    4#4.15
IMG/cpio_arm64/ventoy/tool/lz4cataa64:          4#5.1
IMG/cpio_arm64/ventoy/tool/zstdcataa64:         6=ZSTD/build.txt
IMG/cpio_mips64/ventoy/busybox/vtchmodm64e:     1
IMG/cpio_mips64/ventoy/busybox/xzminidecm64e:   4#4.15
IMG/cpio_mips64/ventoy/tool/lz4catm64e:         4#5.1
IMG/cpio_x86/ventoy/busybox/64h:                4#4.18
IMG/cpio_x86/ventoy/busybox/ash:                4#5.4
IMG/cpio_x86/ventoy/busybox/vtchmod32:          1
IMG/cpio_x86/ventoy/busybox/vtchmod64:          1
IMG/cpio_x86/ventoy/busybox/vtchmod64_musl:     1
IMG/cpio_x86/ventoy/busybox/xzminidec32:        4#4.15
IMG/cpio_x86/ventoy/busybox/xzminidec64:        4#4.15
IMG/cpio_x86/ventoy/busybox/xzminidec64_musl:   4#4.15
IMG/cpio_x86/ventoy/tool/ar:                    4#5.2
IMG/cpio_x86/ventoy/tool/inotifyd:              4#5.3
IMG/cpio_x86/ventoy/tool/lz4cat:                4#5.1
IMG/cpio_x86/ventoy/tool/lz4cat64:              4#5.1
IMG/cpio_x86/ventoy/tool/zstdcat:               6
IMG/cpio_x86/ventoy/tool/zstdcat64:             6
INSTALL/EFI/BOOT/BOOTAA64.EFI:                  15=GRUB2/buildgrub.sh
INSTALL/EFI/BOOT/BOOTIA32.EFI:                  4#5.10
INSTALL/EFI/BOOT/BOOTMIPS.EFI:                  15
INSTALL/EFI/BOOT/BOOTX64.EFI:                   4#5.10
INSTALL/EFI/BOOT/grubia32_real.efi:             15
INSTALL/EFI/BOOT/grubx64_real.efi:              15
INSTALL/EFI/BOOT/MokManager.efi:                4#5.10
INSTALL/tool/aarch64/ash:                       4#5.4
INSTALL/tool/aarch64/hexdump:                   4#5.7
INSTALL/tool/aarch64/mkexfatfs:                 4#4.9
INSTALL/tool/aarch64/mount.exfat-fuse:          4#4.9
INSTALL/tool/aarch64/Plugson:                   7=Plugson/build.sh
INSTALL/tool/aarch64/V2DServer:                 8=LinuxGUI/build.sh
INSTALL/tool/aarch64/Ventoy2Disk.gtk3:          9=LinuxGUI/build_gtk.sh
INSTALL/tool/aarch64/Ventoy2Disk.qt5:           4#4.3
INSTALL/tool/aarch64/vlnk:                      10=Vlnk/build.sh
INSTALL/tool/aarch64/vtoycli:                   4#4.8
INSTALL/tool/aarch64/xzcat:                     4#5.6
INSTALL/tool/i386/ash:                          4#5.4
INSTALL/tool/i386/hexdump:                      4#5.7
INSTALL/tool/i386/mkexfatfs:                    4#4.9
INSTALL/tool/i386/mount.exfat-fuse:             4#4.9
INSTALL/tool/i386/Plugson:                      7
INSTALL/tool/i386/V2DServer:                    8
INSTALL/tool/i386/Ventoy2Disk.gtk2:             9
INSTALL/tool/i386/Ventoy2Disk.gtk3:             9
INSTALL/tool/i386/Ventoy2Disk.qt5:              11=LinuxGUI/build_qt.sh
INSTALL/tool/i386/vlnk:                         10
INSTALL/tool/i386/vtoycli:                      4#4.8
INSTALL/tool/i386/xzcat:                        4#5.6
INSTALL/tool/mips64el/ash:                      4#5.4
INSTALL/tool/mips64el/hexdump:                  4#5.7
INSTALL/tool/mips64el/mkexfatfs:                4#4.9
INSTALL/tool/mips64el/mount.exfat-fuse:         4#4.9
INSTALL/tool/mips64el/Plugson:                  7
INSTALL/tool/mips64el/V2DServer:                8
INSTALL/tool/mips64el/Ventoy2Disk.gtk3:         9
INSTALL/tool/mips64el/Ventoy2Disk.qt5:          11
INSTALL/tool/mips64el/vlnk:                     10
INSTALL/tool/mips64el/vtoycli:                  4#4.8
INSTALL/tool/mips64el/xzcat:                    4#5.6
INSTALL/tool/x86_64/ash:                        4#5.4
INSTALL/tool/x86_64/hexdump:                    4#5.7
INSTALL/tool/x86_64/mkexfatfs:                  4#4.9
INSTALL/tool/x86_64/mount.exfat-fuse:           4#4.9
INSTALL/tool/x86_64/Plugson:                    7
INSTALL/tool/x86_64/V2DServer:                  8
INSTALL/tool/x86_64/Ventoy2Disk.gtk2:           9
INSTALL/tool/x86_64/Ventoy2Disk.gtk3:           9
INSTALL/tool/x86_64/Ventoy2Disk.qt5:            11
INSTALL/tool/x86_64/vlnk:                       10
INSTALL/tool/x86_64/vtoycli:                    4#4.8
INSTALL/tool/x86_64/xzcat:                      4#5.6
INSTALL/ventoy/imdisk/32/imdisk.cpl:            4#5.8
INSTALL/ventoy/imdisk/32/imdisk.exe:            4#5.8
INSTALL/ventoy/imdisk/32/imdisk.sys:            4#5.8
INSTALL/ventoy/imdisk/64/imdisk.cpl:            4#5.8
INSTALL/ventoy/imdisk/64/imdisk.exe:            4#5.8
INSTALL/ventoy/imdisk/64/imdisk.sys:            4#5.8
INSTALL/ventoy/ipxe.krn:                        4#4.2
INSTALL/ventoy/iso9660_aa64.efi:                4#4.17
INSTALL/ventoy/iso9660_ia32.efi:                4#4.17
INSTALL/ventoy/iso9660_x64.efi:                 4#4.17
INSTALL/ventoy/memdisk:                         4#5.9
INSTALL/ventoy/udf_aa64.efi:                    4#4.17
INSTALL/ventoy/udf_ia32.efi:                    4#4.17
INSTALL/ventoy/udf_x64.efi:                     4#4.17
INSTALL/ventoy/ventoy_aa64.efi:                 4#4.6
INSTALL/ventoy/ventoy_ia32.efi:                 4#4.6
INSTALL/ventoy/ventoy_x64.efi:                  4#4.6
INSTALL/ventoy/vtoyjump32.exe:                  4#4.4
INSTALL/ventoy/vtoyjump64.exe:                  4#4.4
INSTALL/ventoy/vtoyutil_aa64.efi:               4#4.6
INSTALL/ventoy/vtoyutil_ia32.efi:               4#4.6
INSTALL/ventoy/vtoyutil_x64.efi:                4#4.6
INSTALL/Ventoy2Disk.exe:                        4#4.3
INSTALL/Ventoy2Disk_ARM.exe:                    4#4.3
INSTALL/Ventoy2Disk_ARM64.exe:                  4#4.3
INSTALL/Ventoy2Disk_X64.exe:                    4#4.3
INSTALL/VentoyGUI.aarch64:                      9
INSTALL/VentoyGUI.i386:                         9
INSTALL/VentoyGUI.mips64el:                     9
INSTALL/VentoyGUI.x86_64:                       9
LiveCD/ISO/EFI/boot/vmlinuz64:                  12=LiveCD/livecd.sh
LiveCDGUI/EXT/busybox-x86_64:                   13=LiveCDGUI/EXT/README.txt
LZIP/lunzip32:                                  4#5.1
LZIP/lunzip64:                                  4#5.1
LZIP/lunzipaa64:                                4#5.1
LZIP/lz4cat64:                                  4#5.1
LZIP/lz4cataa64:                                4#5.1
LZIP/lz4catm64e:                                4#5.1
Plugson/vs/VentoyPlugson/Release/VentoyPlugson.exe:                 7
Plugson/vs/VentoyPlugson/x64/Release/VentoyPlugson_X64.exe:         7
SQUASHFS/unsquashfs_32:                         4#4.11
SQUASHFS/unsquashfs_64:                         4#4.11
SQUASHFS/unsquashfs_aa64:                       4#4.11
VBLADE/vblade-master/vblade_32:                 4#4.12
VBLADE/vblade-master/vblade_64:                 4#4.12
VBLADE/vblade-master/vblade_aa64:               4#4.12
Vlnk/vs/VentoyVlnk/Release/VentoyVlnk.exe:      14=Vlnk/pack.sh
VtoyTool/vtoytool/00/vtoytool_32:               4#4.7
VtoyTool/vtoytool/00/vtoytool_64:               4#4.7
VtoyTool/vtoytool/00/vtoytool_aa64:             4#4.7
VtoyTool/vtoytool/00/vtoytool_m64e:             4#4.7
ZSTD/zstdcat:                                   6
ZSTD/zstdcat64:                                 6
ZSTD/zstdcataa64:                               6

and these ones were not (11/153):

IMG/cpio_arm64/ventoy/busybox/a64
IMG/cpio_mips64/ventoy/busybox/m64
INSTALL/EFI/BOOT/grub.efi
INSTALL/EFI/BOOT/grubia32.efi
INSTALL/EFI/BOOT/mmia32.efi
LiveCD/GRUB/bootx64.efi
LiveCDGUI/GRUB/bootx64.efi
Unix/ventoy_unix/DragonFly/sbin/dmsetup
Unix/ventoy_unix/DragonFly/sbin/init
VtoyTool/vtoytool/01/vtoytool_64
VtoyTool/vtoytool/02/vtoytool_64
@Long0x0 commented on GitHub (Aug 5, 2024): I took a quick look at the repo and found most (142/153) of the blobs were built by scripts or documented: ``` BUSYBOX/chmod/vtchmod32: 1=BUSYBOX/chmod/build.sh BUSYBOX/chmod/vtchmod64: 1 BUSYBOX/chmod/vtchmod64_musl: 1 BUSYBOX/chmod/vtchmodaa64: 1 BUSYBOX/chmod/vtchmodm64e: 1 cryptsetup/veritysetup32: 2=cryptsetup/cryptsetup-build.txt cryptsetup/veritysetup64: 2 DMSETUP/dmsetup32: 3=DMSETUP/build.txt DMSETUP/dmsetup64: 3 DMSETUP/dmsetupaa64: 3 DMSETUP/dmsetupm64e: 3 FUSEISO/vtoy_fuse_iso_32: 4=DOC/BuildVentoyFromSource.txt#4.10 FUSEISO/vtoy_fuse_iso_64: 4 FUSEISO/vtoy_fuse_iso_aa64: 5=FUSEISO/build_aarch64.sh IMG/cpio_arm64/ventoy/busybox/vtchmodaa64: 1 IMG/cpio_arm64/ventoy/busybox/xzminidecaa64: 4#4.15 IMG/cpio_arm64/ventoy/tool/lz4cataa64: 4#5.1 IMG/cpio_arm64/ventoy/tool/zstdcataa64: 6=ZSTD/build.txt IMG/cpio_mips64/ventoy/busybox/vtchmodm64e: 1 IMG/cpio_mips64/ventoy/busybox/xzminidecm64e: 4#4.15 IMG/cpio_mips64/ventoy/tool/lz4catm64e: 4#5.1 IMG/cpio_x86/ventoy/busybox/64h: 4#4.18 IMG/cpio_x86/ventoy/busybox/ash: 4#5.4 IMG/cpio_x86/ventoy/busybox/vtchmod32: 1 IMG/cpio_x86/ventoy/busybox/vtchmod64: 1 IMG/cpio_x86/ventoy/busybox/vtchmod64_musl: 1 IMG/cpio_x86/ventoy/busybox/xzminidec32: 4#4.15 IMG/cpio_x86/ventoy/busybox/xzminidec64: 4#4.15 IMG/cpio_x86/ventoy/busybox/xzminidec64_musl: 4#4.15 IMG/cpio_x86/ventoy/tool/ar: 4#5.2 IMG/cpio_x86/ventoy/tool/inotifyd: 4#5.3 IMG/cpio_x86/ventoy/tool/lz4cat: 4#5.1 IMG/cpio_x86/ventoy/tool/lz4cat64: 4#5.1 IMG/cpio_x86/ventoy/tool/zstdcat: 6 IMG/cpio_x86/ventoy/tool/zstdcat64: 6 INSTALL/EFI/BOOT/BOOTAA64.EFI: 15=GRUB2/buildgrub.sh INSTALL/EFI/BOOT/BOOTIA32.EFI: 4#5.10 INSTALL/EFI/BOOT/BOOTMIPS.EFI: 15 INSTALL/EFI/BOOT/BOOTX64.EFI: 4#5.10 INSTALL/EFI/BOOT/grubia32_real.efi: 15 INSTALL/EFI/BOOT/grubx64_real.efi: 15 INSTALL/EFI/BOOT/MokManager.efi: 4#5.10 INSTALL/tool/aarch64/ash: 4#5.4 INSTALL/tool/aarch64/hexdump: 4#5.7 INSTALL/tool/aarch64/mkexfatfs: 4#4.9 INSTALL/tool/aarch64/mount.exfat-fuse: 4#4.9 INSTALL/tool/aarch64/Plugson: 7=Plugson/build.sh INSTALL/tool/aarch64/V2DServer: 8=LinuxGUI/build.sh INSTALL/tool/aarch64/Ventoy2Disk.gtk3: 9=LinuxGUI/build_gtk.sh INSTALL/tool/aarch64/Ventoy2Disk.qt5: 4#4.3 INSTALL/tool/aarch64/vlnk: 10=Vlnk/build.sh INSTALL/tool/aarch64/vtoycli: 4#4.8 INSTALL/tool/aarch64/xzcat: 4#5.6 INSTALL/tool/i386/ash: 4#5.4 INSTALL/tool/i386/hexdump: 4#5.7 INSTALL/tool/i386/mkexfatfs: 4#4.9 INSTALL/tool/i386/mount.exfat-fuse: 4#4.9 INSTALL/tool/i386/Plugson: 7 INSTALL/tool/i386/V2DServer: 8 INSTALL/tool/i386/Ventoy2Disk.gtk2: 9 INSTALL/tool/i386/Ventoy2Disk.gtk3: 9 INSTALL/tool/i386/Ventoy2Disk.qt5: 11=LinuxGUI/build_qt.sh INSTALL/tool/i386/vlnk: 10 INSTALL/tool/i386/vtoycli: 4#4.8 INSTALL/tool/i386/xzcat: 4#5.6 INSTALL/tool/mips64el/ash: 4#5.4 INSTALL/tool/mips64el/hexdump: 4#5.7 INSTALL/tool/mips64el/mkexfatfs: 4#4.9 INSTALL/tool/mips64el/mount.exfat-fuse: 4#4.9 INSTALL/tool/mips64el/Plugson: 7 INSTALL/tool/mips64el/V2DServer: 8 INSTALL/tool/mips64el/Ventoy2Disk.gtk3: 9 INSTALL/tool/mips64el/Ventoy2Disk.qt5: 11 INSTALL/tool/mips64el/vlnk: 10 INSTALL/tool/mips64el/vtoycli: 4#4.8 INSTALL/tool/mips64el/xzcat: 4#5.6 INSTALL/tool/x86_64/ash: 4#5.4 INSTALL/tool/x86_64/hexdump: 4#5.7 INSTALL/tool/x86_64/mkexfatfs: 4#4.9 INSTALL/tool/x86_64/mount.exfat-fuse: 4#4.9 INSTALL/tool/x86_64/Plugson: 7 INSTALL/tool/x86_64/V2DServer: 8 INSTALL/tool/x86_64/Ventoy2Disk.gtk2: 9 INSTALL/tool/x86_64/Ventoy2Disk.gtk3: 9 INSTALL/tool/x86_64/Ventoy2Disk.qt5: 11 INSTALL/tool/x86_64/vlnk: 10 INSTALL/tool/x86_64/vtoycli: 4#4.8 INSTALL/tool/x86_64/xzcat: 4#5.6 INSTALL/ventoy/imdisk/32/imdisk.cpl: 4#5.8 INSTALL/ventoy/imdisk/32/imdisk.exe: 4#5.8 INSTALL/ventoy/imdisk/32/imdisk.sys: 4#5.8 INSTALL/ventoy/imdisk/64/imdisk.cpl: 4#5.8 INSTALL/ventoy/imdisk/64/imdisk.exe: 4#5.8 INSTALL/ventoy/imdisk/64/imdisk.sys: 4#5.8 INSTALL/ventoy/ipxe.krn: 4#4.2 INSTALL/ventoy/iso9660_aa64.efi: 4#4.17 INSTALL/ventoy/iso9660_ia32.efi: 4#4.17 INSTALL/ventoy/iso9660_x64.efi: 4#4.17 INSTALL/ventoy/memdisk: 4#5.9 INSTALL/ventoy/udf_aa64.efi: 4#4.17 INSTALL/ventoy/udf_ia32.efi: 4#4.17 INSTALL/ventoy/udf_x64.efi: 4#4.17 INSTALL/ventoy/ventoy_aa64.efi: 4#4.6 INSTALL/ventoy/ventoy_ia32.efi: 4#4.6 INSTALL/ventoy/ventoy_x64.efi: 4#4.6 INSTALL/ventoy/vtoyjump32.exe: 4#4.4 INSTALL/ventoy/vtoyjump64.exe: 4#4.4 INSTALL/ventoy/vtoyutil_aa64.efi: 4#4.6 INSTALL/ventoy/vtoyutil_ia32.efi: 4#4.6 INSTALL/ventoy/vtoyutil_x64.efi: 4#4.6 INSTALL/Ventoy2Disk.exe: 4#4.3 INSTALL/Ventoy2Disk_ARM.exe: 4#4.3 INSTALL/Ventoy2Disk_ARM64.exe: 4#4.3 INSTALL/Ventoy2Disk_X64.exe: 4#4.3 INSTALL/VentoyGUI.aarch64: 9 INSTALL/VentoyGUI.i386: 9 INSTALL/VentoyGUI.mips64el: 9 INSTALL/VentoyGUI.x86_64: 9 LiveCD/ISO/EFI/boot/vmlinuz64: 12=LiveCD/livecd.sh LiveCDGUI/EXT/busybox-x86_64: 13=LiveCDGUI/EXT/README.txt LZIP/lunzip32: 4#5.1 LZIP/lunzip64: 4#5.1 LZIP/lunzipaa64: 4#5.1 LZIP/lz4cat64: 4#5.1 LZIP/lz4cataa64: 4#5.1 LZIP/lz4catm64e: 4#5.1 Plugson/vs/VentoyPlugson/Release/VentoyPlugson.exe: 7 Plugson/vs/VentoyPlugson/x64/Release/VentoyPlugson_X64.exe: 7 SQUASHFS/unsquashfs_32: 4#4.11 SQUASHFS/unsquashfs_64: 4#4.11 SQUASHFS/unsquashfs_aa64: 4#4.11 VBLADE/vblade-master/vblade_32: 4#4.12 VBLADE/vblade-master/vblade_64: 4#4.12 VBLADE/vblade-master/vblade_aa64: 4#4.12 Vlnk/vs/VentoyVlnk/Release/VentoyVlnk.exe: 14=Vlnk/pack.sh VtoyTool/vtoytool/00/vtoytool_32: 4#4.7 VtoyTool/vtoytool/00/vtoytool_64: 4#4.7 VtoyTool/vtoytool/00/vtoytool_aa64: 4#4.7 VtoyTool/vtoytool/00/vtoytool_m64e: 4#4.7 ZSTD/zstdcat: 6 ZSTD/zstdcat64: 6 ZSTD/zstdcataa64: 6 ``` and these ones were not (11/153): ``` IMG/cpio_arm64/ventoy/busybox/a64 IMG/cpio_mips64/ventoy/busybox/m64 INSTALL/EFI/BOOT/grub.efi INSTALL/EFI/BOOT/grubia32.efi INSTALL/EFI/BOOT/mmia32.efi LiveCD/GRUB/bootx64.efi LiveCDGUI/GRUB/bootx64.efi Unix/ventoy_unix/DragonFly/sbin/dmsetup Unix/ventoy_unix/DragonFly/sbin/init VtoyTool/vtoytool/01/vtoytool_64 VtoyTool/vtoytool/02/vtoytool_64 ```
Author
Owner

@Thrilleratplay commented on GitHub (Aug 5, 2024):

I think you're failing to understand the scope and nature of the problem, and you're mistakenly putting the onus of providing the necessary information on volunteers whereas it should the author.

Not to mention some of the binaries are things like kernel builds. Good luck trying to guess which options did the author enable.

You are not understanding. You are demanding the author fix a problem you have while giving nothing but hostility. Step back and think how could you help. This is an issue that took time to create and will take time to remediate.

  • As Long0x0 pointed out, you have most of the source, for everything else, it is a black box. Have you tried to compile what exists?
  • The long list of precompiled binaries are likely done as to save time. Have you tried to compile these yourself? Have you looked into using github actions to cache the build processes so everything it built from source only when a change is made?
  • Precompiled binaries may be uses because the author has not been able to create reproducible builds of the binaries. Have you looked into what may be preventing reproducible builds?
  • Given the list of outstanding binaries, many of them look like they can be tracked back to their original Linux and FreeBSD projects. Have you looked into what the source of them could be?

As for build flags, does it matter? If you can come close to recreating them, it would take far less time for the author to hand them over than listen to people whine about how they gave the world Ventoy but it isn't enough. If you do not like it, go else where. Fork the project to remove the binary fines. Shut up or standup and help.

@Thrilleratplay commented on GitHub (Aug 5, 2024): > I think you're failing to understand the scope and nature of the problem, and you're mistakenly putting the onus of providing the necessary information on volunteers whereas it should the author. > > Not to mention some of the binaries are things like kernel builds. Good luck trying to guess which options did the author enable. You are not understanding. You are demanding the author fix a problem you have while giving nothing but hostility. Step back and think how could you help. This is an issue that took time to create and will take time to remediate. * As Long0x0 pointed out, you have most of the source, for everything else, it is a black box. Have you tried to compile what exists? * The long list of precompiled binaries are likely done as to save time. Have you tried to compile these yourself? Have you looked into using github actions to cache the build processes so everything it built from source only when a change is made? * Precompiled binaries may be uses because the author has not been able to create [reproducible builds](https://reproducible-builds.org) of the binaries. Have you looked into what may be preventing reproducible builds? * Given the list of outstanding binaries, many of them look like they can be tracked back to their original Linux and FreeBSD projects. Have you looked into what the source of them could be? As for build flags, does it matter? If you can come close to recreating them, it would take far less time for the author to hand them over than listen to people whine about how they gave the world Ventoy but it isn't enough. If you do not like it, go else where. Fork the project to remove the binary fines. Shut up or standup and help.
Author
Owner

@KucharczykL commented on GitHub (Aug 5, 2024):

I am just a user of Ventoy who agrees that the binary blobs are making the project look less trustworthy. The author can take that criticism as they see fit. I don't demand anyone does anything so you're shouting at imaginary people.

@KucharczykL commented on GitHub (Aug 5, 2024): I am just a user of Ventoy who agrees that the binary blobs are making the project look less trustworthy. The author can take that criticism as they see fit. I don't demand anyone does anything so you're shouting at imaginary people.
Author
Owner

@Thrilleratplay commented on GitHub (Aug 5, 2024):

@Long0x0 How did you decide what was built a script or not? Of the list and these ones were not (11/153):

IMG/mkcpio.sh

  • IMG/cpio_arm64/ventoy/busybox/a64
  • IMG/cpio_mips64/ventoy/busybox/m64

VtoyTool/build.sh

  • VtoyTool/vtoytool/01/vtoytool_64
  • VtoyTool/vtoytool/02/vtoytool_64

The DragonFlyBSD repo seems to provide the source for two more:

  • Unix/ventoy_unix/DragonFly/sbin/dmsetup - here( maybe)
  • Unix/ventoy_unix/DragonFly/sbin/init - here

The remaining are UEFI bootloaders that may come from GRUB but I have not verified this

  • INSTALL/EFI/BOOT/grub.efi
  • INSTALL/EFI/BOOT/grubia32.efi
  • INSTALL/EFI/BOOT/mmia32.efi
  • LiveCD/GRUB/bootx64.efi
  • LiveCDGUI/GRUB/bootx64.efi
@Thrilleratplay commented on GitHub (Aug 5, 2024): @Long0x0 How did you decide what was built a script or not? Of the list `and these ones were not (11/153):` [IMG/mkcpio.sh](https://raw.githubusercontent.com/ventoy/Ventoy/master/IMG/mkcpio.sh) * `IMG/cpio_arm64/ventoy/busybox/a64` * `IMG/cpio_mips64/ventoy/busybox/m64` [VtoyTool/build.sh](https://github.com/ventoy/Ventoy/blob/master/VtoyTool/build.sh) * `VtoyTool/vtoytool/01/vtoytool_64` * `VtoyTool/vtoytool/02/vtoytool_64` The DragonFlyBSD repo seems to provide the source for two more: * `Unix/ventoy_unix/DragonFly/sbin/dmsetup` - [here( maybe)](https://github.com/DragonFlyBSD/DragonFlyBSD/blob/master/sys/contrib/dev/acpica/generate/unix/iasl/Makefile) * `Unix/ventoy_unix/DragonFly/sbin/init` - [here](https://github.com/DragonFlyBSD/DragonFlyBSD/blob/8506772f4f44fcae9c78e61800e54be0399905f8/sbin/init/Makefile) The remaining are UEFI bootloaders that may come from [GRUB](https://www.gnu.org/software/grub/) but I have not verified this * `INSTALL/EFI/BOOT/grub.efi` * `INSTALL/EFI/BOOT/grubia32.efi` * `INSTALL/EFI/BOOT/mmia32.efi` * `LiveCD/GRUB/bootx64.efi` * `LiveCDGUI/GRUB/bootx64.efi`
Author
Owner

@nroach44 commented on GitHub (Aug 5, 2024):

I think you're failing to understand the scope and nature of the problem, and you're mistakenly putting the onus of providing the necessary information on volunteers whereas it should the author.
Not to mention some of the binaries are things like kernel builds. Good luck trying to guess which options did the author enable.

You are not understanding. You are demanding the author fix a problem you have while giving nothing but hostility. Step back and think how could you help. This is an issue that took time to create and will take time to remediate.

At the very least GRUB (in LiveCDGUI/GRUB/bootx64.efi, which definitely appears to be at least partially sourceless) is GPL3.

github.com/rhboot/grub2@6cac608cbe/COPYING (L34)

For example, if you distribute copies of such a program, whether gratis or for a fee, you must pass on to the recipients the same freedoms that you received. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights.

There is no onus on other people or the upstream developers to provide sources for someone else's distribution.

The perceived hostility is likely a result of being ignored. This exact situation plays out time and time again when GPL requests / reminders are ignored.

If they actually engaged in good faith, we could work towards a resolution.

@nroach44 commented on GitHub (Aug 5, 2024): > > I think you're failing to understand the scope and nature of the problem, and you're mistakenly putting the onus of providing the necessary information on volunteers whereas it should the author. > > Not to mention some of the binaries are things like kernel builds. Good luck trying to guess which options did the author enable. > > You are not understanding. You are demanding the author fix a problem you have while giving nothing but hostility. Step back and think how could you help. This is an issue that took time to create and will take time to remediate. At the very least GRUB (in `LiveCDGUI/GRUB/bootx64.efi`, which definitely appears to be at least partially sourceless) is GPL3. https://github.com/rhboot/grub2/blob/6cac608cbe05b95ec2903897ad19dbd0499ab60d/COPYING#L34 > For example, if you distribute copies of such a program, whether gratis or for a fee, you must pass on to the recipients the same freedoms that you received. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. There is no onus on other people or the upstream developers to provide sources for someone else's distribution. The perceived hostility is likely a result of being ignored. This exact situation plays out time and time again when GPL requests / reminders are ignored. If they actually engaged in good faith, we could work towards a resolution.
Author
Owner

@Foxboron commented on GitHub (Aug 6, 2024):

The remaining are UEFI bootloaders that may come from GRUB but I have not verified this

It's fairly trivial to confirm this.

github.com/ventoy/Ventoy@b11a499939

Because ventoy supports shim, and by extension secure boot, these files needs to come from a signed Linux distro. In this case they are taken from Fedora releases, and OpenSUSE apparently, as they publish shim binaries and grub binaries signed by their certificate.

λ Downloads » objdump -h ./grub.efi

./grub.efi:     file format pei-x86-64

Sections:
Idx Name          Size      VMA               LMA               File off  Algn
  0 .text         00007c60  0000000000004000  0000000000004000  00000400  2**4
                  CONTENTS, ALLOC, LOAD, READONLY, CODE
  1 .reloc        0000000a  000000000000c000  000000000000c000  00008200  2**2
                  CONTENTS, ALLOC, LOAD, READONLY, DATA
  2 .data         000028b8  000000000000d000  000000000000d000  00008400  2**4
                  CONTENTS, ALLOC, LOAD, DATA
  3 .dynamic      00000100  0000000000010000  0000000000010000  0000ae00  2**2
                  CONTENTS, ALLOC, LOAD, DATA
  4 .rela         000011d0  0000000000011000  0000000000011000  0000b000  2**2
                  CONTENTS, ALLOC, LOAD, READONLY, DATA
  5 .dynsym       000005b8  0000000000013000  0000000000013000  0000c200  2**2
                  CONTENTS, ALLOC, LOAD, READONLY, DATA
  6 .sbat         0000004c  0000000000989680  0000000000989680  0000c800  2**2
                  CONTENTS, ALLOC, LOAD, READONLY, DATA
λ Downloads » objcopy --dump-section .sbat=/dev/stdout ./grub.efi
sbat,1,SBAT Version,sbat,1,https://github.com/rhboot/shim/blob/main/SBAT.md

For instance, INSTALL/BOOT/BOOTX64.EFI is taken from OpenSUSE.

λ Downloads » sbverify --list ./BOOTX64.EFI
warning: data remaining[827296 vs 953800]: gaps between PE/COFF sections?
signature 1
image signature issuers:
 - /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft Corporation UEFI CA 2011
image signature certificates:
 - subject: /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft Windows UEFI Driver Publisher
   issuer:  /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft Corporation UEFI CA 2011
 - subject: /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft Corporation UEFI CA 2011
   issuer:  /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft Corporation Third Party Marketplace Root
signature 2
image signature issuers:
 - /CN=SUSE Linux Enterprise Secure Boot CA/C=DE/L=Nuremberg/O=SUSE Linux Products GmbH/OU=Build Team/emailAddress=build@suse.de
image signature certificates:
 - subject: /CN=SUSE Linux Enterprise Secure Boot Signkey/C=DE/L=Nuremberg/O=SUSE Linux Products GmbH/OU=Build Team/emailAddress=build@suse.de
   issuer:  /CN=SUSE Linux Enterprise Secure Boot CA/C=DE/L=Nuremberg/O=SUSE Linux Products GmbH/OU=Build Team/emailAddress=build@suse.de

The LiveCD binaries are just small grub binaries with an embedded config to load an grub.cfg. This is validated by just running strings and see the embbed config.

λ Downloads » strings ./bootx64.efi
[SNIP]
search -f /EFI/VentoyLiveCD -s root
configfile ($root)/EFI/boot/grub.cfg
/EFI/boot

Which means they are just trying to load the given grub.cfg found in a parent directory.

It would probably be good to document the origin of the binaries, but you can't remove the bootloader binaries without ruining the Secure Boot support Ventoy relies on as they probably won't get their own bootloaders signed.

@Foxboron commented on GitHub (Aug 6, 2024): > The remaining are UEFI bootloaders that may come from [GRUB](https://www.gnu.org/software/grub/) but I have not verified this It's fairly trivial to confirm this. > https://github.com/ventoy/Ventoy/commit/b11a4999395253331bb3e128f53fdd7f3de79be7 Because ventoy supports shim, and by extension secure boot, these files needs to come from a signed Linux distro. In this case they are taken from Fedora releases, and OpenSUSE apparently, as they publish shim binaries and grub binaries signed by their certificate. ```bash λ Downloads » objdump -h ./grub.efi ./grub.efi: file format pei-x86-64 Sections: Idx Name Size VMA LMA File off Algn 0 .text 00007c60 0000000000004000 0000000000004000 00000400 2**4 CONTENTS, ALLOC, LOAD, READONLY, CODE 1 .reloc 0000000a 000000000000c000 000000000000c000 00008200 2**2 CONTENTS, ALLOC, LOAD, READONLY, DATA 2 .data 000028b8 000000000000d000 000000000000d000 00008400 2**4 CONTENTS, ALLOC, LOAD, DATA 3 .dynamic 00000100 0000000000010000 0000000000010000 0000ae00 2**2 CONTENTS, ALLOC, LOAD, DATA 4 .rela 000011d0 0000000000011000 0000000000011000 0000b000 2**2 CONTENTS, ALLOC, LOAD, READONLY, DATA 5 .dynsym 000005b8 0000000000013000 0000000000013000 0000c200 2**2 CONTENTS, ALLOC, LOAD, READONLY, DATA 6 .sbat 0000004c 0000000000989680 0000000000989680 0000c800 2**2 CONTENTS, ALLOC, LOAD, READONLY, DATA λ Downloads » objcopy --dump-section .sbat=/dev/stdout ./grub.efi sbat,1,SBAT Version,sbat,1,https://github.com/rhboot/shim/blob/main/SBAT.md ``` For instance, `INSTALL/BOOT/BOOTX64.EFI` is taken from OpenSUSE. ``` λ Downloads » sbverify --list ./BOOTX64.EFI warning: data remaining[827296 vs 953800]: gaps between PE/COFF sections? signature 1 image signature issuers: - /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft Corporation UEFI CA 2011 image signature certificates: - subject: /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft Windows UEFI Driver Publisher issuer: /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft Corporation UEFI CA 2011 - subject: /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft Corporation UEFI CA 2011 issuer: /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft Corporation Third Party Marketplace Root signature 2 image signature issuers: - /CN=SUSE Linux Enterprise Secure Boot CA/C=DE/L=Nuremberg/O=SUSE Linux Products GmbH/OU=Build Team/emailAddress=build@suse.de image signature certificates: - subject: /CN=SUSE Linux Enterprise Secure Boot Signkey/C=DE/L=Nuremberg/O=SUSE Linux Products GmbH/OU=Build Team/emailAddress=build@suse.de issuer: /CN=SUSE Linux Enterprise Secure Boot CA/C=DE/L=Nuremberg/O=SUSE Linux Products GmbH/OU=Build Team/emailAddress=build@suse.de ``` The `LiveCD` binaries are just small grub binaries with an embedded config to load an grub.cfg. This is validated by just running `strings` and see the embbed config. ``` λ Downloads » strings ./bootx64.efi [SNIP] search -f /EFI/VentoyLiveCD -s root configfile ($root)/EFI/boot/grub.cfg /EFI/boot ``` Which means they are just trying to load the given `grub.cfg` found in a parent directory. It would probably be good to document the origin of the binaries, but you can't remove the bootloader binaries without ruining the Secure Boot support Ventoy relies on as they probably won't get their own bootloaders signed.
Author
Owner

@antiufo commented on GitHub (Aug 6, 2024):

Even just adding a bash script that wgets the prebuilt binaries from reasonably trusted sources (Debian, Microsoft...) would do a lot to improve confidence in this project.

@antiufo commented on GitHub (Aug 6, 2024): Even just adding a bash script that `wget`s the prebuilt binaries from reasonably trusted sources (Debian, Microsoft...) would do a lot to improve confidence in this project.
Author
Owner

@nehemiagurl commented on GitHub (Aug 6, 2024):

@ventoy I know FOSS maintenance is hard and thankless work without much funding. and I'm sure this thread has caused you a big headache.
I love ventoy and I wouldn't want you to burn out. I'd love to give money to support this project.

but I have to first know I can trust you.
I promise that as soon as this gets satisfyingly fixed and the worries come down, I'm becoming a regular financial contributor. and I'm sure many in the thread will dot the same.
but please. you have to demonstrate we can trust this project.

@nehemiagurl commented on GitHub (Aug 6, 2024): @ventoy I know FOSS maintenance is hard and thankless work without much funding. and I'm sure this thread has caused you a big headache. I love ventoy and I wouldn't want you to burn out. I'd love to give money to support this project. but I have to first know I can trust you. I promise that as soon as this gets satisfyingly fixed and the worries come down, I'm becoming a regular financial contributor. and I'm sure many in the thread will dot the same. but please. you have to demonstrate we can trust this project.
Author
Owner

@sneurlax commented on GitHub (Aug 6, 2024):

@ventoy I know FOSS maintenance is hard and thankless work without much funding. and I'm sure this thread has caused you a big headache. I love ventoy and I wouldn't want you to burn out. I'd love to give money to support this project.

but I have to first know I can trust you. I promise that as soon as this gets satisfyingly fixed and the worries come down, I'm becoming a regular financial contributor. and I'm sure many in the thread will dot the same. but please. you have to demonstrate we can trust this project.

but software takes work, therefore it's not

as soon as this gets satisfyingly fixed and the worries come down, I'm becoming a regular financial contributor.

it's

as soon as I become a regular financial contributor, this gets satisfyingly fixed and the worries come down.

as other commenters have pointed out, the author provided a way to fund this project and it failed to be funded, so these promises are empty.

if you're here complaining, make a PR instead

@sneurlax commented on GitHub (Aug 6, 2024): > @ventoy I know FOSS maintenance is hard and thankless work without much funding. and I'm sure this thread has caused you a big headache. I love ventoy and I wouldn't want you to burn out. I'd love to give money to support this project. > > but I have to first know I can trust you. I promise that as soon as this gets satisfyingly fixed and the worries come down, I'm becoming a regular financial contributor. and I'm sure many in the thread will dot the same. but please. you have to demonstrate we can trust this project. but software takes work, therefore it's not > as soon as this gets satisfyingly fixed and the worries come down, I'm becoming a regular financial contributor. it's > as soon as I become a regular financial contributor, this gets satisfyingly fixed and the worries come down. as other commenters have pointed out, the author provided a way to fund this project and it failed to be funded, so these promises are empty. if you're here complaining, make a PR instead
Author
Owner

@nehemiagurl commented on GitHub (Aug 6, 2024):

if you're here complaining, make a PR instead

not a developer, I don't know how to code. I offered what I can give, which is my money, but glad to know that for you the only assistance that counts for you is the one I can't give. I think the maintainer will be glad to know that despite your advice that I give nothing, I will continue with my plan to contribute cash once I can be relatively assured I'm not giving money to Jia Tan.

@nehemiagurl commented on GitHub (Aug 6, 2024): > if you're here complaining, make a PR instead not a developer, I don't know how to code. I offered what I can give, which is my money, but glad to know that for you the only assistance that counts for you is the one I can't give. I think the maintainer will be glad to know that despite your advice that I give nothing, I will continue with my plan to contribute cash once I can be relatively assured I'm not giving money to Jia Tan.
Author
Owner

@TomaszGasior commented on GitHub (Aug 6, 2024):

Stop that discussion. People here are subscribed to get to know about what is happening to fix the issue. Your personal opinions about money and making PRs and FOSS contributions — all of it doesn't matter.

If your don't have anything useful for fixing the issue to add here — don't write comments. Thank you.

@TomaszGasior commented on GitHub (Aug 6, 2024): Stop that discussion. People here are subscribed to get to know about what is happening to fix the issue. Your personal opinions about money and making PRs and FOSS contributions — all of it doesn't matter. If your don't have anything useful for fixing the issue to add here — don't write comments. Thank you.
Author
Owner

@Long0x0 commented on GitHub (Aug 6, 2024):

@Thrilleratplay

It seems that IMG/mkcpio.sh does not generate a64 and m64 directly. But they are the same files as INSTALL/tool/aarch64/ash and INSTALL/tool/mips64el/ash by comparing the hashes, and come from busybox.

And VtoyTool/build.sh only generates VtoyTool/vtoytool/00/**.

@Long0x0 commented on GitHub (Aug 6, 2024): @Thrilleratplay It seems that `IMG/mkcpio.sh` does not generate `a64` and `m64` directly. But they are the same files as `INSTALL/tool/aarch64/ash` and `INSTALL/tool/mips64el/ash` by comparing the hashes, and come from busybox. And `VtoyTool/build.sh` only generates `VtoyTool/vtoytool/00/**`.
Author
Owner

@Toolybird commented on GitHub (Aug 6, 2024):

Hi folks, I am the author and maintainer of the Arch Linux AUR PKGBUILD which attempts to build most of Ventoy from source. This means I am very well placed to know about the origin of every single file in the package. Inside the PKGBUILD I have documented everything I can to the best of my ability.

Honestly, the amount of FUD (and even racism!) in this thread is really quite disgraceful.

It's true that the build system is a mess. It's basically a bunch of shell scripts all strung together. It's like @ventoy has never heard of a Makefile :)

Anyway, my take on the whole situation is that the Ventoy author is an honourable person. Of course, I cannot be 100% certain, but I firmly believe there are no backdoors or anything dodgy going on here. Everyone needs to chill out a bit.

I'd be willing to help @ventoy try and get a proper build system going. I have proved that we don't need to rely on Centos 7 as a build environment.

@Toolybird commented on GitHub (Aug 6, 2024): Hi folks, I am the author and maintainer of the Arch Linux AUR [PKGBUILD](https://aur.archlinux.org/cgit/aur.git/tree/PKGBUILD?h=ventoy) which attempts to build *most* of Ventoy from source. This means I am **very** well placed to know about the origin of every single file in the package. Inside the PKGBUILD I have documented everything I can to the best of my ability. Honestly, the amount of FUD (and even racism!) in this thread is really quite disgraceful. It's true that the build system is a mess. It's basically a bunch of shell scripts all strung together. It's like @ventoy has never heard of a Makefile :) Anyway, my take on the whole situation is that the Ventoy author is an honourable person. Of course, I cannot be 100% certain, but I firmly believe there are no backdoors or anything dodgy going on here. Everyone needs to chill out a bit. I'd be willing to help @ventoy try and get a proper build system going. I have proved that we don't need to rely on Centos 7 as a build environment.
Author
Owner

@sneurlax commented on GitHub (Aug 6, 2024):

Feel free to tag me if there are any tasks which would be well-suited to an experienced coder that's nonetheless new to this codebase. Active Ventoy user and programmer looking to contribute back 👋

@sneurlax commented on GitHub (Aug 6, 2024): Feel free to tag me if there are any tasks which would be well-suited to an experienced coder that's nonetheless new to this codebase. Active Ventoy user and programmer looking to contribute back :wave:
Author
Owner

@onnyyonn commented on GitHub (Aug 7, 2024):

@Toolybird AUR user here. Thank you for maintaining it. I skimmed through your PKGBUILD, and made a list of binaries that are not built from source. Please correct me if I made any mistakes or omitted something.

The following binaries are downloaded from 3rd party:

  • verity
  • lz4cat
  • busybox ar
  • busybox inotifyd
  • busybox ash

The following binaries are taken from Ventoy repo. Some of them can potentially be downloaded from 3rd party directly. But sources are not known for a few others:

  • BOOTIA32.EFI
  • BOOTX64.EFI
  • grub.efi
  • grubia32.efi
  • mmia32.efi
  • MokManager.efi
  • iso9660_{x64,ia32}.efi
  • udf_{x64,ia32}.efi
  • vtoyjump{64,32}.exe
  • 7z
  • imdisk
  • memdisk
  • dragonfly.mfs.xz

Would you say this is correct?

@onnyyonn commented on GitHub (Aug 7, 2024): @Toolybird AUR user here. Thank you for maintaining it. I skimmed through your PKGBUILD, and made a list of binaries that are not built from source. Please correct me if I made any mistakes or omitted something. The following binaries are downloaded from 3rd party: - verity - lz4cat - busybox ar - busybox inotifyd - busybox ash The following binaries are taken from Ventoy repo. Some of them can potentially be downloaded from 3rd party directly. But sources are not known for a few others: - BOOTIA32.EFI - BOOTX64.EFI - grub.efi - grubia32.efi - mmia32.efi - MokManager.efi - iso9660_{x64,ia32}.efi - udf_{x64,ia32}.efi - vtoyjump{64,32}.exe - 7z - imdisk - memdisk - dragonfly.mfs.xz Would you say this is correct?
Author
Owner

@purpleidea commented on GitHub (Aug 7, 2024):

It's a bit of a shameless plug, but I've built an alternative and fully transparent way to provision machines. More distro support patches are needed though, but it's awesome to use. Details here: https://purpleidea.com/blog/2024/03/27/a-new-provisioning-tool/ It's part of the https://github.com/purpleidea/mgmt/ project.

@purpleidea commented on GitHub (Aug 7, 2024): It's a bit of a shameless plug, but I've built an alternative and fully transparent way to provision machines. More distro support patches are needed though, but it's awesome to use. Details here: https://purpleidea.com/blog/2024/03/27/a-new-provisioning-tool/ It's part of the https://github.com/purpleidea/mgmt/ project.
Author
Owner

@robertkirkman commented on GitHub (Aug 8, 2024):

It's a bit of a shameless plug, but I've built an alternative and fully transparent way to provision machines. More distro support patches are needed though, but it's awesome to use. Details here: https://purpleidea.com/blog/2024/03/27/a-new-provisioning-tool/ It's part of the https://github.com/purpleidea/mgmt/ project.

useful idea however it appears that your project has a hard dependency on the device having PXE-over-ethernet boot support which is not guaranteed and is not the target use case for Ventoy.

@robertkirkman commented on GitHub (Aug 8, 2024): > It's a bit of a shameless plug, but I've built an alternative and fully transparent way to provision machines. More distro support patches are needed though, but it's awesome to use. Details here: https://purpleidea.com/blog/2024/03/27/a-new-provisioning-tool/ It's part of the https://github.com/purpleidea/mgmt/ project. useful idea however it appears that your project has a hard dependency on the device having PXE-over-ethernet boot support which is not guaranteed and is not the target use case for Ventoy.
Author
Owner

@haha-689 commented on GitHub (Aug 8, 2024):

It's a bit of a shameless plug, but I've built an alternative and fully transparent way to provision machines. More distro support patches are needed though, but it's awesome to use. Details here: https://purpleidea.com/blog/2024/03/27/a-new-provisioning-tool/ It's part of the https://github.com/purpleidea/mgmt/ project.

It's still a cool and useful tool, don't take the dislikes personally.

@haha-689 commented on GitHub (Aug 8, 2024): > It's a bit of a shameless plug, but I've built an alternative and fully transparent way to provision machines. More distro support patches are needed though, but it's awesome to use. Details here: https://purpleidea.com/blog/2024/03/27/a-new-provisioning-tool/ It's part of the https://github.com/purpleidea/mgmt/ project. It's still a cool and useful tool, don't take the dislikes personally.
Author
Owner

@purpleidea commented on GitHub (Aug 8, 2024):

It's a bit of a shameless plug, but I've built an alternative and fully transparent way to provision machines. More distro support patches are needed though, but it's awesome to use. Details here: https://purpleidea.com/blog/2024/03/27/a-new-provisioning-tool/ It's part of the https://github.com/purpleidea/mgmt/ project.

useful idea however it appears that your project has a hard dependency on the device having PXE-over-ethernet boot support which is not guaranteed and is not the target use case for Ventoy.

You can use an IPXE or netboot.xyz USB stick to kick it off for any machine that doesn't have built-in PXE/netboot support.

@purpleidea commented on GitHub (Aug 8, 2024): >> It's a bit of a shameless plug, but I've built an alternative and fully transparent way to provision machines. More distro support patches are needed though, but it's awesome to use. Details here: https://purpleidea.com/blog/2024/03/27/a-new-provisioning-tool/ It's part of the https://github.com/purpleidea/mgmt/ project. > useful idea however it appears that your project has a hard dependency on the device having PXE-over-ethernet boot support which is not guaranteed and is not the target use case for Ventoy. You can use an IPXE or netboot.xyz USB stick to kick it off for any machine that doesn't have built-in PXE/netboot support.
Author
Owner

@digitalspaceport commented on GitHub (Aug 8, 2024):

Thanks for derailing the topic @purpleidea. It is really not helpful to the issue at hand with Ventoy. This is a poor choice of timing to get into marketing. Before you respond to this, maybe don't and instead consider deleting your posts. Just a suggestion.

Thanks for the generous offers of time and skill to help bring Ventoy builds to a verifiable rebuildable state @Toolybird, as an AUR user also I find @onnyyonn findings very interesting. Also thanks to all the many others who are commenting on the issue at hand and offering time and skills to rectify the issue and get Ventoy back to being a tool we can all trust implicitly.

@digitalspaceport commented on GitHub (Aug 8, 2024): Thanks for derailing the topic @purpleidea. It is really not helpful to the issue at hand with Ventoy. This is a poor choice of timing to get into marketing. Before you respond to this, maybe don't and instead consider deleting your posts. Just a suggestion. Thanks for the generous offers of time and skill to help bring Ventoy builds to a verifiable rebuildable state @Toolybird, as an AUR user also I find @onnyyonn findings very interesting. Also thanks to all the many others who are commenting on the issue at hand and offering time and skills to rectify the issue and get Ventoy back to being a tool we can all trust implicitly.
Author
Owner

@ghost commented on GitHub (Aug 16, 2024):

I got windows w/ ventoy and it was very slow for me, then I switched with linux still using ventoy and it was faster, did the malware make my windows install w ventoy bad to force me to use linux?

@ghost commented on GitHub (Aug 16, 2024): I got windows w/ ventoy and it was very slow for me, then I switched with linux still using ventoy and it was faster, did the malware make my windows install w ventoy bad to force me to use linux?
Author
Owner

@Lucy-dot-dot commented on GitHub (Aug 16, 2024):

@RishiSlop this issue does not mean that ventoy contains a virus. It also doesn't mean that it doesn't it means, we don't know and we can't really check for ourself full at the moment. If Windows feels slow that's probably a driver issue. Also we don't know if you used an official Windows image or slimmed down (tiny11 or similiar) which can have issues. Your issue is unlikely to be caused directly by ventoy or the unchecked binaries in the repo. If you believe Ventoy is the cause, burn the image with rufus and try again

EDIT: Fixed typo

@Lucy-dot-dot commented on GitHub (Aug 16, 2024): @RishiSlop this issue does not mean that ventoy contains a virus. It also doesn't mean that it doesn't it means, we don't know and we can't really check for ourself full at the moment. If Windows feels slow that's probably a driver issue. Also we don't know if you used an official Windows image or slimmed down (tiny11 or similiar) which can have issues. Your issue is unlikely to be caused directly by ventoy or the unchecked binaries in the repo. If you believe Ventoy is the cause, burn the image with rufus and try again EDIT: Fixed typo
Author
Owner

@grepwood commented on GitHub (Aug 16, 2024):

Windows is the malware.

@grepwood commented on GitHub (Aug 16, 2024): Windows is the malware.
Author
Owner

@Joseph-DiGiovanni commented on GitHub (Sep 2, 2024):

Can someone outline what exactly needs to be done to eliminate these blobs? My understanding is while there are many precompiled binaries only a few exist with zero source or even so much as brief explanation of their origin/build process.

If that understanding is correct after this much time the project should absolutely be treated as malware until someone can at least be bothered to officially explain the origin of these binaries.

@Joseph-DiGiovanni commented on GitHub (Sep 2, 2024): Can someone outline what exactly needs to be done to eliminate these blobs? My understanding is while there are many precompiled binaries only a few exist with zero source or even so much as brief explanation of their origin/build process. If that understanding is correct after this much time the project **should absolutely be treated as malware** until someone can _at least_ be bothered to officially explain the origin of these binaries.
Author
Owner

@grepwood commented on GitHub (Sep 3, 2024):

Can someone outline what exactly needs to be done to eliminate these blobs?

On Linux, use the versions of those blobs that are provided by the distribution's package manager.

On Windows, let them eat cake.

@grepwood commented on GitHub (Sep 3, 2024): >Can someone outline what exactly needs to be done to eliminate these blobs? On Linux, use the versions of those blobs that are provided by the distribution's package manager. On Windows, let them eat cake.
Author
Owner

@Joseph-DiGiovanni commented on GitHub (Sep 3, 2024):

use the versions of those blobs that are provided by the distribution's package manager.

If every binary has a known origin this is a fine solution, but I believe there are still some that just don't have one.

Remaining silent on a huge accusation like your project being the next XZ Utils is nothing more than a stall tactic in my eyes.

@Joseph-DiGiovanni commented on GitHub (Sep 3, 2024): > use the versions of those blobs that are provided by the distribution's package manager. If every binary has a known origin this is a fine solution, but I believe there are still some that just don't have one. Remaining silent on a huge accusation like your project being the next XZ Utils is nothing more than a stall tactic in my eyes.
Author
Owner

@bernardgut commented on GitHub (Sep 3, 2024):

Since the maintainer doesn't want to do basic open source project management/create tasks tickets so people can contribute and help him. Let me try to spell it out for him:

  • He needs someone who is reasonably good at automake to write a makefile that pulls dependencies (in this case blobs) from trusted sources (Microsoft, Debian, GNU etc) and create a PR for that
  • He needs the to remove secureboot support or sign his key so he can build his own trusted bootloader. And create the documentation for people who want to use secureboot to install his key locally in their tpm.

Something along those lines. Did I miss something ?

PS: @ the maintainer : man you are really making it HARD to want to help you. NOBODY will ever spend a week creating a PR for it to be discarded because it doesn't meet whatever criteria you have in your head. Maybe if you spend 10 min SPELLING OUT what you want to be done for fixing this issue instead of begging for money, this thread would have been closed last year... Plenty of people know how to fix this issue. Nobody is going to waste their time trying to figure out which solution you deem as acceptable for a PR. Just my 2 cents.

@bernardgut commented on GitHub (Sep 3, 2024): Since the maintainer doesn't want to do basic open source project management/create tasks tickets so people can contribute and help him. Let me try to spell it out for him: - He needs someone who is reasonably good at automake to write a makefile that pulls dependencies (in this case blobs) from trusted sources (Microsoft, Debian, GNU etc) and create a PR for that - He needs the to remove secureboot support or sign his key so he can build his own trusted bootloader. And create the documentation for people who want to use secureboot to install his key locally in their tpm. Something along those lines. Did I miss something ? PS: @ the maintainer : man you are really making it HARD to want to help you. NOBODY will ever spend a week creating a PR for it to be discarded because it doesn't meet whatever criteria you have in your head. Maybe if you spend 10 min **SPELLING OUT what you want to be done for fixing this issue instead of begging for money**, this thread would have been closed last year... Plenty of people know how to fix this issue. Nobody is going to waste their time trying to figure out which solution **you** deem as acceptable for a PR. Just my 2 cents.
Author
Owner

@grepwood commented on GitHub (Sep 3, 2024):

Using the following command:

find . -type f -exec file {} \; | grep ELF | sed 's/:\ ELF.*$//;s/^\.\///'

I have found this list of files:

IMG/cpio_x86/ventoy/tool/zstdcat64
IMG/cpio_x86/ventoy/tool/inotifyd
IMG/cpio_x86/ventoy/tool/dm_patch_32.ko
IMG/cpio_x86/ventoy/tool/dm_patch_ibt_64.ko
IMG/cpio_x86/ventoy/tool/ar
IMG/cpio_x86/ventoy/tool/zstdcat
IMG/cpio_x86/ventoy/tool/lz4cat
IMG/cpio_x86/ventoy/tool/lz4cat64
IMG/cpio_x86/ventoy/tool/dm_patch_64.ko
IMG/cpio_x86/ventoy/busybox/xzminidec32
IMG/cpio_x86/ventoy/busybox/ash
IMG/cpio_x86/ventoy/busybox/64h
IMG/cpio_x86/ventoy/busybox/xzminidec64
IMG/cpio_x86/ventoy/busybox/xzminidec64_musl
IMG/cpio_x86/ventoy/busybox/vtchmod32
IMG/cpio_x86/ventoy/busybox/vtchmod64_musl
IMG/cpio_x86/ventoy/busybox/vtchmod64
IMG/cpio_arm64/ventoy/tool/zstdcataa64
IMG/cpio_arm64/ventoy/tool/lz4cataa64
IMG/cpio_arm64/ventoy/busybox/a64
IMG/cpio_arm64/ventoy/busybox/vtchmodaa64
IMG/cpio_arm64/ventoy/busybox/xzminidecaa64
IMG/cpio_mips64/ventoy/tool/lz4catm64e
IMG/cpio_mips64/ventoy/busybox/m64
IMG/cpio_mips64/ventoy/busybox/vtchmodm64e
IMG/cpio_mips64/ventoy/busybox/xzminidecm64e
SQUASHFS/unsquashfs_aa64
SQUASHFS/unsquashfs_64
SQUASHFS/unsquashfs_32
VtoyTool/vtoytool/01/vtoytool_64
VtoyTool/vtoytool/02/vtoytool_64
VtoyTool/vtoytool/00/vtoytool_64
VtoyTool/vtoytool/00/vtoytool_32
VtoyTool/vtoytool/00/vtoytool_m64e
VtoyTool/vtoytool/00/vtoytool_aa64
LiveCD/VTOY/ventoy/drivers/ezusb.ko
LiveCD/VTOY/ventoy/drivers/usblp.ko
LiveCD/VTOY/ventoy/drivers/sisusbvga.ko
LiveCD/VTOY/ventoy/drivers/xhci-pci.ko
LiveCD/VTOY/ventoy/drivers/vhci-hcd.ko
LiveCD/VTOY/ventoy/drivers/yurex.ko
LiveCD/VTOY/ventoy/drivers/mptbase.ko
LiveCD/VTOY/ventoy/drivers/mptsas.ko
LiveCD/VTOY/ventoy/drivers/xhci-hcd.ko
LiveCD/VTOY/ventoy/drivers/mptscsih.ko
LiveCD/VTOY/ventoy/drivers/usb-otg-fsm.ko
LiveCD/VTOY/ventoy/drivers/usbip-host.ko
LiveCD/VTOY/ventoy/drivers/parport.ko
LiveCD/VTOY/ventoy/drivers/usb3503.ko
LiveCD/VTOY/ventoy/drivers/megaraid_sas.ko
LiveCD/VTOY/ventoy/drivers/ums-realtek.ko
LiveCD/VTOY/ventoy/drivers/mptfc.ko
LiveCD/VTOY/ventoy/drivers/mptctl.ko
LiveCD/VTOY/ventoy/drivers/scsi_transport_sas.ko
LiveCD/VTOY/ventoy/drivers/pi3usb30532.ko
LiveCD/VTOY/ventoy/drivers/xhci-plat-hcd.ko
LiveCD/VTOY/ventoy/drivers/cdc-acm.ko
LiveCD/VTOY/ventoy/drivers/scsi_transport_srp.ko
LiveCD/VTOY/ventoy/drivers/uss720.ko
LiveCD/VTOY/ventoy/drivers/cdc-wdm.ko
LiveCD/VTOY/ventoy/drivers/usb251xb.ko
LiveCD/VTOY/ventoy/drivers/mptspi.ko
LiveCD/VTOY/ventoy/drivers/scsi_transport_spi.ko
LiveCD/VTOY/ventoy/drivers/usb4604.ko
LiveCD/VTOY/ventoy/drivers/usbip-core.ko
ZSTD/zstdcat64
ZSTD/zstdcataa64
ZSTD/zstdcat
VBLADE/vblade-master/vblade_32
VBLADE/vblade-master/vblade_aa64
VBLADE/vblade-master/vblade_64
LiveCDGUI/EXT/busybox-x86_64
INSTALL/VentoyGUI.x86_64
INSTALL/tool/x86_64/Ventoy2Disk.qt5
INSTALL/tool/x86_64/xzcat
INSTALL/tool/x86_64/mkexfatfs
INSTALL/tool/x86_64/ash
INSTALL/tool/x86_64/hexdump
INSTALL/tool/x86_64/Plugson
INSTALL/tool/x86_64/mount.exfat-fuse
INSTALL/tool/x86_64/Ventoy2Disk.gtk2
INSTALL/tool/x86_64/vlnk
INSTALL/tool/x86_64/Ventoy2Disk.gtk3
INSTALL/tool/x86_64/vtoycli
INSTALL/tool/x86_64/V2DServer
INSTALL/tool/i386/Ventoy2Disk.qt5
INSTALL/tool/i386/xzcat
INSTALL/tool/i386/mkexfatfs
INSTALL/tool/i386/ash
INSTALL/tool/i386/hexdump
INSTALL/tool/i386/Plugson
INSTALL/tool/i386/mount.exfat-fuse
INSTALL/tool/i386/Ventoy2Disk.gtk2
INSTALL/tool/i386/vlnk
INSTALL/tool/i386/Ventoy2Disk.gtk3
INSTALL/tool/i386/vtoycli
INSTALL/tool/i386/V2DServer
INSTALL/tool/mips64el/Ventoy2Disk.qt5
INSTALL/tool/mips64el/xzcat
INSTALL/tool/mips64el/mkexfatfs
INSTALL/tool/mips64el/ash
INSTALL/tool/mips64el/hexdump
INSTALL/tool/mips64el/Plugson
INSTALL/tool/mips64el/mount.exfat-fuse
INSTALL/tool/mips64el/vlnk
INSTALL/tool/mips64el/Ventoy2Disk.gtk3
INSTALL/tool/mips64el/vtoycli
INSTALL/tool/mips64el/V2DServer
INSTALL/tool/aarch64/Ventoy2Disk.qt5
INSTALL/tool/aarch64/xzcat
INSTALL/tool/aarch64/mkexfatfs
INSTALL/tool/aarch64/ash
INSTALL/tool/aarch64/hexdump
INSTALL/tool/aarch64/Plugson
INSTALL/tool/aarch64/mount.exfat-fuse
INSTALL/tool/aarch64/vlnk
INSTALL/tool/aarch64/Ventoy2Disk.gtk3
INSTALL/tool/aarch64/vtoycli
INSTALL/tool/aarch64/V2DServer
INSTALL/grub/x86_64-efi/btrfs.mod
INSTALL/grub/x86_64-efi/random.mod
INSTALL/grub/x86_64-efi/usbtest.mod
INSTALL/grub/x86_64-efi/part_sunpc.mod
INSTALL/grub/x86_64-efi/hello.mod
INSTALL/grub/x86_64-efi/part_amiga.mod
INSTALL/grub/x86_64-efi/loadenv.mod
INSTALL/grub/x86_64-efi/play.mod
INSTALL/grub/x86_64-efi/part_sun.mod
INSTALL/grub/x86_64-efi/loadbios.mod
INSTALL/grub/x86_64-efi/morse.mod
INSTALL/grub/x86_64-efi/mul_test.mod
INSTALL/grub/x86_64-efi/gcry_rmd160.mod
INSTALL/grub/x86_64-efi/gcry_idea.mod
INSTALL/grub/x86_64-efi/minix3_be.mod
INSTALL/grub/x86_64-efi/legacy_password_test.mod
INSTALL/grub/x86_64-efi/usb.mod
INSTALL/grub/x86_64-efi/dm_nv.mod
INSTALL/grub/x86_64-efi/date.mod
INSTALL/grub/x86_64-efi/cryptodisk.mod
INSTALL/grub/x86_64-efi/affs.mod
INSTALL/grub/x86_64-efi/password.mod
INSTALL/grub/x86_64-efi/scsi.mod
INSTALL/grub/x86_64-efi/setpci.mod
INSTALL/grub/x86_64-efi/videotest.mod
INSTALL/grub/x86_64-efi/uhci.mod
INSTALL/grub/x86_64-efi/ata.mod
INSTALL/grub/x86_64-efi/offsetio.mod
INSTALL/grub/x86_64-efi/mdraid09.mod
INSTALL/grub/x86_64-efi/linux16.mod
INSTALL/grub/x86_64-efi/usbserial_pl2303.mod
INSTALL/grub/x86_64-efi/part_dvh.mod
INSTALL/grub/x86_64-efi/signature_test.mod
INSTALL/grub/x86_64-efi/cbtime.mod
INSTALL/grub/x86_64-efi/gcry_sha1.mod
INSTALL/grub/x86_64-efi/zfscrypt.mod
INSTALL/grub/x86_64-efi/iorw.mod
INSTALL/grub/x86_64-efi/time.mod
INSTALL/grub/x86_64-efi/pata.mod
INSTALL/grub/x86_64-efi/setjmp.mod
INSTALL/grub/x86_64-efi/zfsinfo.mod
INSTALL/grub/x86_64-efi/exfctest.mod
INSTALL/grub/x86_64-efi/gcry_sha256.mod
INSTALL/grub/x86_64-efi/eval.mod
INSTALL/grub/x86_64-efi/keylayouts.mod
INSTALL/grub/x86_64-efi/nilfs2.mod
INSTALL/grub/x86_64-efi/bswap_test.mod
INSTALL/grub/x86_64-efi/minix.mod
INSTALL/grub/x86_64-efi/ufs1_be.mod
INSTALL/grub/x86_64-efi/gcry_des.mod
INSTALL/grub/x86_64-efi/functional_test.mod
INSTALL/grub/x86_64-efi/cs5536.mod
INSTALL/grub/x86_64-efi/disk.mod
INSTALL/grub/x86_64-efi/jfs.mod
INSTALL/grub/x86_64-efi/xnu.mod
INSTALL/grub/x86_64-efi/gcry_seed.mod
INSTALL/grub/x86_64-efi/geli.mod
INSTALL/grub/x86_64-efi/hfs.mod
INSTALL/grub/x86_64-efi/cbmemc.mod
INSTALL/grub/x86_64-efi/cmp_test.mod
INSTALL/grub/x86_64-efi/cmdline_cat_test.mod
INSTALL/grub/x86_64-efi/f2fs.mod
INSTALL/grub/x86_64-efi/parttool.mod
INSTALL/grub/x86_64-efi/gptsync.mod
INSTALL/grub/x86_64-efi/lsefi.mod
INSTALL/grub/x86_64-efi/reiserfs.mod
INSTALL/grub/x86_64-efi/hfspluscomp.mod
INSTALL/grub/x86_64-efi/datehook.mod
INSTALL/grub/x86_64-efi/usbserial_usbdebug.mod
INSTALL/grub/x86_64-efi/usbserial_ftdi.mod
INSTALL/grub/x86_64-efi/videotest_checksum.mod
INSTALL/grub/x86_64-efi/search_label.mod
INSTALL/grub/x86_64-efi/usbserial_common.mod
INSTALL/grub/x86_64-efi/raid6rec.mod
INSTALL/grub/x86_64-efi/memdisk.mod
INSTALL/grub/x86_64-efi/ehci.mod
INSTALL/grub/x86_64-efi/lspci.mod
INSTALL/grub/x86_64-efi/progress.mod
INSTALL/grub/x86_64-efi/afs.mod
INSTALL/grub/x86_64-efi/odc.mod
INSTALL/grub/x86_64-efi/strtoull_test.mod
INSTALL/grub/x86_64-efi/pcidump.mod
INSTALL/grub/x86_64-efi/zstd.mod
INSTALL/grub/x86_64-efi/videoinfo.mod
INSTALL/grub/x86_64-efi/gcry_serpent.mod
INSTALL/grub/x86_64-efi/part_plan.mod
INSTALL/grub/x86_64-efi/testload.mod
INSTALL/grub/x86_64-efi/blscfg.mod
INSTALL/grub/x86_64-efi/cpio_be.mod
INSTALL/grub/x86_64-efi/msdospart.mod
INSTALL/grub/x86_64-efi/help.mod
INSTALL/grub/x86_64-efi/testspeed.mod
INSTALL/grub/x86_64-efi/lssal.mod
INSTALL/grub/x86_64-efi/procfs.mod
INSTALL/grub/x86_64-efi/wrmsr.mod
INSTALL/grub/x86_64-efi/bsd.mod
INSTALL/grub/x86_64-efi/mpi.mod
INSTALL/grub/x86_64-efi/test_blockarg.mod
INSTALL/grub/x86_64-efi/usbms.mod
INSTALL/grub/x86_64-efi/gcry_arcfour.mod
INSTALL/grub/x86_64-efi/minix_be.mod
INSTALL/grub/x86_64-efi/legacycfg.mod
INSTALL/grub/x86_64-efi/syslinuxcfg.mod
INSTALL/grub/x86_64-efi/part_dfly.mod
INSTALL/grub/x86_64-efi/ufs2.mod
INSTALL/grub/x86_64-efi/div.mod
INSTALL/grub/x86_64-efi/macho.mod
INSTALL/grub/x86_64-efi/search_fs_uuid.mod
INSTALL/grub/x86_64-efi/cmp.mod
INSTALL/grub/x86_64-efi/ctz_test.mod
INSTALL/grub/x86_64-efi/rdmsr.mod
INSTALL/grub/x86_64-efi/sleep_test.mod
INSTALL/grub/x86_64-efi/minix3.mod
INSTALL/grub/x86_64-efi/minix2.mod
INSTALL/grub/x86_64-efi/luks.mod
INSTALL/grub/x86_64-efi/cbls.mod
INSTALL/grub/x86_64-efi/search_fs_file.mod
INSTALL/grub/x86_64-efi/normal.mod
INSTALL/grub/x86_64-efi/gcry_cast5.mod
INSTALL/grub/x86_64-efi/cbfs.mod
INSTALL/grub/x86_64-efi/keystatus.mod
INSTALL/grub/x86_64-efi/setjmp_test.mod
INSTALL/grub/x86_64-efi/efinet.mod
INSTALL/grub/x86_64-efi/ntfscomp.mod
INSTALL/grub/x86_64-efi/memrw.mod
INSTALL/grub/x86_64-efi/div_test.mod
INSTALL/grub/x86_64-efi/sfs.mod
INSTALL/grub/x86_64-efi/pgp.mod
INSTALL/grub/x86_64-efi/macbless.mod
INSTALL/grub/x86_64-efi/lvm.mod
INSTALL/grub/x86_64-efi/ufs1.mod
INSTALL/grub/x86_64-efi/lsefisystab.mod
INSTALL/grub/x86_64-efi/crc64.mod
INSTALL/grub/x86_64-efi/ohci.mod
INSTALL/grub/x86_64-efi/cpuid.mod
INSTALL/grub/x86_64-efi/multiboot.mod
INSTALL/grub/x86_64-efi/tga.mod
INSTALL/grub/x86_64-efi/elf.mod
INSTALL/grub/x86_64-efi/cbtable.mod
INSTALL/grub/x86_64-efi/probe.mod
INSTALL/grub/x86_64-efi/multiboot2.mod
INSTALL/grub/x86_64-efi/nativedisk.mod
INSTALL/grub/x86_64-efi/spkmodem.mod
INSTALL/grub/x86_64-efi/hexdump.mod
INSTALL/grub/x86_64-efi/mdraid09_be.mod
INSTALL/grub/x86_64-efi/lsmmap.mod
INSTALL/grub/x86_64-efi/archelp.mod
INSTALL/grub/x86_64-efi/minix2_be.mod
INSTALL/grub/x86_64-efi/appleldr.mod
INSTALL/grub/x86_64-efi/gcry_md4.mod
INSTALL/grub/x86_64-efi/cpio.mod
INSTALL/grub/x86_64-efi/gcry_whirlpool.mod
INSTALL/grub/x86_64-efi/shim_lock.mod
INSTALL/grub/x86_64-efi/adler32.mod
INSTALL/grub/x86_64-efi/shift_test.mod
INSTALL/grub/x86_64-efi/part_acorn.mod
INSTALL/grub/x86_64-efi/gcry_twofish.mod
INSTALL/grub/x86_64-efi/raid5rec.mod
INSTALL/grub/x86_64-efi/gcry_blowfish.mod
INSTALL/grub/x86_64-efi/bfs.mod
INSTALL/grub/x86_64-efi/gcry_rsa.mod
INSTALL/grub/x86_64-efi/aout.mod
INSTALL/grub/x86_64-efi/ahci.mod
INSTALL/grub/x86_64-efi/gcry_rfc2268.mod
INSTALL/grub/x86_64-efi/pbkdf2_test.mod
INSTALL/grub/x86_64-efi/ldm.mod
INSTALL/grub/x86_64-efi/part_bsd.mod
INSTALL/grub/x86_64-efi/romfs.mod
INSTALL/grub/x86_64-efi/gcry_camellia.mod
INSTALL/grub/x86_64-efi/verifiers.mod
INSTALL/grub/x86_64-efi/lsefimmap.mod
INSTALL/grub/x86_64-efi/xnu_uuid.mod
INSTALL/grub/x86_64-efi/gcry_tiger.mod
INSTALL/grub/x86_64-efi/gcry_crc.mod
INSTALL/grub/x86_64-efi/hdparm.mod
INSTALL/grub/x86_64-efi/lsacpi.mod
INSTALL/grub/x86_64-efi/xnu_uuid_test.mod
INSTALL/grub/x86_64-efi/gcry_rijndael.mod
INSTALL/grub/x86_64-efi/tr.mod
INSTALL/grub/x86_64-efi/zfs.mod
INSTALL/grub/x86_64-efi/fixvideo.mod
INSTALL/grub/x86_64-efi/backtrace.mod
INSTALL/grub/x86_64-efi/tpm.mod
INSTALL/grub/x86_64-efi/mdraid1x.mod
INSTALL/grub/x86_64-efi/gcry_dsa.mod
INSTALL/grub/arm64-efi/normal.mod
INSTALL/grub/i386-efi/btrfs.mod
INSTALL/grub/i386-efi/random.mod
INSTALL/grub/i386-efi/usbtest.mod
INSTALL/grub/i386-efi/part_sunpc.mod
INSTALL/grub/i386-efi/hello.mod
INSTALL/grub/i386-efi/part_amiga.mod
INSTALL/grub/i386-efi/loadenv.mod
INSTALL/grub/i386-efi/play.mod
INSTALL/grub/i386-efi/part_sun.mod
INSTALL/grub/i386-efi/loadbios.mod
INSTALL/grub/i386-efi/morse.mod
INSTALL/grub/i386-efi/mul_test.mod
INSTALL/grub/i386-efi/gcry_rmd160.mod
INSTALL/grub/i386-efi/gcry_idea.mod
INSTALL/grub/i386-efi/minix3_be.mod
INSTALL/grub/i386-efi/legacy_password_test.mod
INSTALL/grub/i386-efi/usb.mod
INSTALL/grub/i386-efi/dm_nv.mod
INSTALL/grub/i386-efi/date.mod
INSTALL/grub/i386-efi/cryptodisk.mod
INSTALL/grub/i386-efi/affs.mod
INSTALL/grub/i386-efi/password.mod
INSTALL/grub/i386-efi/scsi.mod
INSTALL/grub/i386-efi/setpci.mod
INSTALL/grub/i386-efi/videotest.mod
INSTALL/grub/i386-efi/uhci.mod
INSTALL/grub/i386-efi/ata.mod
INSTALL/grub/i386-efi/offsetio.mod
INSTALL/grub/i386-efi/mdraid09.mod
INSTALL/grub/i386-efi/linux16.mod
INSTALL/grub/i386-efi/usbserial_pl2303.mod
INSTALL/grub/i386-efi/part_dvh.mod
INSTALL/grub/i386-efi/signature_test.mod
INSTALL/grub/i386-efi/cbtime.mod
INSTALL/grub/i386-efi/gcry_sha1.mod
INSTALL/grub/i386-efi/gdb.mod
INSTALL/grub/i386-efi/zfscrypt.mod
INSTALL/grub/i386-efi/iorw.mod
INSTALL/grub/i386-efi/time.mod
INSTALL/grub/i386-efi/pata.mod
INSTALL/grub/i386-efi/setjmp.mod
INSTALL/grub/i386-efi/zfsinfo.mod
INSTALL/grub/i386-efi/exfctest.mod
INSTALL/grub/i386-efi/gcry_sha256.mod
INSTALL/grub/i386-efi/eval.mod
INSTALL/grub/i386-efi/keylayouts.mod
INSTALL/grub/i386-efi/nilfs2.mod
INSTALL/grub/i386-efi/bswap_test.mod
INSTALL/grub/i386-efi/minix.mod
INSTALL/grub/i386-efi/ufs1_be.mod
INSTALL/grub/i386-efi/gcry_des.mod
INSTALL/grub/i386-efi/functional_test.mod
INSTALL/grub/i386-efi/cs5536.mod
INSTALL/grub/i386-efi/disk.mod
INSTALL/grub/i386-efi/jfs.mod
INSTALL/grub/i386-efi/xnu.mod
INSTALL/grub/i386-efi/gcry_seed.mod
INSTALL/grub/i386-efi/geli.mod
INSTALL/grub/i386-efi/hfs.mod
INSTALL/grub/i386-efi/cbmemc.mod
INSTALL/grub/i386-efi/cmp_test.mod
INSTALL/grub/i386-efi/cmdline_cat_test.mod
INSTALL/grub/i386-efi/f2fs.mod
INSTALL/grub/i386-efi/parttool.mod
INSTALL/grub/i386-efi/gptsync.mod
INSTALL/grub/i386-efi/lsefi.mod
INSTALL/grub/i386-efi/reiserfs.mod
INSTALL/grub/i386-efi/hfspluscomp.mod
INSTALL/grub/i386-efi/datehook.mod
INSTALL/grub/i386-efi/usbserial_usbdebug.mod
INSTALL/grub/i386-efi/usbserial_ftdi.mod
INSTALL/grub/i386-efi/videotest_checksum.mod
INSTALL/grub/i386-efi/search_label.mod
INSTALL/grub/i386-efi/usbserial_common.mod
INSTALL/grub/i386-efi/raid6rec.mod
INSTALL/grub/i386-efi/memdisk.mod
INSTALL/grub/i386-efi/ehci.mod
INSTALL/grub/i386-efi/lspci.mod
INSTALL/grub/i386-efi/progress.mod
INSTALL/grub/i386-efi/afs.mod
INSTALL/grub/i386-efi/odc.mod
INSTALL/grub/i386-efi/strtoull_test.mod
INSTALL/grub/i386-efi/pcidump.mod
INSTALL/grub/i386-efi/zstd.mod
INSTALL/grub/i386-efi/videoinfo.mod
INSTALL/grub/i386-efi/gcry_serpent.mod
INSTALL/grub/i386-efi/part_plan.mod
INSTALL/grub/i386-efi/testload.mod
INSTALL/grub/i386-efi/blscfg.mod
INSTALL/grub/i386-efi/cpio_be.mod
INSTALL/grub/i386-efi/msdospart.mod
INSTALL/grub/i386-efi/help.mod
INSTALL/grub/i386-efi/testspeed.mod
INSTALL/grub/i386-efi/lssal.mod
INSTALL/grub/i386-efi/procfs.mod
INSTALL/grub/i386-efi/wrmsr.mod
INSTALL/grub/i386-efi/bsd.mod
INSTALL/grub/i386-efi/mpi.mod
INSTALL/grub/i386-efi/test_blockarg.mod
INSTALL/grub/i386-efi/usbms.mod
INSTALL/grub/i386-efi/gcry_arcfour.mod
INSTALL/grub/i386-efi/minix_be.mod
INSTALL/grub/i386-efi/legacycfg.mod
INSTALL/grub/i386-efi/syslinuxcfg.mod
INSTALL/grub/i386-efi/part_dfly.mod
INSTALL/grub/i386-efi/ufs2.mod
INSTALL/grub/i386-efi/div.mod
INSTALL/grub/i386-efi/macho.mod
INSTALL/grub/i386-efi/search_fs_uuid.mod
INSTALL/grub/i386-efi/cmp.mod
INSTALL/grub/i386-efi/ctz_test.mod
INSTALL/grub/i386-efi/rdmsr.mod
INSTALL/grub/i386-efi/sleep_test.mod
INSTALL/grub/i386-efi/minix3.mod
INSTALL/grub/i386-efi/minix2.mod
INSTALL/grub/i386-efi/luks.mod
INSTALL/grub/i386-efi/cbls.mod
INSTALL/grub/i386-efi/search_fs_file.mod
INSTALL/grub/i386-efi/normal.mod
INSTALL/grub/i386-efi/gcry_cast5.mod
INSTALL/grub/i386-efi/cbfs.mod
INSTALL/grub/i386-efi/keystatus.mod
INSTALL/grub/i386-efi/setjmp_test.mod
INSTALL/grub/i386-efi/efinet.mod
INSTALL/grub/i386-efi/ntfscomp.mod
INSTALL/grub/i386-efi/memrw.mod
INSTALL/grub/i386-efi/div_test.mod
INSTALL/grub/i386-efi/sfs.mod
INSTALL/grub/i386-efi/pgp.mod
INSTALL/grub/i386-efi/macbless.mod
INSTALL/grub/i386-efi/lvm.mod
INSTALL/grub/i386-efi/ufs1.mod
INSTALL/grub/i386-efi/lsefisystab.mod
INSTALL/grub/i386-efi/crc64.mod
INSTALL/grub/i386-efi/ohci.mod
INSTALL/grub/i386-efi/cpuid.mod
INSTALL/grub/i386-efi/multiboot.mod
INSTALL/grub/i386-efi/tga.mod
INSTALL/grub/i386-efi/elf.mod
INSTALL/grub/i386-efi/cbtable.mod
INSTALL/grub/i386-efi/probe.mod
INSTALL/grub/i386-efi/multiboot2.mod
INSTALL/grub/i386-efi/nativedisk.mod
INSTALL/grub/i386-efi/spkmodem.mod
INSTALL/grub/i386-efi/hexdump.mod
INSTALL/grub/i386-efi/mdraid09_be.mod
INSTALL/grub/i386-efi/lsmmap.mod
INSTALL/grub/i386-efi/archelp.mod
INSTALL/grub/i386-efi/minix2_be.mod
INSTALL/grub/i386-efi/appleldr.mod
INSTALL/grub/i386-efi/gcry_md4.mod
INSTALL/grub/i386-efi/cpio.mod
INSTALL/grub/i386-efi/gcry_whirlpool.mod
INSTALL/grub/i386-efi/adler32.mod
INSTALL/grub/i386-efi/shift_test.mod
INSTALL/grub/i386-efi/part_acorn.mod
INSTALL/grub/i386-efi/gcry_twofish.mod
INSTALL/grub/i386-efi/raid5rec.mod
INSTALL/grub/i386-efi/gcry_blowfish.mod
INSTALL/grub/i386-efi/bfs.mod
INSTALL/grub/i386-efi/gcry_rsa.mod
INSTALL/grub/i386-efi/aout.mod
INSTALL/grub/i386-efi/ahci.mod
INSTALL/grub/i386-efi/gcry_rfc2268.mod
INSTALL/grub/i386-efi/pbkdf2_test.mod
INSTALL/grub/i386-efi/ldm.mod
INSTALL/grub/i386-efi/part_bsd.mod
INSTALL/grub/i386-efi/romfs.mod
INSTALL/grub/i386-efi/gcry_camellia.mod
INSTALL/grub/i386-efi/verifiers.mod
INSTALL/grub/i386-efi/lsefimmap.mod
INSTALL/grub/i386-efi/xnu_uuid.mod
INSTALL/grub/i386-efi/gcry_tiger.mod
INSTALL/grub/i386-efi/gcry_crc.mod
INSTALL/grub/i386-efi/hdparm.mod
INSTALL/grub/i386-efi/lsacpi.mod
INSTALL/grub/i386-efi/xnu_uuid_test.mod
INSTALL/grub/i386-efi/gcry_rijndael.mod
INSTALL/grub/i386-efi/tr.mod
INSTALL/grub/i386-efi/zfs.mod
INSTALL/grub/i386-efi/fixvideo.mod
INSTALL/grub/i386-efi/backtrace.mod
INSTALL/grub/i386-efi/mdraid1x.mod
INSTALL/grub/i386-efi/gcry_dsa.mod
INSTALL/grub/i386-pc/btrfs.mod
INSTALL/grub/i386-pc/random.mod
INSTALL/grub/i386-pc/usbtest.mod
INSTALL/grub/i386-pc/fshelp.mod
INSTALL/grub/i386-pc/crypto.mod
INSTALL/grub/i386-pc/part_sunpc.mod
INSTALL/grub/i386-pc/pxechain.mod
INSTALL/grub/i386-pc/hello.mod
INSTALL/grub/i386-pc/part_amiga.mod
INSTALL/grub/i386-pc/loadenv.mod
INSTALL/grub/i386-pc/priority_queue.mod
INSTALL/grub/i386-pc/play.mod
INSTALL/grub/i386-pc/part_sun.mod
INSTALL/grub/i386-pc/gcry_sha512.mod
INSTALL/grub/i386-pc/morse.mod
INSTALL/grub/i386-pc/mul_test.mod
INSTALL/grub/i386-pc/gcry_rmd160.mod
INSTALL/grub/i386-pc/gcry_idea.mod
INSTALL/grub/i386-pc/minix3_be.mod
INSTALL/grub/i386-pc/legacy_password_test.mod
INSTALL/grub/i386-pc/usb.mod
INSTALL/grub/i386-pc/dm_nv.mod
INSTALL/grub/i386-pc/cryptodisk.mod
INSTALL/grub/i386-pc/truecrypt.mod
INSTALL/grub/i386-pc/affs.mod
INSTALL/grub/i386-pc/password.mod
INSTALL/grub/i386-pc/scsi.mod
INSTALL/grub/i386-pc/bitmap_scale.mod
INSTALL/grub/i386-pc/setpci.mod
INSTALL/grub/i386-pc/uhci.mod
INSTALL/grub/i386-pc/ata.mod
INSTALL/grub/i386-pc/offsetio.mod
INSTALL/grub/i386-pc/mdraid09.mod
INSTALL/grub/i386-pc/usbserial_pl2303.mod
INSTALL/grub/i386-pc/mmap.mod
INSTALL/grub/i386-pc/part_dvh.mod
INSTALL/grub/i386-pc/video_fb.mod
INSTALL/grub/i386-pc/signature_test.mod
INSTALL/grub/i386-pc/pbkdf2.mod
INSTALL/grub/i386-pc/cbtime.mod
INSTALL/grub/i386-pc/gcry_sha1.mod
INSTALL/grub/i386-pc/gdb.mod
INSTALL/grub/i386-pc/cmosdump.mod
INSTALL/grub/i386-pc/mda_text.mod
INSTALL/grub/i386-pc/zfscrypt.mod
INSTALL/grub/i386-pc/iorw.mod
INSTALL/grub/i386-pc/time.mod
INSTALL/grub/i386-pc/pata.mod
INSTALL/grub/i386-pc/regexp.mod
INSTALL/grub/i386-pc/setjmp.mod
INSTALL/grub/i386-pc/zfsinfo.mod
INSTALL/grub/i386-pc/exfctest.mod
INSTALL/grub/i386-pc/gcry_sha256.mod
INSTALL/grub/i386-pc/serial.mod
INSTALL/grub/i386-pc/eval.mod
INSTALL/grub/i386-pc/freedos.mod
INSTALL/grub/i386-pc/keylayouts.mod
INSTALL/grub/i386-pc/file.mod
INSTALL/grub/i386-pc/nilfs2.mod
INSTALL/grub/i386-pc/bswap_test.mod
INSTALL/grub/i386-pc/minix.mod
INSTALL/grub/i386-pc/ufs1_be.mod
INSTALL/grub/i386-pc/gcry_des.mod
INSTALL/grub/i386-pc/functional_test.mod
INSTALL/grub/i386-pc/cs5536.mod
INSTALL/grub/i386-pc/jfs.mod
INSTALL/grub/i386-pc/xnu.mod
INSTALL/grub/i386-pc/gcry_seed.mod
INSTALL/grub/i386-pc/geli.mod
INSTALL/grub/i386-pc/setkey.mod
INSTALL/grub/i386-pc/part_apple.mod
INSTALL/grub/i386-pc/hfs.mod
INSTALL/grub/i386-pc/cbmemc.mod
INSTALL/grub/i386-pc/cmp_test.mod
INSTALL/grub/i386-pc/cmdline_cat_test.mod
INSTALL/grub/i386-pc/f2fs.mod
INSTALL/grub/i386-pc/parttool.mod
INSTALL/grub/i386-pc/acpi.mod
INSTALL/grub/i386-pc/gptsync.mod
INSTALL/grub/i386-pc/reiserfs.mod
INSTALL/grub/i386-pc/hfspluscomp.mod
INSTALL/grub/i386-pc/datehook.mod
INSTALL/grub/i386-pc/efiemu.mod
INSTALL/grub/i386-pc/usbserial_usbdebug.mod
INSTALL/grub/i386-pc/usbserial_ftdi.mod
INSTALL/grub/i386-pc/search_label.mod
INSTALL/grub/i386-pc/usbserial_common.mod
INSTALL/grub/i386-pc/raid6rec.mod
INSTALL/grub/i386-pc/memdisk.mod
INSTALL/grub/i386-pc/ehci.mod
INSTALL/grub/i386-pc/pxe.mod
INSTALL/grub/i386-pc/progress.mod
INSTALL/grub/i386-pc/afs.mod
INSTALL/grub/i386-pc/lsapm.mod
INSTALL/grub/i386-pc/odc.mod
INSTALL/grub/i386-pc/strtoull_test.mod
INSTALL/grub/i386-pc/pcidump.mod
INSTALL/grub/i386-pc/zstd.mod
INSTALL/grub/i386-pc/net.mod
INSTALL/grub/i386-pc/gcry_serpent.mod
INSTALL/grub/i386-pc/part_plan.mod
INSTALL/grub/i386-pc/testload.mod
INSTALL/grub/i386-pc/blscfg.mod
INSTALL/grub/i386-pc/cpio_be.mod
INSTALL/grub/i386-pc/msdospart.mod
INSTALL/grub/i386-pc/cat.mod
INSTALL/grub/i386-pc/bufio.mod
INSTALL/grub/i386-pc/testspeed.mod
INSTALL/grub/i386-pc/procfs.mod
INSTALL/grub/i386-pc/terminfo.mod
INSTALL/grub/i386-pc/wrmsr.mod
INSTALL/grub/i386-pc/bsd.mod
INSTALL/grub/i386-pc/mpi.mod
INSTALL/grub/i386-pc/test_blockarg.mod
INSTALL/grub/i386-pc/usbms.mod
INSTALL/grub/i386-pc/gcry_arcfour.mod
INSTALL/grub/i386-pc/minix_be.mod
INSTALL/grub/i386-pc/legacycfg.mod
INSTALL/grub/i386-pc/syslinuxcfg.mod
INSTALL/grub/i386-pc/part_dfly.mod
INSTALL/grub/i386-pc/ufs2.mod
INSTALL/grub/i386-pc/div.mod
INSTALL/grub/i386-pc/macho.mod
INSTALL/grub/i386-pc/search_fs_uuid.mod
INSTALL/grub/i386-pc/cmp.mod
INSTALL/grub/i386-pc/ctz_test.mod
INSTALL/grub/i386-pc/rdmsr.mod
INSTALL/grub/i386-pc/cmostest.mod
INSTALL/grub/i386-pc/datetime.mod
INSTALL/grub/i386-pc/bitmap.mod
INSTALL/grub/i386-pc/sleep_test.mod
INSTALL/grub/i386-pc/minix3.mod
INSTALL/grub/i386-pc/minix2.mod
INSTALL/grub/i386-pc/luks.mod
INSTALL/grub/i386-pc/cbls.mod
INSTALL/grub/i386-pc/plan9.mod
INSTALL/grub/i386-pc/search_fs_file.mod
INSTALL/grub/i386-pc/gcry_cast5.mod
INSTALL/grub/i386-pc/cbfs.mod
INSTALL/grub/i386-pc/keystatus.mod
INSTALL/grub/i386-pc/setjmp_test.mod
INSTALL/grub/i386-pc/ntfscomp.mod
INSTALL/grub/i386-pc/memrw.mod
INSTALL/grub/i386-pc/div_test.mod
INSTALL/grub/i386-pc/sfs.mod
INSTALL/grub/i386-pc/pgp.mod
INSTALL/grub/i386-pc/macbless.mod
INSTALL/grub/i386-pc/lvm.mod
INSTALL/grub/i386-pc/ufs1.mod
INSTALL/grub/i386-pc/crc64.mod
INSTALL/grub/i386-pc/ohci.mod
INSTALL/grub/i386-pc/cpuid.mod
INSTALL/grub/i386-pc/multiboot.mod
INSTALL/grub/i386-pc/tga.mod
INSTALL/grub/i386-pc/elf.mod
INSTALL/grub/i386-pc/cbtable.mod
INSTALL/grub/i386-pc/probe.mod
INSTALL/grub/i386-pc/multiboot2.mod
INSTALL/grub/i386-pc/nativedisk.mod
INSTALL/grub/i386-pc/spkmodem.mod
INSTALL/grub/i386-pc/hexdump.mod
INSTALL/grub/i386-pc/mdraid09_be.mod
INSTALL/grub/i386-pc/lsmmap.mod
INSTALL/grub/i386-pc/archelp.mod
INSTALL/grub/i386-pc/minix2_be.mod
INSTALL/grub/i386-pc/relocator.mod
INSTALL/grub/i386-pc/sendkey.mod
INSTALL/grub/i386-pc/gcry_md4.mod
INSTALL/grub/i386-pc/cpio.mod
INSTALL/grub/i386-pc/gcry_whirlpool.mod
INSTALL/grub/i386-pc/newc.mod
INSTALL/grub/i386-pc/adler32.mod
INSTALL/grub/i386-pc/shift_test.mod
INSTALL/grub/i386-pc/part_acorn.mod
INSTALL/grub/i386-pc/smbios.mod
INSTALL/grub/i386-pc/gcry_twofish.mod
INSTALL/grub/i386-pc/raid5rec.mod
INSTALL/grub/i386-pc/gcry_blowfish.mod
INSTALL/grub/i386-pc/diskfilter.mod
INSTALL/grub/i386-pc/bfs.mod
INSTALL/grub/i386-pc/gcry_rsa.mod
INSTALL/grub/i386-pc/aout.mod
INSTALL/grub/i386-pc/ahci.mod
INSTALL/grub/i386-pc/gcry_rfc2268.mod
INSTALL/grub/i386-pc/pbkdf2_test.mod
INSTALL/grub/i386-pc/ldm.mod
INSTALL/grub/i386-pc/hfsplus.mod
INSTALL/grub/i386-pc/part_bsd.mod
INSTALL/grub/i386-pc/romfs.mod
INSTALL/grub/i386-pc/gcry_camellia.mod
INSTALL/grub/i386-pc/verifiers.mod
INSTALL/grub/i386-pc/xnu_uuid.mod
INSTALL/grub/i386-pc/gcry_tiger.mod
INSTALL/grub/i386-pc/gcry_crc.mod
INSTALL/grub/i386-pc/hdparm.mod
INSTALL/grub/i386-pc/lsacpi.mod
INSTALL/grub/i386-pc/xnu_uuid_test.mod
INSTALL/grub/i386-pc/gcry_rijndael.mod
INSTALL/grub/i386-pc/zfs.mod
INSTALL/grub/i386-pc/backtrace.mod
INSTALL/grub/i386-pc/gfxterm_menu.mod
INSTALL/grub/i386-pc/mdraid1x.mod
INSTALL/grub/i386-pc/gcry_dsa.mod
INSTALL/grub/mips64el-efi/normal.mod
INSTALL/VentoyGUI.i386
INSTALL/VentoyGUI.aarch64
INSTALL/VentoyGUI.mips64el
cryptsetup/veritysetup64
cryptsetup/veritysetup32
DMSETUP/dmsetup32
DMSETUP/dmsetup64
DMSETUP/dmsetupaa64
DMSETUP/dmsetupm64e
BUSYBOX/chmod/vtchmodm64e
BUSYBOX/chmod/vtchmod32
BUSYBOX/chmod/vtchmod64_musl
BUSYBOX/chmod/vtchmod64
BUSYBOX/chmod/vtchmodaa64
LZIP/lz4catm64e
LZIP/lz4cataa64
LZIP/lunzip32
LZIP/lunzipaa64
LZIP/lunzip64
LZIP/lz4cat64
FUSEISO/vtoy_fuse_iso_64
FUSEISO/vtoy_fuse_iso_32
FUSEISO/vtoy_fuse_iso_aa64
Unix/ventoy_unix/DragonFly/sbin/init
Unix/ventoy_unix/DragonFly/sbin/dmsetup

We can immediately spot that there's 3 sets of GRUB present:

  • INSTALL/grub/i386-efi
  • INSTALL/grub/i386-pc
  • INSTALL/grub/x86_64-efi

Further snooping shows that there's in fact, more:

  • INSTALL/grub/arm64-efi
  • INSTALL/grub/mips64el-efi

They just escaped this rudimentary method of identification, because they are compressed:

$ file INSTALL/grub/arm64-efi/adler32.mod INSTALL/grub/mips64el-efi/adler32.mod
INSTALL/grub/arm64-efi/adler32.mod: XZ compressed data, checksum CRC64
INSTALL/grub/mips64el-efi/adler32.mod: XZ compressed data, checksum CRC64

So the first thing in our bill of materials is GRUB, for i386-pc, i386-efi, x86_64-efi, arm64-efi, and mips64el-efi.

Next we have all kinds of crap in:

  • IMG/cpio_x86/ventoy/tool
  • IMG/cpio_x86/ventoy/busybox
  • IMG/cpio_arm64/ventoy/tool
  • IMG/cpio_arm64/ventoy/busybox
  • IMG/cpio_mips64/ventoy/tool
  • IMG/cpio_mips64/ventoy/busybox

First thing I noticed when browsing these directories is a kernel module:

$ modinfo IMG/cpio_x86/ventoy/tool/dm_patch_32.ko
filename:       IMG/cpio_x86/ventoy/tool/dm_patch_32.ko
license:        GPL
author:         longpanda <admin@ventoy.net>
description:    dmpatch driver
depends:        
retpoline:      Y
intree:         Y
name:           dm_patch
vermagic:       5.10.84-xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx SMP mod_unload modversions 686

I'm not entirely sure why is a kernel module needed... here's the source for it: github.com/ventoy/Ventoy@c16e76130b/DMPATCH/dmpatch.c
The use case is described here: github.com/ventoy/Ventoy@c16e76130b/DMPATCH/readme.txt (L33)
I'm really unconvinced that this is needed.

Moving on, let's see what tools are exactly located in the IMG directory:

find IMG/*/ventoy/busybox -type f | awk -F '/' '{print $5}' | sed 's/\.xz$//' | sort -u

which brings us to:

64h
a64
ash
busybox32
busybox64
busyboxaa64
busyboxm64e
m64
vtchmod32
vtchmod64
vtchmod64_musl
vtchmodaa64
vtchmodm64e
xzcat32_musl
xzcat64_musl
xzminidec32
xzminidec64
xzminidec64_musl
xzminidecaa64
xzminidecm64e

Some of those commands I recognize:

I'm completely lost wtf is a64 and m64. Whoever made them, didn't bother putting any license info, program name, or disclaimer in the strings.

I'm tired. This is an incredible case, but one that I'm not taking a vacation from life over.

@grepwood commented on GitHub (Sep 3, 2024): Using the following command: ``` find . -type f -exec file {} \; | grep ELF | sed 's/:\ ELF.*$//;s/^\.\///' ``` I have found this list of files: ``` IMG/cpio_x86/ventoy/tool/zstdcat64 IMG/cpio_x86/ventoy/tool/inotifyd IMG/cpio_x86/ventoy/tool/dm_patch_32.ko IMG/cpio_x86/ventoy/tool/dm_patch_ibt_64.ko IMG/cpio_x86/ventoy/tool/ar IMG/cpio_x86/ventoy/tool/zstdcat IMG/cpio_x86/ventoy/tool/lz4cat IMG/cpio_x86/ventoy/tool/lz4cat64 IMG/cpio_x86/ventoy/tool/dm_patch_64.ko IMG/cpio_x86/ventoy/busybox/xzminidec32 IMG/cpio_x86/ventoy/busybox/ash IMG/cpio_x86/ventoy/busybox/64h IMG/cpio_x86/ventoy/busybox/xzminidec64 IMG/cpio_x86/ventoy/busybox/xzminidec64_musl IMG/cpio_x86/ventoy/busybox/vtchmod32 IMG/cpio_x86/ventoy/busybox/vtchmod64_musl IMG/cpio_x86/ventoy/busybox/vtchmod64 IMG/cpio_arm64/ventoy/tool/zstdcataa64 IMG/cpio_arm64/ventoy/tool/lz4cataa64 IMG/cpio_arm64/ventoy/busybox/a64 IMG/cpio_arm64/ventoy/busybox/vtchmodaa64 IMG/cpio_arm64/ventoy/busybox/xzminidecaa64 IMG/cpio_mips64/ventoy/tool/lz4catm64e IMG/cpio_mips64/ventoy/busybox/m64 IMG/cpio_mips64/ventoy/busybox/vtchmodm64e IMG/cpio_mips64/ventoy/busybox/xzminidecm64e SQUASHFS/unsquashfs_aa64 SQUASHFS/unsquashfs_64 SQUASHFS/unsquashfs_32 VtoyTool/vtoytool/01/vtoytool_64 VtoyTool/vtoytool/02/vtoytool_64 VtoyTool/vtoytool/00/vtoytool_64 VtoyTool/vtoytool/00/vtoytool_32 VtoyTool/vtoytool/00/vtoytool_m64e VtoyTool/vtoytool/00/vtoytool_aa64 LiveCD/VTOY/ventoy/drivers/ezusb.ko LiveCD/VTOY/ventoy/drivers/usblp.ko LiveCD/VTOY/ventoy/drivers/sisusbvga.ko LiveCD/VTOY/ventoy/drivers/xhci-pci.ko LiveCD/VTOY/ventoy/drivers/vhci-hcd.ko LiveCD/VTOY/ventoy/drivers/yurex.ko LiveCD/VTOY/ventoy/drivers/mptbase.ko LiveCD/VTOY/ventoy/drivers/mptsas.ko LiveCD/VTOY/ventoy/drivers/xhci-hcd.ko LiveCD/VTOY/ventoy/drivers/mptscsih.ko LiveCD/VTOY/ventoy/drivers/usb-otg-fsm.ko LiveCD/VTOY/ventoy/drivers/usbip-host.ko LiveCD/VTOY/ventoy/drivers/parport.ko LiveCD/VTOY/ventoy/drivers/usb3503.ko LiveCD/VTOY/ventoy/drivers/megaraid_sas.ko LiveCD/VTOY/ventoy/drivers/ums-realtek.ko LiveCD/VTOY/ventoy/drivers/mptfc.ko LiveCD/VTOY/ventoy/drivers/mptctl.ko LiveCD/VTOY/ventoy/drivers/scsi_transport_sas.ko LiveCD/VTOY/ventoy/drivers/pi3usb30532.ko LiveCD/VTOY/ventoy/drivers/xhci-plat-hcd.ko LiveCD/VTOY/ventoy/drivers/cdc-acm.ko LiveCD/VTOY/ventoy/drivers/scsi_transport_srp.ko LiveCD/VTOY/ventoy/drivers/uss720.ko LiveCD/VTOY/ventoy/drivers/cdc-wdm.ko LiveCD/VTOY/ventoy/drivers/usb251xb.ko LiveCD/VTOY/ventoy/drivers/mptspi.ko LiveCD/VTOY/ventoy/drivers/scsi_transport_spi.ko LiveCD/VTOY/ventoy/drivers/usb4604.ko LiveCD/VTOY/ventoy/drivers/usbip-core.ko ZSTD/zstdcat64 ZSTD/zstdcataa64 ZSTD/zstdcat VBLADE/vblade-master/vblade_32 VBLADE/vblade-master/vblade_aa64 VBLADE/vblade-master/vblade_64 LiveCDGUI/EXT/busybox-x86_64 INSTALL/VentoyGUI.x86_64 INSTALL/tool/x86_64/Ventoy2Disk.qt5 INSTALL/tool/x86_64/xzcat INSTALL/tool/x86_64/mkexfatfs INSTALL/tool/x86_64/ash INSTALL/tool/x86_64/hexdump INSTALL/tool/x86_64/Plugson INSTALL/tool/x86_64/mount.exfat-fuse INSTALL/tool/x86_64/Ventoy2Disk.gtk2 INSTALL/tool/x86_64/vlnk INSTALL/tool/x86_64/Ventoy2Disk.gtk3 INSTALL/tool/x86_64/vtoycli INSTALL/tool/x86_64/V2DServer INSTALL/tool/i386/Ventoy2Disk.qt5 INSTALL/tool/i386/xzcat INSTALL/tool/i386/mkexfatfs INSTALL/tool/i386/ash INSTALL/tool/i386/hexdump INSTALL/tool/i386/Plugson INSTALL/tool/i386/mount.exfat-fuse INSTALL/tool/i386/Ventoy2Disk.gtk2 INSTALL/tool/i386/vlnk INSTALL/tool/i386/Ventoy2Disk.gtk3 INSTALL/tool/i386/vtoycli INSTALL/tool/i386/V2DServer INSTALL/tool/mips64el/Ventoy2Disk.qt5 INSTALL/tool/mips64el/xzcat INSTALL/tool/mips64el/mkexfatfs INSTALL/tool/mips64el/ash INSTALL/tool/mips64el/hexdump INSTALL/tool/mips64el/Plugson INSTALL/tool/mips64el/mount.exfat-fuse INSTALL/tool/mips64el/vlnk INSTALL/tool/mips64el/Ventoy2Disk.gtk3 INSTALL/tool/mips64el/vtoycli INSTALL/tool/mips64el/V2DServer INSTALL/tool/aarch64/Ventoy2Disk.qt5 INSTALL/tool/aarch64/xzcat INSTALL/tool/aarch64/mkexfatfs INSTALL/tool/aarch64/ash INSTALL/tool/aarch64/hexdump INSTALL/tool/aarch64/Plugson INSTALL/tool/aarch64/mount.exfat-fuse INSTALL/tool/aarch64/vlnk INSTALL/tool/aarch64/Ventoy2Disk.gtk3 INSTALL/tool/aarch64/vtoycli INSTALL/tool/aarch64/V2DServer INSTALL/grub/x86_64-efi/btrfs.mod INSTALL/grub/x86_64-efi/random.mod INSTALL/grub/x86_64-efi/usbtest.mod INSTALL/grub/x86_64-efi/part_sunpc.mod INSTALL/grub/x86_64-efi/hello.mod INSTALL/grub/x86_64-efi/part_amiga.mod INSTALL/grub/x86_64-efi/loadenv.mod INSTALL/grub/x86_64-efi/play.mod INSTALL/grub/x86_64-efi/part_sun.mod INSTALL/grub/x86_64-efi/loadbios.mod INSTALL/grub/x86_64-efi/morse.mod INSTALL/grub/x86_64-efi/mul_test.mod INSTALL/grub/x86_64-efi/gcry_rmd160.mod INSTALL/grub/x86_64-efi/gcry_idea.mod INSTALL/grub/x86_64-efi/minix3_be.mod INSTALL/grub/x86_64-efi/legacy_password_test.mod INSTALL/grub/x86_64-efi/usb.mod INSTALL/grub/x86_64-efi/dm_nv.mod INSTALL/grub/x86_64-efi/date.mod INSTALL/grub/x86_64-efi/cryptodisk.mod INSTALL/grub/x86_64-efi/affs.mod INSTALL/grub/x86_64-efi/password.mod INSTALL/grub/x86_64-efi/scsi.mod INSTALL/grub/x86_64-efi/setpci.mod INSTALL/grub/x86_64-efi/videotest.mod INSTALL/grub/x86_64-efi/uhci.mod INSTALL/grub/x86_64-efi/ata.mod INSTALL/grub/x86_64-efi/offsetio.mod INSTALL/grub/x86_64-efi/mdraid09.mod INSTALL/grub/x86_64-efi/linux16.mod INSTALL/grub/x86_64-efi/usbserial_pl2303.mod INSTALL/grub/x86_64-efi/part_dvh.mod INSTALL/grub/x86_64-efi/signature_test.mod INSTALL/grub/x86_64-efi/cbtime.mod INSTALL/grub/x86_64-efi/gcry_sha1.mod INSTALL/grub/x86_64-efi/zfscrypt.mod INSTALL/grub/x86_64-efi/iorw.mod INSTALL/grub/x86_64-efi/time.mod INSTALL/grub/x86_64-efi/pata.mod INSTALL/grub/x86_64-efi/setjmp.mod INSTALL/grub/x86_64-efi/zfsinfo.mod INSTALL/grub/x86_64-efi/exfctest.mod INSTALL/grub/x86_64-efi/gcry_sha256.mod INSTALL/grub/x86_64-efi/eval.mod INSTALL/grub/x86_64-efi/keylayouts.mod INSTALL/grub/x86_64-efi/nilfs2.mod INSTALL/grub/x86_64-efi/bswap_test.mod INSTALL/grub/x86_64-efi/minix.mod INSTALL/grub/x86_64-efi/ufs1_be.mod INSTALL/grub/x86_64-efi/gcry_des.mod INSTALL/grub/x86_64-efi/functional_test.mod INSTALL/grub/x86_64-efi/cs5536.mod INSTALL/grub/x86_64-efi/disk.mod INSTALL/grub/x86_64-efi/jfs.mod INSTALL/grub/x86_64-efi/xnu.mod INSTALL/grub/x86_64-efi/gcry_seed.mod INSTALL/grub/x86_64-efi/geli.mod INSTALL/grub/x86_64-efi/hfs.mod INSTALL/grub/x86_64-efi/cbmemc.mod INSTALL/grub/x86_64-efi/cmp_test.mod INSTALL/grub/x86_64-efi/cmdline_cat_test.mod INSTALL/grub/x86_64-efi/f2fs.mod INSTALL/grub/x86_64-efi/parttool.mod INSTALL/grub/x86_64-efi/gptsync.mod INSTALL/grub/x86_64-efi/lsefi.mod INSTALL/grub/x86_64-efi/reiserfs.mod INSTALL/grub/x86_64-efi/hfspluscomp.mod INSTALL/grub/x86_64-efi/datehook.mod INSTALL/grub/x86_64-efi/usbserial_usbdebug.mod INSTALL/grub/x86_64-efi/usbserial_ftdi.mod INSTALL/grub/x86_64-efi/videotest_checksum.mod INSTALL/grub/x86_64-efi/search_label.mod INSTALL/grub/x86_64-efi/usbserial_common.mod INSTALL/grub/x86_64-efi/raid6rec.mod INSTALL/grub/x86_64-efi/memdisk.mod INSTALL/grub/x86_64-efi/ehci.mod INSTALL/grub/x86_64-efi/lspci.mod INSTALL/grub/x86_64-efi/progress.mod INSTALL/grub/x86_64-efi/afs.mod INSTALL/grub/x86_64-efi/odc.mod INSTALL/grub/x86_64-efi/strtoull_test.mod INSTALL/grub/x86_64-efi/pcidump.mod INSTALL/grub/x86_64-efi/zstd.mod INSTALL/grub/x86_64-efi/videoinfo.mod INSTALL/grub/x86_64-efi/gcry_serpent.mod INSTALL/grub/x86_64-efi/part_plan.mod INSTALL/grub/x86_64-efi/testload.mod INSTALL/grub/x86_64-efi/blscfg.mod INSTALL/grub/x86_64-efi/cpio_be.mod INSTALL/grub/x86_64-efi/msdospart.mod INSTALL/grub/x86_64-efi/help.mod INSTALL/grub/x86_64-efi/testspeed.mod INSTALL/grub/x86_64-efi/lssal.mod INSTALL/grub/x86_64-efi/procfs.mod INSTALL/grub/x86_64-efi/wrmsr.mod INSTALL/grub/x86_64-efi/bsd.mod INSTALL/grub/x86_64-efi/mpi.mod INSTALL/grub/x86_64-efi/test_blockarg.mod INSTALL/grub/x86_64-efi/usbms.mod INSTALL/grub/x86_64-efi/gcry_arcfour.mod INSTALL/grub/x86_64-efi/minix_be.mod INSTALL/grub/x86_64-efi/legacycfg.mod INSTALL/grub/x86_64-efi/syslinuxcfg.mod INSTALL/grub/x86_64-efi/part_dfly.mod INSTALL/grub/x86_64-efi/ufs2.mod INSTALL/grub/x86_64-efi/div.mod INSTALL/grub/x86_64-efi/macho.mod INSTALL/grub/x86_64-efi/search_fs_uuid.mod INSTALL/grub/x86_64-efi/cmp.mod INSTALL/grub/x86_64-efi/ctz_test.mod INSTALL/grub/x86_64-efi/rdmsr.mod INSTALL/grub/x86_64-efi/sleep_test.mod INSTALL/grub/x86_64-efi/minix3.mod INSTALL/grub/x86_64-efi/minix2.mod INSTALL/grub/x86_64-efi/luks.mod INSTALL/grub/x86_64-efi/cbls.mod INSTALL/grub/x86_64-efi/search_fs_file.mod INSTALL/grub/x86_64-efi/normal.mod INSTALL/grub/x86_64-efi/gcry_cast5.mod INSTALL/grub/x86_64-efi/cbfs.mod INSTALL/grub/x86_64-efi/keystatus.mod INSTALL/grub/x86_64-efi/setjmp_test.mod INSTALL/grub/x86_64-efi/efinet.mod INSTALL/grub/x86_64-efi/ntfscomp.mod INSTALL/grub/x86_64-efi/memrw.mod INSTALL/grub/x86_64-efi/div_test.mod INSTALL/grub/x86_64-efi/sfs.mod INSTALL/grub/x86_64-efi/pgp.mod INSTALL/grub/x86_64-efi/macbless.mod INSTALL/grub/x86_64-efi/lvm.mod INSTALL/grub/x86_64-efi/ufs1.mod INSTALL/grub/x86_64-efi/lsefisystab.mod INSTALL/grub/x86_64-efi/crc64.mod INSTALL/grub/x86_64-efi/ohci.mod INSTALL/grub/x86_64-efi/cpuid.mod INSTALL/grub/x86_64-efi/multiboot.mod INSTALL/grub/x86_64-efi/tga.mod INSTALL/grub/x86_64-efi/elf.mod INSTALL/grub/x86_64-efi/cbtable.mod INSTALL/grub/x86_64-efi/probe.mod INSTALL/grub/x86_64-efi/multiboot2.mod INSTALL/grub/x86_64-efi/nativedisk.mod INSTALL/grub/x86_64-efi/spkmodem.mod INSTALL/grub/x86_64-efi/hexdump.mod INSTALL/grub/x86_64-efi/mdraid09_be.mod INSTALL/grub/x86_64-efi/lsmmap.mod INSTALL/grub/x86_64-efi/archelp.mod INSTALL/grub/x86_64-efi/minix2_be.mod INSTALL/grub/x86_64-efi/appleldr.mod INSTALL/grub/x86_64-efi/gcry_md4.mod INSTALL/grub/x86_64-efi/cpio.mod INSTALL/grub/x86_64-efi/gcry_whirlpool.mod INSTALL/grub/x86_64-efi/shim_lock.mod INSTALL/grub/x86_64-efi/adler32.mod INSTALL/grub/x86_64-efi/shift_test.mod INSTALL/grub/x86_64-efi/part_acorn.mod INSTALL/grub/x86_64-efi/gcry_twofish.mod INSTALL/grub/x86_64-efi/raid5rec.mod INSTALL/grub/x86_64-efi/gcry_blowfish.mod INSTALL/grub/x86_64-efi/bfs.mod INSTALL/grub/x86_64-efi/gcry_rsa.mod INSTALL/grub/x86_64-efi/aout.mod INSTALL/grub/x86_64-efi/ahci.mod INSTALL/grub/x86_64-efi/gcry_rfc2268.mod INSTALL/grub/x86_64-efi/pbkdf2_test.mod INSTALL/grub/x86_64-efi/ldm.mod INSTALL/grub/x86_64-efi/part_bsd.mod INSTALL/grub/x86_64-efi/romfs.mod INSTALL/grub/x86_64-efi/gcry_camellia.mod INSTALL/grub/x86_64-efi/verifiers.mod INSTALL/grub/x86_64-efi/lsefimmap.mod INSTALL/grub/x86_64-efi/xnu_uuid.mod INSTALL/grub/x86_64-efi/gcry_tiger.mod INSTALL/grub/x86_64-efi/gcry_crc.mod INSTALL/grub/x86_64-efi/hdparm.mod INSTALL/grub/x86_64-efi/lsacpi.mod INSTALL/grub/x86_64-efi/xnu_uuid_test.mod INSTALL/grub/x86_64-efi/gcry_rijndael.mod INSTALL/grub/x86_64-efi/tr.mod INSTALL/grub/x86_64-efi/zfs.mod INSTALL/grub/x86_64-efi/fixvideo.mod INSTALL/grub/x86_64-efi/backtrace.mod INSTALL/grub/x86_64-efi/tpm.mod INSTALL/grub/x86_64-efi/mdraid1x.mod INSTALL/grub/x86_64-efi/gcry_dsa.mod INSTALL/grub/arm64-efi/normal.mod INSTALL/grub/i386-efi/btrfs.mod INSTALL/grub/i386-efi/random.mod INSTALL/grub/i386-efi/usbtest.mod INSTALL/grub/i386-efi/part_sunpc.mod INSTALL/grub/i386-efi/hello.mod INSTALL/grub/i386-efi/part_amiga.mod INSTALL/grub/i386-efi/loadenv.mod INSTALL/grub/i386-efi/play.mod INSTALL/grub/i386-efi/part_sun.mod INSTALL/grub/i386-efi/loadbios.mod INSTALL/grub/i386-efi/morse.mod INSTALL/grub/i386-efi/mul_test.mod INSTALL/grub/i386-efi/gcry_rmd160.mod INSTALL/grub/i386-efi/gcry_idea.mod INSTALL/grub/i386-efi/minix3_be.mod INSTALL/grub/i386-efi/legacy_password_test.mod INSTALL/grub/i386-efi/usb.mod INSTALL/grub/i386-efi/dm_nv.mod INSTALL/grub/i386-efi/date.mod INSTALL/grub/i386-efi/cryptodisk.mod INSTALL/grub/i386-efi/affs.mod INSTALL/grub/i386-efi/password.mod INSTALL/grub/i386-efi/scsi.mod INSTALL/grub/i386-efi/setpci.mod INSTALL/grub/i386-efi/videotest.mod INSTALL/grub/i386-efi/uhci.mod INSTALL/grub/i386-efi/ata.mod INSTALL/grub/i386-efi/offsetio.mod INSTALL/grub/i386-efi/mdraid09.mod INSTALL/grub/i386-efi/linux16.mod INSTALL/grub/i386-efi/usbserial_pl2303.mod INSTALL/grub/i386-efi/part_dvh.mod INSTALL/grub/i386-efi/signature_test.mod INSTALL/grub/i386-efi/cbtime.mod INSTALL/grub/i386-efi/gcry_sha1.mod INSTALL/grub/i386-efi/gdb.mod INSTALL/grub/i386-efi/zfscrypt.mod INSTALL/grub/i386-efi/iorw.mod INSTALL/grub/i386-efi/time.mod INSTALL/grub/i386-efi/pata.mod INSTALL/grub/i386-efi/setjmp.mod INSTALL/grub/i386-efi/zfsinfo.mod INSTALL/grub/i386-efi/exfctest.mod INSTALL/grub/i386-efi/gcry_sha256.mod INSTALL/grub/i386-efi/eval.mod INSTALL/grub/i386-efi/keylayouts.mod INSTALL/grub/i386-efi/nilfs2.mod INSTALL/grub/i386-efi/bswap_test.mod INSTALL/grub/i386-efi/minix.mod INSTALL/grub/i386-efi/ufs1_be.mod INSTALL/grub/i386-efi/gcry_des.mod INSTALL/grub/i386-efi/functional_test.mod INSTALL/grub/i386-efi/cs5536.mod INSTALL/grub/i386-efi/disk.mod INSTALL/grub/i386-efi/jfs.mod INSTALL/grub/i386-efi/xnu.mod INSTALL/grub/i386-efi/gcry_seed.mod INSTALL/grub/i386-efi/geli.mod INSTALL/grub/i386-efi/hfs.mod INSTALL/grub/i386-efi/cbmemc.mod INSTALL/grub/i386-efi/cmp_test.mod INSTALL/grub/i386-efi/cmdline_cat_test.mod INSTALL/grub/i386-efi/f2fs.mod INSTALL/grub/i386-efi/parttool.mod INSTALL/grub/i386-efi/gptsync.mod INSTALL/grub/i386-efi/lsefi.mod INSTALL/grub/i386-efi/reiserfs.mod INSTALL/grub/i386-efi/hfspluscomp.mod INSTALL/grub/i386-efi/datehook.mod INSTALL/grub/i386-efi/usbserial_usbdebug.mod INSTALL/grub/i386-efi/usbserial_ftdi.mod INSTALL/grub/i386-efi/videotest_checksum.mod INSTALL/grub/i386-efi/search_label.mod INSTALL/grub/i386-efi/usbserial_common.mod INSTALL/grub/i386-efi/raid6rec.mod INSTALL/grub/i386-efi/memdisk.mod INSTALL/grub/i386-efi/ehci.mod INSTALL/grub/i386-efi/lspci.mod INSTALL/grub/i386-efi/progress.mod INSTALL/grub/i386-efi/afs.mod INSTALL/grub/i386-efi/odc.mod INSTALL/grub/i386-efi/strtoull_test.mod INSTALL/grub/i386-efi/pcidump.mod INSTALL/grub/i386-efi/zstd.mod INSTALL/grub/i386-efi/videoinfo.mod INSTALL/grub/i386-efi/gcry_serpent.mod INSTALL/grub/i386-efi/part_plan.mod INSTALL/grub/i386-efi/testload.mod INSTALL/grub/i386-efi/blscfg.mod INSTALL/grub/i386-efi/cpio_be.mod INSTALL/grub/i386-efi/msdospart.mod INSTALL/grub/i386-efi/help.mod INSTALL/grub/i386-efi/testspeed.mod INSTALL/grub/i386-efi/lssal.mod INSTALL/grub/i386-efi/procfs.mod INSTALL/grub/i386-efi/wrmsr.mod INSTALL/grub/i386-efi/bsd.mod INSTALL/grub/i386-efi/mpi.mod INSTALL/grub/i386-efi/test_blockarg.mod INSTALL/grub/i386-efi/usbms.mod INSTALL/grub/i386-efi/gcry_arcfour.mod INSTALL/grub/i386-efi/minix_be.mod INSTALL/grub/i386-efi/legacycfg.mod INSTALL/grub/i386-efi/syslinuxcfg.mod INSTALL/grub/i386-efi/part_dfly.mod INSTALL/grub/i386-efi/ufs2.mod INSTALL/grub/i386-efi/div.mod INSTALL/grub/i386-efi/macho.mod INSTALL/grub/i386-efi/search_fs_uuid.mod INSTALL/grub/i386-efi/cmp.mod INSTALL/grub/i386-efi/ctz_test.mod INSTALL/grub/i386-efi/rdmsr.mod INSTALL/grub/i386-efi/sleep_test.mod INSTALL/grub/i386-efi/minix3.mod INSTALL/grub/i386-efi/minix2.mod INSTALL/grub/i386-efi/luks.mod INSTALL/grub/i386-efi/cbls.mod INSTALL/grub/i386-efi/search_fs_file.mod INSTALL/grub/i386-efi/normal.mod INSTALL/grub/i386-efi/gcry_cast5.mod INSTALL/grub/i386-efi/cbfs.mod INSTALL/grub/i386-efi/keystatus.mod INSTALL/grub/i386-efi/setjmp_test.mod INSTALL/grub/i386-efi/efinet.mod INSTALL/grub/i386-efi/ntfscomp.mod INSTALL/grub/i386-efi/memrw.mod INSTALL/grub/i386-efi/div_test.mod INSTALL/grub/i386-efi/sfs.mod INSTALL/grub/i386-efi/pgp.mod INSTALL/grub/i386-efi/macbless.mod INSTALL/grub/i386-efi/lvm.mod INSTALL/grub/i386-efi/ufs1.mod INSTALL/grub/i386-efi/lsefisystab.mod INSTALL/grub/i386-efi/crc64.mod INSTALL/grub/i386-efi/ohci.mod INSTALL/grub/i386-efi/cpuid.mod INSTALL/grub/i386-efi/multiboot.mod INSTALL/grub/i386-efi/tga.mod INSTALL/grub/i386-efi/elf.mod INSTALL/grub/i386-efi/cbtable.mod INSTALL/grub/i386-efi/probe.mod INSTALL/grub/i386-efi/multiboot2.mod INSTALL/grub/i386-efi/nativedisk.mod INSTALL/grub/i386-efi/spkmodem.mod INSTALL/grub/i386-efi/hexdump.mod INSTALL/grub/i386-efi/mdraid09_be.mod INSTALL/grub/i386-efi/lsmmap.mod INSTALL/grub/i386-efi/archelp.mod INSTALL/grub/i386-efi/minix2_be.mod INSTALL/grub/i386-efi/appleldr.mod INSTALL/grub/i386-efi/gcry_md4.mod INSTALL/grub/i386-efi/cpio.mod INSTALL/grub/i386-efi/gcry_whirlpool.mod INSTALL/grub/i386-efi/adler32.mod INSTALL/grub/i386-efi/shift_test.mod INSTALL/grub/i386-efi/part_acorn.mod INSTALL/grub/i386-efi/gcry_twofish.mod INSTALL/grub/i386-efi/raid5rec.mod INSTALL/grub/i386-efi/gcry_blowfish.mod INSTALL/grub/i386-efi/bfs.mod INSTALL/grub/i386-efi/gcry_rsa.mod INSTALL/grub/i386-efi/aout.mod INSTALL/grub/i386-efi/ahci.mod INSTALL/grub/i386-efi/gcry_rfc2268.mod INSTALL/grub/i386-efi/pbkdf2_test.mod INSTALL/grub/i386-efi/ldm.mod INSTALL/grub/i386-efi/part_bsd.mod INSTALL/grub/i386-efi/romfs.mod INSTALL/grub/i386-efi/gcry_camellia.mod INSTALL/grub/i386-efi/verifiers.mod INSTALL/grub/i386-efi/lsefimmap.mod INSTALL/grub/i386-efi/xnu_uuid.mod INSTALL/grub/i386-efi/gcry_tiger.mod INSTALL/grub/i386-efi/gcry_crc.mod INSTALL/grub/i386-efi/hdparm.mod INSTALL/grub/i386-efi/lsacpi.mod INSTALL/grub/i386-efi/xnu_uuid_test.mod INSTALL/grub/i386-efi/gcry_rijndael.mod INSTALL/grub/i386-efi/tr.mod INSTALL/grub/i386-efi/zfs.mod INSTALL/grub/i386-efi/fixvideo.mod INSTALL/grub/i386-efi/backtrace.mod INSTALL/grub/i386-efi/mdraid1x.mod INSTALL/grub/i386-efi/gcry_dsa.mod INSTALL/grub/i386-pc/btrfs.mod INSTALL/grub/i386-pc/random.mod INSTALL/grub/i386-pc/usbtest.mod INSTALL/grub/i386-pc/fshelp.mod INSTALL/grub/i386-pc/crypto.mod INSTALL/grub/i386-pc/part_sunpc.mod INSTALL/grub/i386-pc/pxechain.mod INSTALL/grub/i386-pc/hello.mod INSTALL/grub/i386-pc/part_amiga.mod INSTALL/grub/i386-pc/loadenv.mod INSTALL/grub/i386-pc/priority_queue.mod INSTALL/grub/i386-pc/play.mod INSTALL/grub/i386-pc/part_sun.mod INSTALL/grub/i386-pc/gcry_sha512.mod INSTALL/grub/i386-pc/morse.mod INSTALL/grub/i386-pc/mul_test.mod INSTALL/grub/i386-pc/gcry_rmd160.mod INSTALL/grub/i386-pc/gcry_idea.mod INSTALL/grub/i386-pc/minix3_be.mod INSTALL/grub/i386-pc/legacy_password_test.mod INSTALL/grub/i386-pc/usb.mod INSTALL/grub/i386-pc/dm_nv.mod INSTALL/grub/i386-pc/cryptodisk.mod INSTALL/grub/i386-pc/truecrypt.mod INSTALL/grub/i386-pc/affs.mod INSTALL/grub/i386-pc/password.mod INSTALL/grub/i386-pc/scsi.mod INSTALL/grub/i386-pc/bitmap_scale.mod INSTALL/grub/i386-pc/setpci.mod INSTALL/grub/i386-pc/uhci.mod INSTALL/grub/i386-pc/ata.mod INSTALL/grub/i386-pc/offsetio.mod INSTALL/grub/i386-pc/mdraid09.mod INSTALL/grub/i386-pc/usbserial_pl2303.mod INSTALL/grub/i386-pc/mmap.mod INSTALL/grub/i386-pc/part_dvh.mod INSTALL/grub/i386-pc/video_fb.mod INSTALL/grub/i386-pc/signature_test.mod INSTALL/grub/i386-pc/pbkdf2.mod INSTALL/grub/i386-pc/cbtime.mod INSTALL/grub/i386-pc/gcry_sha1.mod INSTALL/grub/i386-pc/gdb.mod INSTALL/grub/i386-pc/cmosdump.mod INSTALL/grub/i386-pc/mda_text.mod INSTALL/grub/i386-pc/zfscrypt.mod INSTALL/grub/i386-pc/iorw.mod INSTALL/grub/i386-pc/time.mod INSTALL/grub/i386-pc/pata.mod INSTALL/grub/i386-pc/regexp.mod INSTALL/grub/i386-pc/setjmp.mod INSTALL/grub/i386-pc/zfsinfo.mod INSTALL/grub/i386-pc/exfctest.mod INSTALL/grub/i386-pc/gcry_sha256.mod INSTALL/grub/i386-pc/serial.mod INSTALL/grub/i386-pc/eval.mod INSTALL/grub/i386-pc/freedos.mod INSTALL/grub/i386-pc/keylayouts.mod INSTALL/grub/i386-pc/file.mod INSTALL/grub/i386-pc/nilfs2.mod INSTALL/grub/i386-pc/bswap_test.mod INSTALL/grub/i386-pc/minix.mod INSTALL/grub/i386-pc/ufs1_be.mod INSTALL/grub/i386-pc/gcry_des.mod INSTALL/grub/i386-pc/functional_test.mod INSTALL/grub/i386-pc/cs5536.mod INSTALL/grub/i386-pc/jfs.mod INSTALL/grub/i386-pc/xnu.mod INSTALL/grub/i386-pc/gcry_seed.mod INSTALL/grub/i386-pc/geli.mod INSTALL/grub/i386-pc/setkey.mod INSTALL/grub/i386-pc/part_apple.mod INSTALL/grub/i386-pc/hfs.mod INSTALL/grub/i386-pc/cbmemc.mod INSTALL/grub/i386-pc/cmp_test.mod INSTALL/grub/i386-pc/cmdline_cat_test.mod INSTALL/grub/i386-pc/f2fs.mod INSTALL/grub/i386-pc/parttool.mod INSTALL/grub/i386-pc/acpi.mod INSTALL/grub/i386-pc/gptsync.mod INSTALL/grub/i386-pc/reiserfs.mod INSTALL/grub/i386-pc/hfspluscomp.mod INSTALL/grub/i386-pc/datehook.mod INSTALL/grub/i386-pc/efiemu.mod INSTALL/grub/i386-pc/usbserial_usbdebug.mod INSTALL/grub/i386-pc/usbserial_ftdi.mod INSTALL/grub/i386-pc/search_label.mod INSTALL/grub/i386-pc/usbserial_common.mod INSTALL/grub/i386-pc/raid6rec.mod INSTALL/grub/i386-pc/memdisk.mod INSTALL/grub/i386-pc/ehci.mod INSTALL/grub/i386-pc/pxe.mod INSTALL/grub/i386-pc/progress.mod INSTALL/grub/i386-pc/afs.mod INSTALL/grub/i386-pc/lsapm.mod INSTALL/grub/i386-pc/odc.mod INSTALL/grub/i386-pc/strtoull_test.mod INSTALL/grub/i386-pc/pcidump.mod INSTALL/grub/i386-pc/zstd.mod INSTALL/grub/i386-pc/net.mod INSTALL/grub/i386-pc/gcry_serpent.mod INSTALL/grub/i386-pc/part_plan.mod INSTALL/grub/i386-pc/testload.mod INSTALL/grub/i386-pc/blscfg.mod INSTALL/grub/i386-pc/cpio_be.mod INSTALL/grub/i386-pc/msdospart.mod INSTALL/grub/i386-pc/cat.mod INSTALL/grub/i386-pc/bufio.mod INSTALL/grub/i386-pc/testspeed.mod INSTALL/grub/i386-pc/procfs.mod INSTALL/grub/i386-pc/terminfo.mod INSTALL/grub/i386-pc/wrmsr.mod INSTALL/grub/i386-pc/bsd.mod INSTALL/grub/i386-pc/mpi.mod INSTALL/grub/i386-pc/test_blockarg.mod INSTALL/grub/i386-pc/usbms.mod INSTALL/grub/i386-pc/gcry_arcfour.mod INSTALL/grub/i386-pc/minix_be.mod INSTALL/grub/i386-pc/legacycfg.mod INSTALL/grub/i386-pc/syslinuxcfg.mod INSTALL/grub/i386-pc/part_dfly.mod INSTALL/grub/i386-pc/ufs2.mod INSTALL/grub/i386-pc/div.mod INSTALL/grub/i386-pc/macho.mod INSTALL/grub/i386-pc/search_fs_uuid.mod INSTALL/grub/i386-pc/cmp.mod INSTALL/grub/i386-pc/ctz_test.mod INSTALL/grub/i386-pc/rdmsr.mod INSTALL/grub/i386-pc/cmostest.mod INSTALL/grub/i386-pc/datetime.mod INSTALL/grub/i386-pc/bitmap.mod INSTALL/grub/i386-pc/sleep_test.mod INSTALL/grub/i386-pc/minix3.mod INSTALL/grub/i386-pc/minix2.mod INSTALL/grub/i386-pc/luks.mod INSTALL/grub/i386-pc/cbls.mod INSTALL/grub/i386-pc/plan9.mod INSTALL/grub/i386-pc/search_fs_file.mod INSTALL/grub/i386-pc/gcry_cast5.mod INSTALL/grub/i386-pc/cbfs.mod INSTALL/grub/i386-pc/keystatus.mod INSTALL/grub/i386-pc/setjmp_test.mod INSTALL/grub/i386-pc/ntfscomp.mod INSTALL/grub/i386-pc/memrw.mod INSTALL/grub/i386-pc/div_test.mod INSTALL/grub/i386-pc/sfs.mod INSTALL/grub/i386-pc/pgp.mod INSTALL/grub/i386-pc/macbless.mod INSTALL/grub/i386-pc/lvm.mod INSTALL/grub/i386-pc/ufs1.mod INSTALL/grub/i386-pc/crc64.mod INSTALL/grub/i386-pc/ohci.mod INSTALL/grub/i386-pc/cpuid.mod INSTALL/grub/i386-pc/multiboot.mod INSTALL/grub/i386-pc/tga.mod INSTALL/grub/i386-pc/elf.mod INSTALL/grub/i386-pc/cbtable.mod INSTALL/grub/i386-pc/probe.mod INSTALL/grub/i386-pc/multiboot2.mod INSTALL/grub/i386-pc/nativedisk.mod INSTALL/grub/i386-pc/spkmodem.mod INSTALL/grub/i386-pc/hexdump.mod INSTALL/grub/i386-pc/mdraid09_be.mod INSTALL/grub/i386-pc/lsmmap.mod INSTALL/grub/i386-pc/archelp.mod INSTALL/grub/i386-pc/minix2_be.mod INSTALL/grub/i386-pc/relocator.mod INSTALL/grub/i386-pc/sendkey.mod INSTALL/grub/i386-pc/gcry_md4.mod INSTALL/grub/i386-pc/cpio.mod INSTALL/grub/i386-pc/gcry_whirlpool.mod INSTALL/grub/i386-pc/newc.mod INSTALL/grub/i386-pc/adler32.mod INSTALL/grub/i386-pc/shift_test.mod INSTALL/grub/i386-pc/part_acorn.mod INSTALL/grub/i386-pc/smbios.mod INSTALL/grub/i386-pc/gcry_twofish.mod INSTALL/grub/i386-pc/raid5rec.mod INSTALL/grub/i386-pc/gcry_blowfish.mod INSTALL/grub/i386-pc/diskfilter.mod INSTALL/grub/i386-pc/bfs.mod INSTALL/grub/i386-pc/gcry_rsa.mod INSTALL/grub/i386-pc/aout.mod INSTALL/grub/i386-pc/ahci.mod INSTALL/grub/i386-pc/gcry_rfc2268.mod INSTALL/grub/i386-pc/pbkdf2_test.mod INSTALL/grub/i386-pc/ldm.mod INSTALL/grub/i386-pc/hfsplus.mod INSTALL/grub/i386-pc/part_bsd.mod INSTALL/grub/i386-pc/romfs.mod INSTALL/grub/i386-pc/gcry_camellia.mod INSTALL/grub/i386-pc/verifiers.mod INSTALL/grub/i386-pc/xnu_uuid.mod INSTALL/grub/i386-pc/gcry_tiger.mod INSTALL/grub/i386-pc/gcry_crc.mod INSTALL/grub/i386-pc/hdparm.mod INSTALL/grub/i386-pc/lsacpi.mod INSTALL/grub/i386-pc/xnu_uuid_test.mod INSTALL/grub/i386-pc/gcry_rijndael.mod INSTALL/grub/i386-pc/zfs.mod INSTALL/grub/i386-pc/backtrace.mod INSTALL/grub/i386-pc/gfxterm_menu.mod INSTALL/grub/i386-pc/mdraid1x.mod INSTALL/grub/i386-pc/gcry_dsa.mod INSTALL/grub/mips64el-efi/normal.mod INSTALL/VentoyGUI.i386 INSTALL/VentoyGUI.aarch64 INSTALL/VentoyGUI.mips64el cryptsetup/veritysetup64 cryptsetup/veritysetup32 DMSETUP/dmsetup32 DMSETUP/dmsetup64 DMSETUP/dmsetupaa64 DMSETUP/dmsetupm64e BUSYBOX/chmod/vtchmodm64e BUSYBOX/chmod/vtchmod32 BUSYBOX/chmod/vtchmod64_musl BUSYBOX/chmod/vtchmod64 BUSYBOX/chmod/vtchmodaa64 LZIP/lz4catm64e LZIP/lz4cataa64 LZIP/lunzip32 LZIP/lunzipaa64 LZIP/lunzip64 LZIP/lz4cat64 FUSEISO/vtoy_fuse_iso_64 FUSEISO/vtoy_fuse_iso_32 FUSEISO/vtoy_fuse_iso_aa64 Unix/ventoy_unix/DragonFly/sbin/init Unix/ventoy_unix/DragonFly/sbin/dmsetup ``` We can immediately spot that there's 3 sets of GRUB present: - `INSTALL/grub/i386-efi` - `INSTALL/grub/i386-pc` - `INSTALL/grub/x86_64-efi` Further snooping shows that there's in fact, more: - `INSTALL/grub/arm64-efi` - `INSTALL/grub/mips64el-efi` They just escaped this rudimentary method of identification, because they are compressed: ``` $ file INSTALL/grub/arm64-efi/adler32.mod INSTALL/grub/mips64el-efi/adler32.mod INSTALL/grub/arm64-efi/adler32.mod: XZ compressed data, checksum CRC64 INSTALL/grub/mips64el-efi/adler32.mod: XZ compressed data, checksum CRC64 ``` So the first thing in our bill of materials is GRUB, for i386-pc, i386-efi, x86_64-efi, arm64-efi, and mips64el-efi. Next we have all kinds of crap in: - `IMG/cpio_x86/ventoy/tool` - `IMG/cpio_x86/ventoy/busybox` - `IMG/cpio_arm64/ventoy/tool` - `IMG/cpio_arm64/ventoy/busybox` - `IMG/cpio_mips64/ventoy/tool` - `IMG/cpio_mips64/ventoy/busybox` First thing I noticed when browsing these directories is a kernel module: ``` $ modinfo IMG/cpio_x86/ventoy/tool/dm_patch_32.ko filename: IMG/cpio_x86/ventoy/tool/dm_patch_32.ko license: GPL author: longpanda <admin@ventoy.net> description: dmpatch driver depends: retpoline: Y intree: Y name: dm_patch vermagic: 5.10.84-xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx SMP mod_unload modversions 686 ``` I'm not entirely sure why is a kernel module needed... here's the source for it: https://github.com/ventoy/Ventoy/blob/c16e76130bf34fd2e0b749cd7a71789c9115783b/DMPATCH/dmpatch.c The use case is described here: https://github.com/ventoy/Ventoy/blob/c16e76130bf34fd2e0b749cd7a71789c9115783b/DMPATCH/readme.txt#L33 I'm really unconvinced that this is needed. Moving on, let's see what tools are exactly located in the `IMG` directory: ``` find IMG/*/ventoy/busybox -type f | awk -F '/' '{print $5}' | sed 's/\.xz$//' | sort -u ``` which brings us to: ``` 64h a64 ash busybox32 busybox64 busyboxaa64 busyboxm64e m64 vtchmod32 vtchmod64 vtchmod64_musl vtchmodaa64 vtchmodm64e xzcat32_musl xzcat64_musl xzminidec32 xzminidec64 xzminidec64_musl xzminidecaa64 xzminidecm64e ``` Some of those commands I recognize: - xzcat - xzdec - chmod (why is it called vtchmod? src: https://github.com/ventoy/Ventoy/blob/1f49265f29459295bc1b66c53da3de9e99a9370e/BUSYBOX/chmod/vtchmod.c (seems pretty silly, but benign) - busybox - ash I'm completely lost wtf is `a64` and `m64`. Whoever made them, didn't bother putting any license info, program name, or disclaimer in the strings. I'm tired. This is an incredible case, but one that I'm not taking a vacation from life over.
Author
Owner

@mpeter50 commented on GitHub (Sep 26, 2024):

Based on a comment above, a64 and m64 seem to be ARM64 and MIPS64 versions of the ash shell.

Or busybox as running linux strings on it shows among others these:

  • BusyBox v1.32.0 (2021-03-04 12:59:59 CST)
  • built-in shell (ash)
@mpeter50 commented on GitHub (Sep 26, 2024): Based on [a comment above](https://github.com/ventoy/Ventoy/issues/2795#issuecomment-2271501712), `a64` and `m64` seem to be ARM64 and MIPS64 versions of the ash shell. _Or busybox_ as running linux `strings` on it shows among others these: - `BusyBox v1.32.0 (2021-03-04 12:59:59 CST)` - `built-in shell (ash)`
Author
Owner

@mpeter50 commented on GitHub (Sep 26, 2024):

Also, to make it easier for anyone to see which files are the same ones, Czkawka is quite useful.

I have attached a text file with duplicates in the repo directory, so that you dont need to use it:
results_duplicates.txt

@mpeter50 commented on GitHub (Sep 26, 2024): Also, to make it easier for anyone to see which files are the same ones, [Czkawka](https://github.com/qarmin/czkawka) is quite useful. I have attached a text file with duplicates in the repo directory, so that you dont need to use it: [results_duplicates.txt](https://github.com/user-attachments/files/17156150/results_duplicates.txt)
Author
Owner

@http403 commented on GitHub (Oct 13, 2024):

A person seems to be the author replies, but in the wrong place. I can't confirm is he really the author.

https://lemmings.world/post/15186261

Dear community,

I hope this message finds you well. I want to take a moment to address the concerns raised in Issue #2795 regarding the BLOB functionality in our app. First and foremost, I sincerely apologize for any confusion or frustration this may have caused. I was on vacation during this time, and I understand that my absence may have contributed to the lack of clarity surrounding this issue.

The BLOB feature is an important aspect of our app, and I recognize that the documentation surrounding it has not been as clear as it should be. I appreciate your patience as we work through these challenges, and I want to assure you that I am fully committed to resolving this matter.

As I return to work, I will prioritize updating the documentation to provide a comprehensive understanding of how the BLOB functionality works. I will also investigate the specific concerns raised in Issue #2795 to ensure that any underlying issues are addressed promptly.

Your trust in our software is paramount, and I am dedicated to regaining any confidence that may have been affected by this situation. I am confident that, with your continued support and feedback, we can enhance the app and provide a better experience for all users.

Thank you for your understanding and for being a part of our community. I look forward to sharing updates with you soon as we work towards improving our app and its documentation.

Warm regards,
longpanda

@http403 commented on GitHub (Oct 13, 2024): A person seems to be the author replies, but in the wrong place. I can't confirm is he really the author. https://lemmings.world/post/15186261 > Dear community, > > I hope this message finds you well. I want to take a moment to address the concerns raised in Issue #2795 regarding the BLOB functionality in our app. First and foremost, I sincerely apologize for any confusion or frustration this may have caused. I was on vacation during this time, and I understand that my absence may have contributed to the lack of clarity surrounding this issue. > > The BLOB feature is an important aspect of our app, and I recognize that the documentation surrounding it has not been as clear as it should be. I appreciate your patience as we work through these challenges, and I want to assure you that I am fully committed to resolving this matter. > > As I return to work, I will prioritize updating the documentation to provide a comprehensive understanding of how the BLOB functionality works. I will also investigate the specific concerns raised in Issue #2795 to ensure that any underlying issues are addressed promptly. > > Your trust in our software is paramount, and I am dedicated to regaining any confidence that may have been affected by this situation. I am confident that, with your continued support and feedback, we can enhance the app and provide a better experience for all users. > > Thank you for your understanding and for being a part of our community. I look forward to sharing updates with you soon as we work towards improving our app and its documentation. > > Warm regards, > longpanda
Author
Owner

@grepwood commented on GitHub (Oct 13, 2024):

https://lemmings.world

This is the first time I see this address. Not a good place to write something that should be read by many people.

@grepwood commented on GitHub (Oct 13, 2024): > https://lemmings.world This is the first time I see this address. Not a good place to write something that should be read by many people.
Author
Owner

@robertkirkman commented on GitHub (Oct 13, 2024):

https://lemmings.world

This is the first time I see this address. Not a good place to issue write something that should be read by many people.

a couple of points:

  • that post is definitely not by the real creator of ventoy
  • on the other hand, lemmy is an open source replacement to reddit because reddit is extremely controversial and drove users away. therefore you should respect lemmy as the leading open source alternative to reddit.
@robertkirkman commented on GitHub (Oct 13, 2024): > > https://lemmings.world > > This is the first time I see this address. Not a good place to issue write something that should be read by many people. a couple of points: - that post is definitely not by the real creator of ventoy - on the other hand, lemmy is an open source replacement to reddit because [reddit is extremely controversial and drove users away](https://en.wikipedia.org/wiki/Reddit#Controversies). therefore you should respect lemmy as the leading open source alternative to reddit.
Author
Owner

@KucharczykL commented on GitHub (Oct 13, 2024):

His post does not address anything at all (and it looks to be written by AI).

@KucharczykL commented on GitHub (Oct 13, 2024): His post does not address anything at all (and it looks to be written by AI).
Author
Owner

@grepwood commented on GitHub (Oct 13, 2024):

on the other hand, lemmy is an open source replacement to reddit because reddit is extremely controversial and drove users away. therefore you should respect lemmy as the leading open source alternative to reddit.

I appreciate, it's no small feat to build such a thing. But I'll stay away because I generally don't like social platforms. It's a huge time sink.

@grepwood commented on GitHub (Oct 13, 2024): > on the other hand, lemmy is an open source replacement to reddit because [reddit is extremely controversial and drove users away](https://en.wikipedia.org/wiki/Reddit#Controversies). therefore you should respect lemmy as the leading open source alternative to reddit. I appreciate, it's no small feat to build such a thing. But I'll stay away because I generally don't like social platforms. It's a huge time sink.
Author
Owner

@mpeter50 commented on GitHub (Oct 13, 2024):

There is a new response from someone who claims to be the real developer's friend:

I am longpanda’s friend and colleague. We used to work together and we go way back. I had lost contact with him several months ago. I still haven’t heard from him until now. This post confused me, because longpanda never writes in English. I helped him with the translations in the past. longpanda is a great comrade, who loves his country deeply and has always followed in the footsteps of the great leader, his loyalty and dedication are truly admirable. I hope he is alroght.

我是longpanda的朋友和同事,我们曾经一起工作,但几个月前我们就失去了联系。直到现在,我仍然没有他的任何消息。看到这篇帖子,我感到很奇怪,因为我知道longpanda不可能是写这篇帖子的,他从来不用英语写东西,过去我都是帮他翻译的。 longpanda是一位伟大的同志,他深爱着自己的祖国,始终坚定地跟随伟大领袖的脚步,他的忠诚和奉献精神令人钦佩。我希望他一切安好。

longpanda如果你看到这条消息,请尽快联系我。

Source: https://lemmings.world/comment/11306760

I don't know if what they tell is true, but there are a few things to consider:

  • this is really not the style the real Ventoy dev used to write in english. if you have read the documentation you'll know they are not good at it like this
  • if the post's writer is the dev, why didnt they write here?
  • both of the accounts were registered on the lemmings.world lemmy instance, but the instance is at least a year old, with other active users
  • the longpanda account was registered 9 hours ago, and the friend wangshu's account was registered 3 hours ago. both have multiple comments by now
  • the longpanda account has responded to a former lemmy discussion of this github issue here, before creating the new post
@mpeter50 commented on GitHub (Oct 13, 2024): There is a new response from someone who claims to be the real developer's friend: > I am longpanda’s friend and colleague. We used to work together and we go way back. I had lost contact with him several months ago. I still haven’t heard from him until now. This post confused me, because longpanda never writes in English. I helped him with the translations in the past. longpanda is a great comrade, who loves his country deeply and has always followed in the footsteps of the great leader, his loyalty and dedication are truly admirable. I hope he is alroght. > > 我是longpanda的朋友和同事,我们曾经一起工作,但几个月前我们就失去了联系。直到现在,我仍然没有他的任何消息。看到这篇帖子,我感到很奇怪,因为我知道longpanda不可能是写这篇帖子的,他从来不用英语写东西,过去我都是帮他翻译的。 longpanda是一位伟大的同志,他深爱着自己的祖国,始终坚定地跟随伟大领袖的脚步,他的忠诚和奉献精神令人钦佩。我希望他一切安好。 > > longpanda如果你看到这条消息,请尽快联系我。 Source: https://lemmings.world/comment/11306760 I don't know if what they tell is true, but there are a few things to consider: - this is really not the style the real Ventoy dev used to write in english. if you have read [the documentation](https://www.ventoy.net/en/doc_start.html) you'll know they are not good at it like this - if the post's writer is the dev, why didnt they write here? - both of the accounts were registered on the lemmings.world lemmy instance, but the instance is at least [a year old](https://lemmy.fediverse.observer/lemmings.world), with other active users - [the longpanda account](https://lemmings.world/u/longpanda) was registered 9 hours ago, and [the friend wangshu](https://lemmings.world/u/wangshu)'s account was registered 3 hours ago. both have multiple comments by now - the longpanda account has responded to a former lemmy discussion of this github issue [here](https://lemmy.world/comment/12859428), before creating the new post
Author
Owner

@nehemiagurl commented on GitHub (Oct 13, 2024):

I'd consider both those accounts to be untrustworthy for now. I think the safe assumption is we're still in the dark when it comes to an answer.
if somehow either of these accounts prove the truth of their identity, that would be welcome. but until that happens, let's assume they're both pretenders.

@nehemiagurl commented on GitHub (Oct 13, 2024): I'd consider both those accounts to be untrustworthy for now. I think the safe assumption is we're still in the dark when it comes to an answer. if somehow either of these accounts prove the truth of their identity, that would be welcome. but until that happens, let's assume they're both pretenders.
Author
Owner

@grepwood commented on GitHub (Oct 13, 2024):

Both of those accounts are LARPing. If @ventoy wanted to clarify anything, they'd do it in this thread, not on barely known Reddit clone.

@grepwood commented on GitHub (Oct 13, 2024): Both of those accounts are LARPing. If @ventoy wanted to clarify anything, they'd do it in this thread, not on barely known Reddit clone.
Author
Owner

@http403 commented on GitHub (Oct 13, 2024):

The posts/comments and the account made them are now removed by mods under probable impersonation.

https://lemmy.ml/modlog?page=1&actionType=All&userId=14359241

@http403 commented on GitHub (Oct 13, 2024): The posts/comments and the account made them are now removed by mods under probable impersonation. https://lemmy.ml/modlog?page=1&actionType=All&userId=14359241
Author
Owner

@sswangshu commented on GitHub (Oct 14, 2024):

Hello, I have been following the posts about longpanda and after the original post was taken down, I am heading here. Like everyone here, I am in the dark of what had happened. As I mentioned in my comment, I lost contact with longpanda for sevearl months. I am worried. I have no ideas who wrote that post, who was behind this and what happened to longpanda 🙏🙏

@sswangshu commented on GitHub (Oct 14, 2024): Hello, I have been following the posts about longpanda and after the original post was taken down, I am heading here. Like everyone here, I am in the dark of what had happened. As I mentioned in my comment, I lost contact with longpanda for sevearl months. I am worried. I have no ideas who wrote that post, who was behind this and what happened to longpanda 🙏🙏
Author
Owner

@grepwood commented on GitHub (Oct 14, 2024):

@ventoy was last seen on June 8th when committing github.com/ventoy/Ventoy@cb209f9b9e. This issue was filed on April 3rd. These dates are 35 days apart. Maybe communication on such a serious issue was not high on list of priorities. Edit: there are 14 commits in that frame of time.

@grepwood commented on GitHub (Oct 14, 2024): @ventoy was last seen on June 8th when committing https://github.com/ventoy/Ventoy/commit/cb209f9b9e02f3fb3a09a6e88d49bcef9f95511f. This issue was filed on April 3rd. These dates are 35 days apart. Maybe communication on such a serious issue was not high on list of priorities. Edit: there are 14 commits in that frame of time.
Author
Owner

@sswangshu commented on GitHub (Oct 14, 2024):

Thank you, the last time I talked to him was before the labour day. He told me he would travel back home for a few weeks.

@sswangshu commented on GitHub (Oct 14, 2024): Thank you, the last time I talked to him was before the labour day. He told me he would travel back home for a few weeks.
Author
Owner

@github2099 commented on GitHub (Oct 14, 2024):

@ventoy activities on the Ventoy Forum align with the release schedules

Screenshot3

Even though @ventoy is absent on Github, last visit on the Forum was October 8, strange eh?

Screenshot1

Screenshot2

@github2099 commented on GitHub (Oct 14, 2024): @ventoy activities on the Ventoy Forum align with the release schedules ![Screenshot3](https://github.com/user-attachments/assets/b5be53a8-63cb-4855-9eab-296989258fa7) Even though @ventoy is absent on Github, last visit on the Forum was October 8, strange eh? ![Screenshot1](https://github.com/user-attachments/assets/b43ca24c-b093-43fb-8820-70fa0257d2f1) ![Screenshot2](https://github.com/user-attachments/assets/90ef3bc6-aa65-4d1b-a645-c49669f0a0fe)
Author
Owner

@http403 commented on GitHub (Oct 14, 2024):

It would be best not to discuss @ventoy whereabout here, as this should be focused on the issue itself. Such topics is better suited in the forum, or Discussion tab.

@http403 commented on GitHub (Oct 14, 2024): It would be best not to discuss @ventoy whereabout here, as this should be focused on the issue itself. Such topics is better suited in the forum, or Discussion tab.
Author
Owner

@Casered commented on GitHub (Nov 16, 2024):

There's been some new @ventoy GitHub activity today, so hopefully he can answer soon! 😊

@Casered commented on GitHub (Nov 16, 2024): There's been some new @ventoy GitHub activity today, so hopefully he can answer soon! 😊
Author
Owner

@sswangshu commented on GitHub (Nov 17, 2024):

@Casered glad to hear!

@sswangshu commented on GitHub (Nov 17, 2024): @Casered glad to hear!
Author
Owner

@xcpn commented on GitHub (Nov 20, 2024):

Every once in a while I remember about this Issue thread and pass by to see if the developer answered any concerns.

And every single time I get more anxious reading new replies and no answers!

@xcpn commented on GitHub (Nov 20, 2024): Every once in a while I remember about this Issue thread and pass by to see if the developer answered any concerns. And every single time I get more anxious reading new replies and no answers!
Author
Owner

@TechnologyClassroom commented on GitHub (Nov 20, 2024):

If you find yourself spending hours actively waiting on this issue, work on this issue. There is enough information in this thread to figure it out, assemble a patch, and submit a pull request.

@TechnologyClassroom commented on GitHub (Nov 20, 2024): If you find yourself spending hours actively waiting on this issue, work on this issue. There is enough information in this thread to figure it out, assemble a patch, and submit a pull request.
Author
Owner

@grepwood commented on GitHub (Nov 20, 2024):

What's exactly the use case for Ventoy? dd'ing an installer image to a USB drive has worked perfectly fine since BIOSes could boot from USB drives.

@grepwood commented on GitHub (Nov 20, 2024): What's exactly the use case for Ventoy? dd'ing an installer image to a USB drive has worked perfectly fine since BIOSes could boot from USB drives.
Author
Owner

@Joseph-DiGiovanni commented on GitHub (Nov 20, 2024):

@grepwood this is not the place to be asking unrelated questions, especially ones with such an obvious answer. There is enough useless noise in this thread.

@Joseph-DiGiovanni commented on GitHub (Nov 20, 2024): @grepwood this is not the place to be asking unrelated questions, especially ones with such an obvious answer. There is enough useless noise in this thread.
Author
Owner

@arisudesu commented on GitHub (Nov 20, 2024):

Enough flooding the issue with pointless "waiting" comments. You only light up notifications icon, not contribute anything.

What's exactly the use case for Ventoy? dd'ing an installer image to a USB drive has worked perfectly fine since BIOSes could boot from USB drives.

Judging from your previous comments in the issue: are you a troll? In either case, Ventoy is a tool to select and boot ISOs from removable media filesystem, which is not the same as writing one image to a USB drive.

@arisudesu commented on GitHub (Nov 20, 2024): Enough flooding the issue with pointless "waiting" comments. You only light up notifications icon, not contribute anything. >What's exactly the use case for Ventoy? dd'ing an installer image to a USB drive has worked perfectly fine since BIOSes could boot from USB drives. Judging from your previous comments in the issue: are you a troll? In either case, Ventoy is a tool to select and boot ISOs from removable media filesystem, which is not the same as writing one image to a USB drive.
Author
Owner

@grepwood commented on GitHub (Nov 20, 2024):

are you a troll?

I contributed a lot to this issue. Can you say the same?

@grepwood commented on GitHub (Nov 20, 2024): >are you a troll? [I contributed a lot to this issue. Can you say the same?](https://github.com/ventoy/Ventoy/issues/2795#issuecomment-2327025032)
Author
Owner

@Joseph-DiGiovanni commented on GitHub (Nov 20, 2024):

@grepwood you went to a seemingly random issue to ask a question which is answered in the second sentence of the project readme and you think because you've made a helpful comment in the past you shouldn't be labeled a troll?

@Joseph-DiGiovanni commented on GitHub (Nov 20, 2024): @grepwood you went to a seemingly random issue to ask a question which is answered in the second sentence of the project readme and you think because you've made a helpful comment in the past you shouldn't be labeled a troll?
Author
Owner

@grepwood commented on GitHub (Nov 20, 2024):

obraz

I spent a lot of time doing that research and never asked for anything in return, and this is what I get. Well, have fun looking for vulnerabilities in Ventoy. I'm leaving this thread.

@grepwood commented on GitHub (Nov 20, 2024): ![obraz](https://github.com/user-attachments/assets/d9129ecf-10f1-4ae6-90bc-c4b238a13c0c) I spent a lot of time doing that research and never asked for anything in return, and this is what I get. Well, have fun looking for vulnerabilities in Ventoy. I'm leaving this thread.
Author
Owner

@arisudesu commented on GitHub (Nov 20, 2024):

@grepwood wow, a single useful message. Well, I did the same in my one and only comment in this issue by answering to you what Ventoy is. You, however, did not mention your past comments stating:

Windows is the malware.

On Windows, let them eat cake.

This is a borderline trolling. Also, if you're versed about what Ventoy consists of, why are you asking something like "What's exactly the use case for Ventoy?", you already know it or you can spend some time to figure it out. You have enough technical knowledge to judge what single binaries do, but you can't understand what Ventoy does as a whole and you're asking it after you did prior research on Ventoy contents? Weird. What did you even research?

@arisudesu commented on GitHub (Nov 20, 2024): @grepwood wow, a single useful message. Well, I did the same in my one and only comment in this issue by answering to you what Ventoy is. You, however, did not mention your past comments stating: > Windows is the malware. > On Windows, let them eat cake. This is a borderline trolling. Also, if you're versed about what Ventoy consists of, why are you asking something like "What's exactly the use case for Ventoy?", you already know it or you can spend some time to figure it out. You have enough technical knowledge to judge what single binaries do, but you can't understand what Ventoy does as a whole __and__ you're asking it __after__ you did prior research on Ventoy contents? Weird. What did you even research?
Author
Owner

@youk commented on GitHub (Nov 20, 2024):

Would all please shut the fuck up?

@youk commented on GitHub (Nov 20, 2024): Would all please shut the fuck up?
Author
Owner

@mathmakgakpak commented on GitHub (Nov 26, 2024):

First a forum senior member has said this: https://forums.ventoy.net/showthread.php?tid=2965&pid=8695#pid8695
1
and later longpanda wrote this https://forums.ventoy.net/showthread.php?tid=2982&pid=8750#pid8750
2

@mathmakgakpak commented on GitHub (Nov 26, 2024): First a forum senior member has said this: https://forums.ventoy.net/showthread.php?tid=2965&pid=8695#pid8695 ![1](https://github.com/user-attachments/assets/6571d0c0-ff46-4538-9c85-ea67c7782dd2) and later longpanda wrote this https://forums.ventoy.net/showthread.php?tid=2982&pid=8750#pid8750 ![2](https://github.com/user-attachments/assets/c0b0e2af-8148-42f1-9cd3-7937e1e20cc5)
Author
Owner

@ShalokShalom commented on GitHub (Jan 7, 2025):

There is an alternative

https://github.com/thias/glim

@ShalokShalom commented on GitHub (Jan 7, 2025): There is an alternative https://github.com/thias/glim
Author
Owner

@mian196 commented on GitHub (Feb 10, 2025):

so, does this gets resolved or nah ?

@mian196 commented on GitHub (Feb 10, 2025): so, does this gets resolved or nah ?
Author
Owner

@M-Reimer commented on GitHub (Feb 10, 2025):

Honestly not getting any response here feels incredibly suspicious. I wonder why noone, with interest in this issue, has started a fork, delete ALL binaries from it and add some way to auto build them all to the build system.

@M-Reimer commented on GitHub (Feb 10, 2025): Honestly not getting any response here feels incredibly suspicious. I wonder why noone, with interest in this issue, has started a fork, delete ALL binaries from it and add some way to auto build them all to the build system.
Author
Owner

@dzek69 commented on GitHub (Feb 10, 2025):

I wonder why noone, with interest in this issue, has started a fork, delete ALL binaries from it and add some way to auto build them all to the build system.

Probably because of the same exact reason you did not do that 😊

@dzek69 commented on GitHub (Feb 10, 2025): > I wonder why noone, with interest in this issue, has started a fork, delete ALL binaries from it and add some way to auto build them all to the build system. Probably because of the same exact reason you did not do that 😊
Author
Owner

@Aera23 commented on GitHub (Feb 11, 2025):

There is already instructions for building DMSETUP
github.com/ventoy/Ventoy@3f65f0ef03/DMSETUP/build.txt

@Aera23 commented on GitHub (Feb 11, 2025): There is already instructions for building DMSETUP https://github.com/ventoy/Ventoy/blob/3f65f0ef03e4aebcd14f233ca808a4f894657802/DMSETUP/build.txt
Author
Owner

@floweringnights commented on GitHub (Mar 7, 2025):

First a forum senior member has said this: https://forums.ventoy.net/showthread.php?tid=2965&pid=8695#pid8695 1 and later longpanda wrote this https://forums.ventoy.net/showthread.php?tid=2982&pid=8750#pid8750 2

now that 1.1 is out, what next? any responses from the creator himself about the issue yet?
and before anyone replies that I should contribute or whatever: I'm not a programmer, I cannot code, and it seems people in here don't really like financial contributions after when the issue is addressed.

@floweringnights commented on GitHub (Mar 7, 2025): > First a forum senior member has said this: https://forums.ventoy.net/showthread.php?tid=2965&pid=8695#pid8695 ![1](https://github.com/user-attachments/assets/6571d0c0-ff46-4538-9c85-ea67c7782dd2) and later longpanda wrote this https://forums.ventoy.net/showthread.php?tid=2982&pid=8750#pid8750 ![2](https://github.com/user-attachments/assets/c0b0e2af-8148-42f1-9cd3-7937e1e20cc5) now that 1.1 is out, what next? any responses from the creator himself about the issue yet? and before anyone replies that I should contribute or whatever: I'm not a programmer, I cannot code, and it seems people in here don't really like financial contributions _after_ when the issue is addressed.
Author
Owner

@Fredolx commented on GitHub (Mar 9, 2025):

If you want this changed, you should fork it. There's nothing bad in having a fork. Call it SafeVentoy or something. The community will be grateful. Whether or not Longpanda accepts a PR doesn't really matter, it would simply be his loss.

@Fredolx commented on GitHub (Mar 9, 2025): If you want this changed, you should fork it. There's nothing bad in having a fork. Call it SafeVentoy or something. The community will be grateful. Whether or not Longpanda accepts a PR doesn't really matter, it would simply be his loss.
Author
Owner

@gk-devhub commented on GitHub (Mar 11, 2025):

If you have security concerns about Ventoy or any other single- or multi-boot usb pendrive setup methods, or if you're just interested in a quick and easy multi-boot installer setup without using any 3rd-party tools, then you should check out this alternative multi-boot setup method that I just published.

Windows and Linux multi-boot USB installer setup without using Ventoy

It covers typical everyday use cases and it's VERIFIABLY CLEAN as it doesn't use any 3rd-party tools, binary blobs or modified executables. All executables are coming directly from the official Linux and Windows installer iso's. No 3rd party executables.

@gk-devhub commented on GitHub (Mar 11, 2025): If you have security concerns about Ventoy or any other single- or multi-boot usb pendrive setup methods, or if you're just interested in a quick and easy multi-boot installer setup without using any 3rd-party tools, then you should check out this **alternative multi-boot setup method** that I just published. [Windows and Linux multi-boot USB installer setup without using Ventoy](https://github.com/gk-devhub/usb_multiboot_pendrive) It covers typical everyday use cases and it's **VERIFIABLY CLEAN** as **it doesn't use any 3rd-party tools, binary blobs or modified executables**. All executables are coming directly from the official Linux and Windows installer iso's. No 3rd party executables.
Author
Owner

@dzek69 commented on GitHub (Mar 11, 2025):

@gk-devhub it's nice to have an alternative, but this is FAR from being Ventoy alternative. It's just a rather tedious way to multi boot from a single pendrive, but without support for any real advantages of Ventoy

@dzek69 commented on GitHub (Mar 11, 2025): @gk-devhub it's nice to have an alternative, but this is FAR from being Ventoy alternative. It's just a rather tedious way to multi boot from a single pendrive, but without support for any real advantages of Ventoy
Author
Owner

@gk-devhub commented on GitHub (Mar 11, 2025):

@dzek69

but this is FAR from being Ventoy alternative.

I never said that it was. At least, not in the sense that you're implying (i.e. as some kind of equivalent or comparable replacement). I only said that it's an alternative multi-boot setup method. That's not the same thing.

Any multi-boot setup method is an alternative to any other multi-boot setup method. Some are better alternatives and some are worse.

All of them have their pros and cons and their tradeoffs and limitations. In fact, I state some of those limitations in the readme file.

So this method is not supposed to replace Ventoy or compete with it. That's NOT its purpose.

Its purpose is to address the "security concerns" angle. Which is why I posted it here on this thread.

The basic idea here is that if you wanna use Ventoy, but you're uneasy about the potential security issues as discussed by others on this thread, and your use case is simple enough, then you can use this alternative method that is verifiably clean, covers your use case and easy to setup.

Nothing more and nothing less. It's not a competitor to Ventoy and it was not intended to be.

It's just an alternative that people, depending on their security stance and use cases, might be able to use to give them peace of mind with respect to security.

That's all. Simple as that.

rather tedious way to multi boot from a single pendrive,

You can literally carry out all those steps in 10 minutes to set up the multi-boot pendrive. And "10 minutes" does NOT qualify as "tedious". Especially not in the context of a setup task in a linux environment;) Yes, it's not drag-and-drop. But it's far from being tedious.

@gk-devhub commented on GitHub (Mar 11, 2025): @dzek69 > but this is FAR from being Ventoy alternative. I never said that it was. At least, not in the sense that you're implying (i.e. as some kind of equivalent or comparable replacement). I only said that it's an alternative multi-boot setup method. That's not the same thing. Any multi-boot setup method is an alternative to any other multi-boot setup method. Some are better alternatives and some are worse. All of them have their pros and cons and their tradeoffs and limitations. In fact, I state some of those limitations in the readme file. So this method is not supposed to replace Ventoy or compete with it. That's NOT its purpose. **Its purpose is to address the "security concerns" angle**. Which is why I posted it here on this thread. The basic idea here is that if you wanna use Ventoy, but you're uneasy about the potential security issues as discussed by others on this thread, and your use case is simple enough, then you can use this alternative method that is **verifiably clean**, covers your use case and easy to setup. Nothing more and nothing less. It's not a competitor to Ventoy and it was not intended to be. It's just an alternative that people, depending on their security stance and use cases, might be able to use to **give them peace of mind with respect to security**. That's all. Simple as that. > rather tedious way to multi boot from a single pendrive, You can literally carry out all those steps in 10 minutes to set up the multi-boot pendrive. And "10 minutes" does NOT qualify as "tedious". Especially not in the context of a setup task in a linux environment;) Yes, it's not drag-and-drop. But it's far from being tedious.
Author
Owner

@youk commented on GitHub (Mar 11, 2025):

alternative multi-boot setup method

I never said that it was.

You should really make up your mind about what you are selling here.

And "10 minutes" does NOT qualify as "tedious"

Yes it does. And it is obviously not for you to decide what other users might consider tedious. If you really care about something not tedious, think about providing a script. The positive side effect would be the absence of funny screenshots.

Especially not in the context of a setup task in a linux environment

With modern live/immutable Linux distros I don't even spend much time on setting up the entire OS. Let alone spending time on "setup tasks". Have more productive things to do.

@youk commented on GitHub (Mar 11, 2025): > alternative multi-boot setup method > I never said that it was. You should really make up your mind about what you are selling here. > And "10 minutes" does NOT qualify as "tedious" Yes it does. And it is obviously not for you to decide what other users might consider tedious. If you really care about something not tedious, think about providing a script. The positive side effect would be the absence of funny screenshots. > Especially not in the context of a setup task in a linux environment With modern live/immutable Linux distros I don't even spend much time on setting up the entire OS. Let alone spending time on "setup tasks". Have more productive things to do.
Author
Owner

@fnr1r commented on GitHub (Mar 24, 2025):

Working on it. (at least for Linux)

@fnr1r commented on GitHub (Mar 24, 2025): Working on it. (at least for Linux)
Author
Owner

@erikschul commented on GitHub (Mar 24, 2025):

@fnr1r I'll believe it when the PR is merged into the main branch and not present in the releases.

@erikschul commented on GitHub (Mar 24, 2025): @fnr1r I'll believe it when the PR is merged into the main branch and not present in the releases.
Author
Owner

@fnr1r commented on GitHub (Mar 24, 2025):

@erikschul The thing is... The Ventoy's build system is so annoying that I'm also rewriting the build system.

If anyone's interested, my work is here: https://github.com/fnr1r/ventoy-cpio

@fnr1r commented on GitHub (Mar 24, 2025): @erikschul The thing is... The Ventoy's build system is so annoying that I'm also rewriting the build system. If anyone's interested, my work is here: https://github.com/fnr1r/ventoy-cpio
Author
Owner

@erikschul commented on GitHub (Mar 24, 2025):

@fnr1r Good idea. Maybe document your findings so it's easier to onboard other people on maintaining the project.

And focus on making it trivial to make reproducible builds so the community can identify issues early.

Ventoy is a critical tool that can unfortunately inject malware at root level, so I'm surprised that people even use it. It's a very dangerous tool in that we just can't be sure that it doesn't contain malware. It should ideally be entirely free of dependencies and have a minimal codebase that is easily reviewable.

@erikschul commented on GitHub (Mar 24, 2025): @fnr1r Good idea. Maybe document your findings so it's easier to onboard other people on maintaining the project. And focus on making it trivial to make reproducible builds so the community can identify issues early. Ventoy is a critical tool that can unfortunately inject malware at root level, so I'm surprised that people even use it. It's a very dangerous tool in that we just can't be sure that it doesn't contain malware. It should ideally be entirely free of dependencies and have a minimal codebase that is easily reviewable.
Author
Owner

@dzek69 commented on GitHub (Mar 24, 2025):

Ventoy is a critical tool that can unfortunately inject malware at root level, so I'm surprised that people even use it.

It could but it can be verified by doing the installation with and without Ventoy and comparing the disk contents. If Ventoy would inject malware for everyone - I'd be way too obvious and would create a backlash. If that would be random but too frequently and people would notice too.

So what's left? Targeted attacks - picking just the best targets (but how do you do that on a installation medium step? Maybe by looking at CPU, determining if it's a server CPU or "home use" CPU), and doing it at random, but not too frequently. Here you can avoid detection for some time.

While it's possible I think the risk is so low, that not much people care.

Also I bet 99,9% of the people just does not acknowledge the fact at all. They just found someone recommending a nice tool and they use it.

It's also impossible to read, understand and follow updates of all the code you want to run. I wouldn't do that myself and I would have to rely on others anyway.

@dzek69 commented on GitHub (Mar 24, 2025): > Ventoy is a critical tool that can unfortunately inject malware at root level, so I'm surprised that people even use it. It could but it can be verified by doing the installation with and without Ventoy and comparing the disk contents. If Ventoy would inject malware for everyone - I'd be way too obvious and would create a backlash. If that would be random but too frequently and people would notice too. So what's left? Targeted attacks - picking just the best targets (but how do you do that on a installation medium step? Maybe by looking at CPU, determining if it's a server CPU or "home use" CPU), and doing it at random, but not too frequently. Here you can avoid detection for some time. While it's possible I think the risk is so low, that not much people care. Also I bet 99,9% of the people just does not acknowledge the fact at all. They just found someone recommending a nice tool and they use it. It's also impossible to read, understand and follow updates of all the code you want to run. I wouldn't do that myself and I would have to rely on others anyway.
Author
Owner

@fnr1r commented on GitHub (Mar 24, 2025):

Update: I got all tools to compile, but the cpio is way too large to be a viable replacement (for now at least). Still, I invite everyone to go and try it out.
I also made a release for those who don't want to build this themselves.

Goodnight (I guess)

@fnr1r commented on GitHub (Mar 24, 2025): Update: I got all tools to compile, but the cpio is way too large to be a viable replacement (for now at least). Still, I invite everyone to go and try it out. I also made a release for those who don't want to build this themselves. Goodnight (I guess)
Author
Owner

@fnr1r commented on GitHub (Mar 29, 2025):

Alpha 3 is out. If someone's interested in testing it, it's here. Once again, feedback is appreciated.

@fnr1r commented on GitHub (Mar 29, 2025): Alpha 3 is out. If someone's interested in testing it, [it's here](https://github.com/fnr1r/ventoy-cpio/releases/tag/alpha-3). Once again, feedback is appreciated.
Author
Owner

@eugenesan commented on GitHub (Apr 7, 2025):

There was no response from the maintainer for over a year.

For those not willing to wait and looking for an alternative, there is one, GLIM.
It's nowhere near the feature set of Ventoy but can cover 80% of use cases, especially for those friendly with Linux.

The original GLIM project was already mentioned in this thread but it was not updated for some time so I had to fork it at: https://github.com/eugenesan/glim. I based my work on another fork https://github.com/cshandley-uk/bash_glim.
Basically, I added basic Windows support and various improvements.

Feel free to play with it.
Since I am not sure if my changes will be accepted by parent forks, I recommend monitoring all 3 for time being.

@eugenesan commented on GitHub (Apr 7, 2025): There was no response from the maintainer for over a year. For those not willing to wait and looking for an alternative, there is one, GLIM. It's nowhere near the feature set of Ventoy but can cover 80% of use cases, especially for those friendly with Linux. The original GLIM project was already mentioned in this thread but it was not updated for some time so I had to fork it at: https://github.com/eugenesan/glim. I based my work on another fork https://github.com/cshandley-uk/bash_glim. Basically, I added basic Windows support and various improvements. Feel free to play with it. Since I am not sure if my changes will be accepted by parent forks, I recommend monitoring all 3 for time being.
Author
Owner

@fnr1r commented on GitHub (Apr 8, 2025):

GLIM is nice. I like its less invasive approach, but it comes at the cost of not having as many features and not having a generic option. Ventoy has one, but I'm not sure if it works.
But using a less invasive approach for distros who support it is something that should be added to Ventoy, since it shouldn't interfere much with other features.

Also I'm too lazy to switch from Ventoy. I'd rather actually make it better since it has a lot of potential.

@eugenesan

@fnr1r commented on GitHub (Apr 8, 2025): GLIM is nice. I like its less invasive approach, but it comes at the cost of not having as many features and not having a generic option. Ventoy has one, but I'm not sure if it works. But using a less invasive approach for distros who support it is something that should be added to Ventoy, since it shouldn't interfere much with other features. Also I'm too lazy to switch from Ventoy. I'd rather actually make it better since it has a lot of potential. @eugenesan
Author
Owner

@cshandley-uk commented on GitHub (Apr 8, 2025):

I based my work on another fork https://github.com/cshandley-uk/bash_glim.
Basically, I added basic Windows support and various improvements.
...
Since I am not sure if my changes will be accepted by parent forks

Thanks for mentioning my fork (which adds easy support for ISOs over 4GB), I had been wondering about mentioning it here, since I stopped using Ventoy. I'll probably take a look at your pull request this weekend. I don't intend to reply further here, as it's off-topic.

@cshandley-uk commented on GitHub (Apr 8, 2025): > I based my work on another fork https://github.com/cshandley-uk/bash_glim. > Basically, I added basic Windows support and various improvements. > ... > Since I am not sure if my changes will be accepted by parent forks Thanks for mentioning my fork (which adds easy support for ISOs over 4GB), I had been wondering about mentioning it here, since I stopped using Ventoy. I'll probably take a look at your pull request this weekend. I don't intend to reply further here, as it's off-topic.
Author
Owner

@dzek69 commented on GitHub (Apr 8, 2025):

GLIM is not an "80% alternative" to me, if it has a hardcoded list of supported OSes:

Any unpopulated/unsupported folder and unsupported ISOs will be ignored.

@dzek69 commented on GitHub (Apr 8, 2025): GLIM is not an "80% alternative" to me, if it has a hardcoded list of supported OSes: > Any unpopulated/unsupported folder and unsupported ISOs will be ignored.
Author
Owner

@eugenesan commented on GitHub (Apr 8, 2025):

GLIM is not an "80% alternative" to me, if it has a hardcoded list of supported OSes:

Any unpopulated/unsupported folder and unsupported ISOs will be ignored.

Indeed, without Ventoy's "dirty black magic" that blindly boots almost any ISO, GLIM has to deal with each type of ISO separately. Despite that, it still works with most modern Linux/BSD/Rescue ISOs and able to boot Windows10/11 Install from a partition. In my personal book, that's 100% success ;-)
Maybe 80% score is too optimistic for most, but in cases where security is important convenience is a small price to pay.

@eugenesan commented on GitHub (Apr 8, 2025): > GLIM is not an "80% alternative" to me, if it has a hardcoded list of supported OSes: > > > Any unpopulated/unsupported folder and unsupported ISOs will be ignored. Indeed, without Ventoy's "dirty black magic" that blindly boots almost any ISO, GLIM has to deal with each type of ISO separately. Despite that, it still works with most modern Linux/BSD/Rescue ISOs and able to boot Windows10/11 Install from a partition. In my personal book, that's 100% success ;-) Maybe 80% score is too optimistic for most, but in cases where security is important convenience is a small price to pay.
Author
Owner

@youk commented on GitHub (Apr 8, 2025):

Ventoy's "dirty black magic" that blindly boots almost any ISO

This is far from truth. Ventoy breaks pretty regularly with multiple ISOs. What one sees as magic is in fact tedious maintenance. But ignorance is bliss, yeah.

@youk commented on GitHub (Apr 8, 2025): > Ventoy's "dirty black magic" that blindly boots almost any ISO This is far from truth. Ventoy breaks pretty regularly with multiple ISOs. What one sees as magic is in fact tedious maintenance. But ignorance is bliss, yeah.
Author
Owner

@extrowerk commented on GitHub (Apr 8, 2025):

I personally use every chance to explain why is it a terribly dangerous idea to use ventoy. Everybody should consider it as a malware.

@extrowerk commented on GitHub (Apr 8, 2025): I personally use every chance to explain why is it a terribly dangerous idea to use ventoy. Everybody should consider it as a malware.
Author
Owner

@trmdi commented on GitHub (Apr 9, 2025):

I personally use every chance to explain why is it a terribly dangerous idea to use ventoy. Everybody should consider it as a malware.

You can't make claims without evidence. That's just a wild guess. By your logic, does that mean Microsoft Windows or any binary software is malware?

@trmdi commented on GitHub (Apr 9, 2025): > I personally use every chance to explain why is it a terribly dangerous idea to use ventoy. Everybody should consider it as a malware. You can't make claims without evidence. That's just a wild guess. By your logic, does that mean Microsoft Windows or any binary software is malware?
Author
Owner

@youk commented on GitHub (Apr 9, 2025):

@extrowerk Malware assumes malicious intent. Are you able to demonstrate it? If not, what you are doing is spreading FUD. Ventoy is just malware as any device with proprietary firmware (which means practically ANY device).

Am I saying that running random binaries is secure? Hell no. But it is all about risk profiles. No need for drama here.

@youk commented on GitHub (Apr 9, 2025): @extrowerk Malware assumes malicious intent. Are you able to demonstrate it? If not, what you are doing is spreading FUD. Ventoy is just malware as any device with proprietary firmware (which means practically ANY device). Am I saying that running random binaries is secure? Hell no. But it is all about risk profiles. No need for drama here.
Author
Owner

@arvigeus commented on GitHub (Apr 9, 2025):

Take your fight somewhere else, it has nothing to do with the issue.

@arvigeus commented on GitHub (Apr 9, 2025): Take your fight somewhere else, it has nothing to do with the issue.
Author
Owner

@youk commented on GitHub (Apr 9, 2025):

So what is the issue then? World is in the dark, please enlighten it.

@youk commented on GitHub (Apr 9, 2025): So what is the issue then? World is in the dark, please enlighten it.
Author
Owner

@arvigeus commented on GitHub (Apr 9, 2025):

#2795

@arvigeus commented on GitHub (Apr 9, 2025): [#2795](https://github.com/ventoy/Ventoy/issues/2795)
Author
Owner

@youk commented on GitHub (Apr 9, 2025):

You have no conception of the rationale, do you?

@youk commented on GitHub (Apr 9, 2025): You have no conception of the rationale, do you?
Author
Owner

@extrowerk commented on GitHub (Apr 9, 2025):

@trmdi I didn't say the program was malicious. I said that any sane person should consider it malicious.

@youk There are many channels on the internet promoting Ventoy as a simple, ready-made boot solution. The target user group is not capable of risk assessment, so they cannot realistically accept the potential risk, but the peer pressure is overwhelming. The project is considered malicious as long as the project does not show any intention to solve this issue.

@extrowerk commented on GitHub (Apr 9, 2025): @trmdi I didn't say the program was malicious. I said that any sane person should consider it malicious. @youk There are many channels on the internet promoting Ventoy as a simple, ready-made boot solution. The target user group is not capable of risk assessment, so they cannot realistically accept the potential risk, but the peer pressure is overwhelming. The project is considered malicious as long as the project does not show any intention to solve this issue.
Author
Owner

@youk commented on GitHub (Apr 9, 2025):

The target user group is not capable of risk assessment

What is the target group? Housewives?

How did you estimate the targets' group capability? Is it your fantasy guess?

so they cannot realistically accept the potential risk

As if it isn't so for vast majority of consumers of any digital technology.

The project is considered malicious as long as the project does not show any intention to solve this issue.

That is only your personal opinion. Which is quite ridiculous, TBH.
There are many reasons people don't do something. Stop with your FUD already.

@youk commented on GitHub (Apr 9, 2025): > The target user group is not capable of risk assessment What is the target group? Housewives? How did you estimate the targets' group capability? Is it your fantasy guess? > so they cannot realistically accept the potential risk As if it isn't so for vast majority of consumers of any digital technology. > The project is considered malicious as long as the project does not show any intention to solve this issue. That is only your personal opinion. Which is quite ridiculous, TBH. There are many reasons people don't do something. Stop with your FUD already.
Author
Owner

@extrowerk commented on GitHub (Apr 9, 2025):

@youk I agree that we don't agree. Still: caution always pays off.

@extrowerk commented on GitHub (Apr 9, 2025): @youk I agree that we don't agree. Still: caution always pays off.
Author
Owner

@rfc-2549 commented on GitHub (Apr 9, 2025):

So they ain't going to unbackdoor this in the foreseeable future, huh?

May I recommend an alternative to Ventoy that need not an USB device: https://ipxe.org

@rfc-2549 commented on GitHub (Apr 9, 2025): So they ain't going to unbackdoor this in the foreseeable future, huh? May I recommend an alternative to Ventoy that need not an USB device: https://ipxe.org
Author
Owner

@youk commented on GitHub (Apr 9, 2025):

Finally someone found the backdoor. Please share the details.

@youk commented on GitHub (Apr 9, 2025): Finally someone found the backdoor. Please share the details.
Author
Owner

@rfc-2549 commented on GitHub (Apr 9, 2025):

Ah no i did not find any backdoor i just read in /g/ this is backdoored and I believe them because like Abraham Lincoln said "If it is on the internet, it is true"

@rfc-2549 commented on GitHub (Apr 9, 2025): Ah no i did not find any backdoor i just read in /g/ this is backdoored and I believe them because like Abraham Lincoln said "If it is on the internet, it is true"
Author
Owner

@fnr1r commented on GitHub (Apr 9, 2025):

So they ain't going to unbackdoor this in the foreseeable future, huh?

Foreseeable future - no. I am trying to, but it's not easy and it'll take time.

It'd be nice if someone else would help, but Ventoy is complex, so I won't blame anyone for not wanting to get involved.

I have some notes in Obsidian that could help possible future contributors familiarize themselves with how Ventoy works and I can publish them in something like ventoy-meta.

I will reiterate - for now I'm focusing on the recreating ramdisk, which is... done I guess, but it's still imperfect in regards to it's size on mips64el, the toolchain it uses (old Ubuntu + new Debian for i386 + whatever else Ventoy uses) and I don't have the time to test it on every distro.

Help with the last one would be great, but I won't force anyone.

Also after I finish ventoy-cpio (or at least get it to a usable state), I'll focus on building GRUB, since it's a shared component across all compatible OSes. I already have a Makefile that kinda does this, but it's still messy.

Once that's working I'll try to optimize init in the ramdisk and add the ramdisk-less boot from GLIM as an option to Ventoy.

All of this will take time, but I think it will be worth it.

So... I'm still waiting for feedback. Y'all can also add working distros to ventoy-cpios GitHub wiki. It should be open to edits from anyone.

Cheers 👋

@fnr1r commented on GitHub (Apr 9, 2025): > So they ain't going to unbackdoor this in the foreseeable future, huh? Foreseeable future - no. I am trying to, but it's not easy and it'll take time. It'd be nice if someone else would help, but Ventoy is complex, so I won't blame anyone for not wanting to get involved. I have some notes in Obsidian that could help possible future contributors familiarize themselves with how Ventoy works and I can publish them in something like `ventoy-meta`. I will reiterate - for now I'm focusing on the recreating ramdisk, which is... done I guess, but it's still imperfect in regards to it's size on mips64el, the toolchain it uses (old Ubuntu + new Debian for i386 + whatever else Ventoy uses) and I don't have the time to test it on every distro. Help with the last one would be great, but I won't force anyone. Also after I finish `ventoy-cpio` (or at least get it to a usable state), I'll focus on building GRUB, since it's a shared component across all compatible OSes. I already have a Makefile that kinda does this, but it's still messy. Once that's working I'll try to optimize init in the ramdisk and add the ramdisk-less boot from GLIM as an option to Ventoy. All of this will take time, but I think it will be worth it. So... I'm still waiting for feedback. Y'all can also add working distros to `ventoy-cpio`s GitHub wiki. It should be open to edits from anyone. Cheers 👋
Author
Owner

@fnr1r commented on GitHub (Apr 9, 2025):

Also since I added ar and inotifyd, Alpha 5 is out. The x86 ramdisk is now finally smaller.
I don't know why ar is needed, but it's in the official ramdisk, so...

@fnr1r commented on GitHub (Apr 9, 2025): Also since I added `ar` and `inotifyd`, [Alpha 5](https://github.com/fnr1r/ventoy-cpio/releases/tag/alpha-5) is out. The x86 ramdisk is now finally smaller. I don't know why `ar` is needed, but it's in the official ramdisk, so...
Author
Owner

@SysAdminDoc commented on GitHub (Apr 9, 2025):

I just wanted to chime in and say put me in the screencap.

@SysAdminDoc commented on GitHub (Apr 9, 2025): I just wanted to chime in and say put me in the screencap.
Author
Owner

@Glass47 commented on GitHub (Apr 9, 2025):

There are many reasons people don't do something. Stop with your FUD already

How does this make you feel that there are over 400 people agreeing with initial post yet main dev still hasn't addressed or answered this?!
Is that also a fud? Lol

Or maybe you are an alt account from main dev trying to defend himself? You never know.

@Glass47 commented on GitHub (Apr 9, 2025): > There are many reasons people don't do something. Stop with your FUD already How does this make you feel that there are over 400 people agreeing with initial post **yet main dev still hasn't addressed or answered this?!** Is that also a fud? Lol Or maybe you are an alt account from main dev trying to defend himself? You never know.
Author
Owner

@Glass47 commented on GitHub (Apr 9, 2025):

If Ventoy would inject malware for everyone

It doesn't need to inject malware, all it needs to have is a backdoor, just like how XZ had backdoor.
Was it actively used? Maybe, was it obvious? No, did most people deem it safe? Yes.
In reality it wasn't safe because 0day was existent. Just like how you can have exploit sitting to be activated one day..

But anyways it's not going to be my loss at the end of the day when shit hits the fan..

@Glass47 commented on GitHub (Apr 9, 2025): > If Ventoy would inject malware for everyone It doesn't need to inject malware, all it needs to have is a backdoor, just like how XZ had backdoor. Was it actively used? Maybe, was it obvious? No, did most people deem it safe? Yes. In reality it wasn't safe because 0day was existent. Just like how you can have exploit sitting to be activated one day.. But anyways it's not going to be my loss at the end of the day when shit hits the fan..
Author
Owner

@Glass47 commented on GitHub (Apr 9, 2025):

@trmdi I didn't say the program was malicious. I said that any sane person should consider it malicious.

@youk There are many channels on the internet promoting Ventoy as a simple, ready-made boot solution. The target user group is not capable of risk assessment, so they cannot realistically accept the potential risk, but the peer pressure is overwhelming. The project is considered malicious as long as the project does not show any intention to solve this issue.

It's mind boggling how does it not raise any red flags to these people.

It's fine to have devil's advocate, but you can easily shut them up by asking one question - Does it not raise any red flags that developer has been active - yet he hasn't responded to address this at all? Despite this initial issue having 100's of people agreeing..

Image

@Glass47 commented on GitHub (Apr 9, 2025): > [@trmdi](https://github.com/trmdi) I didn't say the program was malicious. I said that any sane person should consider it malicious. > > [@youk](https://github.com/youk) There are many channels on the internet promoting Ventoy as a simple, ready-made boot solution. The target user group is not capable of risk assessment, so they cannot realistically accept the potential risk, but the peer pressure is overwhelming. The project is considered malicious as long as the project does not show any intention to solve this issue. **It's mind boggling how does it not raise any red flags to these people.** **It's fine to have devil's advocate, but you can easily shut them up by asking one question - Does it not raise any red flags that developer has been active - yet he hasn't responded to address this at all? Despite this initial issue having 100's of people agreeing..** ![Image](https://github.com/user-attachments/assets/78e46f6b-90ca-435e-8e4c-fd1cae43deb0)
Author
Owner

@gpz1100 commented on GitHub (Apr 9, 2025):

I have no problem using ventoy for testing purposes. Any software that goes on production devices is installed using original sources with no intermediate bootstraps (ie ventoy).

@gpz1100 commented on GitHub (Apr 9, 2025): I have no problem using ventoy for testing purposes. Any software that goes on production devices is installed using original sources with no intermediate bootstraps (ie ventoy).
Author
Owner

@reavpC6K commented on GitHub (Apr 9, 2025):

All garbage philosophy. You shouldn't earn a penny, kopek, whatever your unit if you actually use this in production. Dirty XZ runs on millions of OS installs before we assume Jia Tan and Hailong Sun are the same person.

@reavpC6K commented on GitHub (Apr 9, 2025): All garbage philosophy. You shouldn't earn a penny, kopek, whatever your unit if you actually use this in production. Dirty XZ runs on millions of OS installs before we assume Jia Tan and Hailong Sun are the same person.
Author
Owner

@TechnologyClassroom commented on GitHub (Apr 9, 2025):

Instead of calling the developer a malicious Jia Tan who is hacking your USB with malware, use this energy to work on the issue. The information you need is in this thread.

@TechnologyClassroom commented on GitHub (Apr 9, 2025): Instead of calling the developer a malicious Jia Tan who is hacking your USB with malware, use this energy to work on the issue. The information you need is in this thread.
Author
Owner

@youk commented on GitHub (Apr 10, 2025):

How does this make you feel that there are over 400 people agreeing with initial post yet main dev still hasn't addressed or answered this

I'm sorry to disappoint you, but it doesn't make me feel. Nobody owes you (or anyone else) anything. Your demands are nothing more than a child's frustration.

It's mind boggling how does it not raise any red flags to these people.

You are not even able to read. Get lost.

@youk commented on GitHub (Apr 10, 2025): > How does this make you feel that there are over 400 people agreeing with initial post yet main dev still hasn't addressed or answered this I'm sorry to disappoint you, but it doesn't make me feel. Nobody owes you (or anyone else) anything. Your demands are nothing more than a child's frustration. > It's mind boggling how does it not raise any red flags to these people. You are not even able to read. Get lost.
Author
Owner

@mpeter50 commented on GitHub (Apr 10, 2025):

I'm sorry to disappoint you, but it doesn't make me feel. Nobody owes you (or anyone else) anything. Your demands are nothing more than a child's frustration.

It is true that we are talking about volunteer work, but if people were asking me questions concerning the security of my project, and I cared for my project, I would try to clear up what is happening, whether I consider it serious, and whether I want to work on it at all. In this case however, we didnt get even an acknowledgement, or a call for help, did we?

@mpeter50 commented on GitHub (Apr 10, 2025): > I'm sorry to disappoint you, but it doesn't make me feel. Nobody owes you (or anyone else) anything. Your demands are nothing more than a child's frustration. It is true that we are talking about volunteer work, but if people were asking me questions concerning the security of my project, and I cared for my project, I would try to clear up what is happening, whether I consider it serious, and whether I want to work on it at all. In this case however, we didnt get even an acknowledgement, or a call for help, did we?
Author
Owner

@extrowerk commented on GitHub (Apr 10, 2025):

Even if this is obvious to you, the project's front page should clearly state the warning:

"VENTOY TAMPERS THE INSTALLATION MEDIA AND INJECTS BINARY BLOBS."

I would say that the project should contact the major news outlets and propose an article about the inner workings of Ventoy. No one knows how many manipulated installations are running around the world, most users are probably not even aware that their installation has been manipulated. This is terrible from a security POV, and users should have been clearly informed about this from day one.

@extrowerk commented on GitHub (Apr 10, 2025): Even if this is obvious to you, the project's front page should clearly state the warning: "VENTOY TAMPERS THE INSTALLATION MEDIA AND INJECTS BINARY BLOBS." I would say that the project should contact the major news outlets and propose an article about the inner workings of Ventoy. No one knows how many manipulated installations are running around the world, most users are probably not even aware that their installation has been manipulated. This is terrible from a security POV, and users should have been clearly informed about this from day one.
Author
Owner

@youk commented on GitHub (Apr 10, 2025):

No one knows how many manipulated installations are running around the world, most users are probably not even aware that their installation has been manipulated.

Are you sure you have any idea what you are talking about? What installations? Ventoy modifies initramfs of bootable media. Show any sign of the tampered installations or cut your bullshit.

@youk commented on GitHub (Apr 10, 2025): > No one knows how many manipulated installations are running around the world, most users are probably not even aware that their installation has been manipulated. Are you sure you have any idea what you are talking about? What installations? Ventoy modifies initramfs of _bootable_ media. Show any sign of the tampered _installations_ or cut your bullshit.
Author
Owner

@rfc-2549 commented on GitHub (Apr 10, 2025):

@youk Are you getting paid by the CCP or why are you defending a software you ain't even made a commit for?

@rfc-2549 commented on GitHub (Apr 10, 2025): @youk Are you getting paid by the CCP or why are you defending a software you ain't even made a commit for?
Author
Owner

@noscript commented on GitHub (Apr 10, 2025):

Reportedly, Stuxnet was undetected for half a decade.

@noscript commented on GitHub (Apr 10, 2025): Reportedly, Stuxnet was undetected for half a decade.
Author
Owner

@extrowerk commented on GitHub (Apr 10, 2025):

cut your bullshit.

Please moderate yourself, we haven't received any usable material from you on this topic yet.

Ventoy is well positioned to support a malicious infiltration attack, basically has all the tools to insert a rootkit.
I don't need to show that the functionality is actively used. The project owner should take care of warning users and ensure transparency of project management and repeatability of binaries.

This is not happening, so it is natural that people try to warn others. Why does this bother you? Why are you against transparency? What is your motivation?

@extrowerk commented on GitHub (Apr 10, 2025): > cut your bullshit. Please moderate yourself, we haven't received any usable material from you on this topic yet. Ventoy is well positioned to support a malicious infiltration attack, basically has all the tools to insert a rootkit. I don't need to show that the functionality is actively used. The project owner should take care of warning users and ensure transparency of project management and repeatability of binaries. This is not happening, so it is natural that people try to warn others. Why does this bother you? Why are you against transparency? What is your motivation?
Author
Owner

@youk commented on GitHub (Apr 10, 2025):

Please moderate yourself, we haven't received any usable material from you on this topic yet.

We? Do you mean yourself? That's because your technical knowledge on the topic is zero. You don't understand what is being communicated to you.

Ventoy is well positioned to support a malicious infiltration attack, basically has all the tools to insert a rootkit.

FUD. You claimed that it tampers with the installations. That is very easy to prove. You have zero proof. You just post your bullshit. Probably, just out of your ignorance.

I don't need to show that the functionality is actively used.

You are even unable to show the presence of "the functionality". Because you don't understand a thing about Linux.

What is your motivation?

My motivation is call your bullshit.

@youk commented on GitHub (Apr 10, 2025): > Please moderate yourself, we haven't received any usable material from you on this topic yet. We? Do you mean yourself? That's because your technical knowledge on the topic is zero. You don't understand what is being communicated to you. > Ventoy is well positioned to support a malicious infiltration attack, basically has all the tools to insert a rootkit. FUD. You claimed that it tampers with _the installations_. That is very easy to prove. You have zero proof. You just post your bullshit. Probably, just out of your ignorance. > I don't need to show that the functionality is actively used. You are even unable to show the presence of "the functionality". Because you don't understand a thing about Linux. > What is your motivation? My motivation is call your bullshit.
Author
Owner

@rfc-2549 commented on GitHub (Apr 10, 2025):

Please moderate yourself, we haven't received any usable material from you on this topic yet.

We? Do you mean yourself? That's because your technical knowledge on the topic is zero. You don't understand what is being communicated to you.

Ventoy is well positioned to support a malicious infiltration attack, basically has all the tools to insert a rootkit.

FUD. You claimed that it tampers with the installations. That is very easy to prove. You have zero proof. You just post your bullshit. Probably, just out of your ignorance.

I don't need to show that the functionality is actively used.

You are even unable to show the presence of "the functionality". Because you don't understand a thing about Linux.

What is your motivation?

My motivation is call your bullshit.

动态网自由门 天安門 天安门 法輪功 李洪志 Free Tibet 六四天安門事件 The Tiananmen Square protests of 1989 天安門大屠殺 The Tiananmen Square Massacre 反右派鬥爭 The Anti-Rightist Struggle 大躍進政策 The Great Leap Forward 文化大革命 The Great Proletarian Cultural Revolution 人權 Human Rights 民運 Democratization 自由 Freedom 獨立 Independence 多黨制 Multi-party system 台灣 臺灣 Taiwan Formosa 中華民國 Republic of China 西藏 土伯特 唐古特 Tibet 達賴喇嘛 Dalai Lama 法輪功 Falun Dafa 新疆維吾爾自治區 The Xinjiang Uyghur Autonomous Region 諾貝爾和平獎 Nobel Peace Prize 劉暁波 Liu Xiaobo 民主 言論 思想 反共 反革命 抗議 運動 騷亂 暴亂 騷擾 擾亂 抗暴 平反 維權 示威游行 李洪志 法輪大法 大法弟子 強制斷種 強制堕胎 民族淨化 人體實驗 肅清 胡耀邦 趙紫陽 魏京生 王丹 還政於民 和平演變 激流中國 北京之春 大紀元時報 九評論共産黨 獨裁 專制 壓制 統一 監視 鎮壓 迫害 侵略 掠奪 破壞 拷問 屠殺 活摘器官 誘拐 買賣人口 遊進 走私 毒品 賣淫 春畫 賭博 六合彩 天安門 天安门 法輪功 李洪志 Winnie the Pooh 劉曉波动态网自由门

With that being said. Please do enlighten us on why this isn't harmful and we shouldn't care about these blobs. With code and proofs. Not words or insults. Thank you. But we need your enlightenment

@rfc-2549 commented on GitHub (Apr 10, 2025): > > Please moderate yourself, we haven't received any usable material from you on this topic yet. > > We? Do you mean yourself? That's because your technical knowledge on the topic is zero. You don't understand what is being communicated to you. > > > Ventoy is well positioned to support a malicious infiltration attack, basically has all the tools to insert a rootkit. > > FUD. You claimed that it tampers with _the installations_. That is very easy to prove. You have zero proof. You just post your bullshit. Probably, just out of your ignorance. > > > I don't need to show that the functionality is actively used. > > You are even unable to show the presence of "the functionality". Because you don't understand a thing about Linux. > > > What is your motivation? > > My motivation is call your bullshit. 动态网自由门 天安門 天安门 法輪功 李洪志 Free Tibet 六四天安門事件 The Tiananmen Square protests of 1989 天安門大屠殺 The Tiananmen Square Massacre 反右派鬥爭 The Anti-Rightist Struggle 大躍進政策 The Great Leap Forward 文化大革命 The Great Proletarian Cultural Revolution 人權 Human Rights 民運 Democratization 自由 Freedom 獨立 Independence 多黨制 Multi-party system 台灣 臺灣 Taiwan Formosa 中華民國 Republic of China 西藏 土伯特 唐古特 Tibet 達賴喇嘛 Dalai Lama 法輪功 Falun Dafa 新疆維吾爾自治區 The Xinjiang Uyghur Autonomous Region 諾貝爾和平獎 Nobel Peace Prize 劉暁波 Liu Xiaobo 民主 言論 思想 反共 反革命 抗議 運動 騷亂 暴亂 騷擾 擾亂 抗暴 平反 維權 示威游行 李洪志 法輪大法 大法弟子 強制斷種 強制堕胎 民族淨化 人體實驗 肅清 胡耀邦 趙紫陽 魏京生 王丹 還政於民 和平演變 激流中國 北京之春 大紀元時報 九評論共産黨 獨裁 專制 壓制 統一 監視 鎮壓 迫害 侵略 掠奪 破壞 拷問 屠殺 活摘器官 誘拐 買賣人口 遊進 走私 毒品 賣淫 春畫 賭博 六合彩 天安門 天安门 法輪功 李洪志 Winnie the Pooh 劉曉波动态网自由门 With that being said. Please do enlighten us on why this isn't harmful and we shouldn't care about these blobs. With code and proofs. Not words or insults. Thank you. But we need your enlightenment
Author
Owner

@fnr1r commented on GitHub (Apr 10, 2025):

No one knows how many manipulated installations are running around the world, most users are probably not even aware that their installation has been manipulated.

Are you sure you have any idea what you are talking about? What installations? Ventoy modifies initramfs of bootable media. Show any sign of the tampered installations or cut your bullshit.

To clarify - injecting files into initramfs is a feature. I've read the important bash scripts in ventoy.cpio and as soon as the real init calls switch_root any traces of Ventoy are gone, unless you inject files that then add themselves to the live environment. The only thing that should remain is two device mappings named ventoy and partition name.
Correct me if I'm wrong.

Also, can any discussion about distrust of longpanda be moved somewhere else? This is an issue regarding binary blobs in the repo, which is bad practice, not maliciousness. The point is to get rid of blobs from the repo, not get rid of pre-built versions of Ventoy entirely.
If someone doesn't trust longpanda's build of Ventoy, don't use it and help others improve build instructions and systems.
Speculation about longpanda being the next Jia Tan is not helpful.

I'm sorry if I'm coming off as hostile, I just want to get this fixed.

@fnr1r commented on GitHub (Apr 10, 2025): > > No one knows how many manipulated installations are running around the world, most users are probably not even aware that their installation has been manipulated. > > Are you sure you have any idea what you are talking about? What installations? Ventoy modifies initramfs of _bootable_ media. Show any sign of the tampered _installations_ or cut your bullshit. To clarify - injecting files into initramfs [is a feature](https://www.ventoy.net/en/plugin_injection.html). I've read the important bash scripts in `ventoy.cpio` and as soon as the real init calls switch_root any traces of Ventoy are gone, unless you inject files that then add themselves to the live environment. The only thing that should remain is two device mappings named `ventoy` and partition name. Correct me if I'm wrong. Also, can any discussion about distrust of longpanda be moved somewhere else? This is an issue regarding binary blobs in the repo, which is bad practice, not maliciousness. The point is to get rid of blobs from the repo, not get rid of pre-built versions of Ventoy entirely. If someone doesn't trust longpanda's build of Ventoy, don't use it and help others improve build instructions and systems. Speculation about longpanda being the next Jia Tan is not helpful. I'm sorry if I'm coming off as hostile, I just want to get this fixed.
Author
Owner

@youk commented on GitHub (Apr 10, 2025):

@rfc-2549 I didn't even touch on the topic of BLOBs. Unfortunately, you are clearly not able to understand what I was arguing about. Bye.

@youk commented on GitHub (Apr 10, 2025): @rfc-2549 I didn't even touch on the topic of BLOBs. Unfortunately, you are clearly not able to understand what I was arguing about. Bye.
Author
Owner

@rfc-2549 commented on GitHub (Apr 10, 2025):

@rfc-2549 I didn't even touch on the topic of BLOBs. Unfortunately, you are clearly not able to understand what I was arguing about. Bye.

My man I wish you a very happy life and an awesome day

@rfc-2549 commented on GitHub (Apr 10, 2025): > [@rfc-2549](https://github.com/rfc-2549) I didn't even touch on the topic of BLOBs. Unfortunately, you are clearly not able to understand what I was arguing about. Bye. My man I wish you a very happy life and an awesome day
Author
Owner

@fnr1r commented on GitHub (Apr 10, 2025):

This is getting so unhinged I might as well tag @BrodieRobertson (sorry)

@fnr1r commented on GitHub (Apr 10, 2025): This is getting so unhinged I might as well tag @BrodieRobertson (sorry)
Author
Owner

@rfc-2549 commented on GitHub (Apr 10, 2025):

This is getting so unhinged I might as well tag @BrodieRobertson (sorry)

Image

@rfc-2549 commented on GitHub (Apr 10, 2025): > This is getting so unhinged I might as well tag [@BrodieRobertson](https://github.com/BrodieRobertson) (sorry) ![Image](https://github.com/user-attachments/assets/f18497a3-7792-4752-a76a-c5845fe1e11a)
Author
Owner

@extrowerk commented on GitHub (Apr 10, 2025):

Because you don't understand a thing about Linux.

Sorry, but I am not a huge fan of your favorite system. Please do not limit the scope, Ventoy is clearly marketed as capable to boot other systems aswell.

@extrowerk commented on GitHub (Apr 10, 2025): > Because you don't understand a thing about Linux. Sorry, but I am not a huge fan of *your* favorite system. Please do not limit the scope, Ventoy is clearly marketed as capable to boot other systems aswell.
Author
Owner

@Thrilleratplay commented on GitHub (Apr 10, 2025):

Can the time and energy every one is using to mostly attack one another be used to help @fnr1r to test ventoy-cpio?

@Thrilleratplay commented on GitHub (Apr 10, 2025): Can the time and energy every one is using to mostly attack one another be used to help @fnr1r to test [ventoy-cpio](https://github.com/fnr1r/ventoy-cpio)?
Author
Owner

@rfc-2549 commented on GitHub (Apr 10, 2025):

Can the time and energy every one is using to mostly attack one another be used to help @fnr1r to test ventoy-cpio?

My dear, if energy was used into mostly good things we would not have wars and most of the problems we have in the world, groups, organizations and communities.

the human's flawed

@rfc-2549 commented on GitHub (Apr 10, 2025): > Can the time and energy every one is using to mostly attack one another be used to help [@fnr1r](https://github.com/fnr1r) to test [ventoy-cpio](https://github.com/fnr1r/ventoy-cpio)? My dear, if energy was used into mostly good things we would not have wars and most of the problems we have in the world, groups, organizations and communities. the human's flawed
Author
Owner

@git70 commented on GitHub (Apr 10, 2025):

https://github.com/fnr1r/ventoy-cpio/discussions/16

@git70 commented on GitHub (Apr 10, 2025): https://github.com/fnr1r/ventoy-cpio/discussions/16
Author
Owner

@fnr1r commented on GitHub (Apr 13, 2025):

Alpha 6 is out and I'm working on building GRUB (with overlay mounts to save time).

EDIT: Done! (kinda) https://github.com/fnr1r/ventoy-grub

@fnr1r commented on GitHub (Apr 13, 2025): [Alpha 6](https://github.com/fnr1r/ventoy-cpio/releases/tag/alpha-6) is out and I'm working on building GRUB (with overlay mounts to save time). EDIT: Done! (kinda) https://github.com/fnr1r/ventoy-grub
Author
Owner

@fnr1r commented on GitHub (Apr 13, 2025):

Does anyone here know which efi binary in (VTOYEFI)/BOOT/EFI is which?
MokManager is obvious, but the naming is inconsistent. BOOTAA64.EFI, BOOTMIPS.EFI, grubia32_real.efi and grubx64_real.efi match the size of grub, but the rest is a mystery to me. It seems like some kind of secure boot bypassing chainloader, but I couldn't find it here.

    /r/m/m/V/E/BOOT  du -h *                                           nie, 13 kwi 2025, 18:19:04
2,2M    BOOTAA64.EFI
725K    BOOTIA32.EFI
2,8M    BOOTMIPS.EFI
944K    BOOTX64.EFI
63K     grub.efi
58K     grubia32.efi
1,3M    grubia32_real.efi
663K    mmia32.efi
833K    MokManager.efi
    /r/m/m/V/E/BOOT                                                    nie, 13 kwi 2025, 18:19:11
    /r/m/m/V/E/BOOT  file *                                            nie, 13 kwi 2025, 18:18:29
BOOTAA64.EFI:      PE32+ executable for EFI (application), ARM64 (stripped to external PDB), 4 sections
BOOTIA32.EFI:      PE32 executable for EFI (application), Intel i386 (stripped to external PDB), 8 sections
BOOTMIPS.EFI:      PE32+ executable for EFI (application), MIPS R4000 (stripped to external PDB), 4 sections
BOOTX64.EFI:       PE32+ executable for EFI (application), x86-64 (stripped to external PDB), 10 sections
grub.efi:          PE32+ executable for EFI (application), x86-64 (stripped to external PDB), 7 sections
grubia32.efi:      PE32 executable for EFI (application), Intel i386 (stripped to external PDB), 7 sections
grubia32_real.efi: PE32 executable for EFI (application), Intel i386 (stripped to external PDB), 4 sections
mmia32.efi:        PE32 executable for EFI (application), Intel i386 (stripped to external PDB), 6 sections
MokManager.efi:    PE32+ executable for EFI (application), x86-64 (stripped to external PDB), 7 sections
    /r/m/m/V/E/BOOT                                                    nie, 13 kwi 2025, 18:18:31

EDIT: typo

@fnr1r commented on GitHub (Apr 13, 2025): Does anyone here know which efi binary in `(VTOYEFI)/BOOT/EFI` is which? MokManager is obvious, but the naming is inconsistent. `BOOTAA64.EFI`, `BOOTMIPS.EFI`, `grubia32_real.efi` and `grubx64_real.efi` match the size of grub, but the rest is a mystery to me. It seems like some kind of secure boot bypassing chainloader, but I couldn't find it here. ```txt   /r/m/m/V/E/BOOT  du -h * nie, 13 kwi 2025, 18:19:04 2,2M BOOTAA64.EFI 725K BOOTIA32.EFI 2,8M BOOTMIPS.EFI 944K BOOTX64.EFI 63K grub.efi 58K grubia32.efi 1,3M grubia32_real.efi 663K mmia32.efi 833K MokManager.efi   /r/m/m/V/E/BOOT  nie, 13 kwi 2025, 18:19:11 ``` ```txt   /r/m/m/V/E/BOOT  file * nie, 13 kwi 2025, 18:18:29 BOOTAA64.EFI: PE32+ executable for EFI (application), ARM64 (stripped to external PDB), 4 sections BOOTIA32.EFI: PE32 executable for EFI (application), Intel i386 (stripped to external PDB), 8 sections BOOTMIPS.EFI: PE32+ executable for EFI (application), MIPS R4000 (stripped to external PDB), 4 sections BOOTX64.EFI: PE32+ executable for EFI (application), x86-64 (stripped to external PDB), 10 sections grub.efi: PE32+ executable for EFI (application), x86-64 (stripped to external PDB), 7 sections grubia32.efi: PE32 executable for EFI (application), Intel i386 (stripped to external PDB), 7 sections grubia32_real.efi: PE32 executable for EFI (application), Intel i386 (stripped to external PDB), 4 sections mmia32.efi: PE32 executable for EFI (application), Intel i386 (stripped to external PDB), 6 sections MokManager.efi: PE32+ executable for EFI (application), x86-64 (stripped to external PDB), 7 sections   /r/m/m/V/E/BOOT  nie, 13 kwi 2025, 18:18:31 ``` EDIT: typo
Author
Owner

@catherinedoyel commented on GitHub (Apr 13, 2025):

Does anyone here know which efi binary in (VTOYEFI)/BOOT/EFI is which? MokManager is obvious, but the naming is inconsistent. BOOTAA64.EFI, BOOTMIPS.EFI, grubia32_real.efi and grubx64_real.efi match the size of grub, but the rest is a mystery to me. It seems like some kind of secure boot bypassing chainloader, but I couldn't find it here.

  /r/m/m/V/E/BOOT  du -h * nie, 13 kwi 2025, 18:19:04
2,2M BOOTAA64.EFI
725K BOOTIA32.EFI
2,8M BOOTMIPS.EFI
944K BOOTX64.EFI
63K grub.efi
58K grubia32.efi
1,3M grubia32_real.efi
663K mmia32.efi
833K MokManager.efi
  /r/m/m/V/E/BOOT  nie, 13 kwi 2025, 18:19:11

  /r/m/m/V/E/BOOT  file * nie, 13 kwi 2025, 18:18:29
BOOTAA64.EFI: PE32+ executable for EFI (application), ARM64 (stripped to external PDB), 4 sections
BOOTIA32.EFI: PE32 executable for EFI (application), Intel i386 (stripped to external PDB), 8 sections
BOOTMIPS.EFI: PE32+ executable for EFI (application), MIPS R4000 (stripped to external PDB), 4 sections
BOOTX64.EFI: PE32+ executable for EFI (application), x86-64 (stripped to external PDB), 10 sections
grub.efi: PE32+ executable for EFI (application), x86-64 (stripped to external PDB), 7 sections
grubia32.efi: PE32 executable for EFI (application), Intel i386 (stripped to external PDB), 7 sections
grubia32_real.efi: PE32 executable for EFI (application), Intel i386 (stripped to external PDB), 4 sections
mmia32.efi: PE32 executable for EFI (application), Intel i386 (stripped to external PDB), 6 sections
MokManager.efi: PE32+ executable for EFI (application), x86-64 (stripped to external PDB), 7 sections
  /r/m/m/V/E/BOOT  nie, 13 kwi 2025, 18:18:31

EDIT: typo

Use virustotal, they should be shims from upstream Linux distro. I don't remember which, but virustotal on those files will show the certificates used to make them.

@catherinedoyel commented on GitHub (Apr 13, 2025): > Does anyone here know which efi binary in `(VTOYEFI)/BOOT/EFI` is which? MokManager is obvious, but the naming is inconsistent. `BOOTAA64.EFI`, `BOOTMIPS.EFI`, `grubia32_real.efi` and `grubx64_real.efi` match the size of grub, but the rest is a mystery to me. It seems like some kind of secure boot bypassing chainloader, but I couldn't find it here. > >   /r/m/m/V/E/BOOT  du -h * nie, 13 kwi 2025, 18:19:04 > 2,2M BOOTAA64.EFI > 725K BOOTIA32.EFI > 2,8M BOOTMIPS.EFI > 944K BOOTX64.EFI > 63K grub.efi > 58K grubia32.efi > 1,3M grubia32_real.efi > 663K mmia32.efi > 833K MokManager.efi >   /r/m/m/V/E/BOOT  nie, 13 kwi 2025, 18:19:11 > >   /r/m/m/V/E/BOOT  file * nie, 13 kwi 2025, 18:18:29 > BOOTAA64.EFI: PE32+ executable for EFI (application), ARM64 (stripped to external PDB), 4 sections > BOOTIA32.EFI: PE32 executable for EFI (application), Intel i386 (stripped to external PDB), 8 sections > BOOTMIPS.EFI: PE32+ executable for EFI (application), MIPS R4000 (stripped to external PDB), 4 sections > BOOTX64.EFI: PE32+ executable for EFI (application), x86-64 (stripped to external PDB), 10 sections > grub.efi: PE32+ executable for EFI (application), x86-64 (stripped to external PDB), 7 sections > grubia32.efi: PE32 executable for EFI (application), Intel i386 (stripped to external PDB), 7 sections > grubia32_real.efi: PE32 executable for EFI (application), Intel i386 (stripped to external PDB), 4 sections > mmia32.efi: PE32 executable for EFI (application), Intel i386 (stripped to external PDB), 6 sections > MokManager.efi: PE32+ executable for EFI (application), x86-64 (stripped to external PDB), 7 sections >   /r/m/m/V/E/BOOT  nie, 13 kwi 2025, 18:18:31 > > EDIT: typo Use virustotal, they should be shims from upstream Linux distro. I don't remember which, but virustotal on those files will show the certificates used to make them.
Author
Owner

@fnr1r commented on GitHub (Apr 13, 2025):

@catherinedoyel Haven't thought of that. Thanks.
The first one I looked up (BOOTIA32.EFI) is mostly associated with Ventoy but is also called shimia32.efi. That's probably it. Still have to check the rest, though.

@fnr1r commented on GitHub (Apr 13, 2025): @catherinedoyel Haven't thought of that. Thanks. The first one I looked up (`BOOTIA32.EFI`) is mostly associated with Ventoy but is also called `shimia32.efi`. That's probably it. Still have to check the rest, though.
Author
Owner

@fnr1r commented on GitHub (Apr 13, 2025):

Okay. I think I get it now.
BOOTX64.EFI and BOOTIA32.EFI are shims signed by higher authorities (Red Hat, OpenSuse, the forbidden company, etc.) and grub.efi, grubia32.efi are... something signed by longpanda's private key, aptly named grub.
I still don't know where to get those shims or how to build the 2nd thing (probably something in https://github.com/ventoy/Ventoy/tree/master/EDK2/edk2_mod/edk2-edk2-stable201911/MdeModulePkg/Application), but at least I have something.

@fnr1r commented on GitHub (Apr 13, 2025): Okay. I think I get it now. [BOOTX64.EFI](https://www.virustotal.com/gui/file/a60d256c802849a0a5e23fe5298ddcf7f78445cc71f519b64573dcb61af0e6ff) and [BOOTIA32.EFI](https://www.virustotal.com/gui/file/f6f6b9369bcdac99fbc24c457d9010479f47af62b00fb19f1dfd865bfb75d369) are shims signed by higher authorities (Red Hat, OpenSuse, the forbidden company, etc.) and [grub.efi](https://www.virustotal.com/gui/file/290fad7c528fbc694c4963da6c0ec74543fba1e425c8f3e77c3c4218ff0d7bb3), [grubia32.efi](https://www.virustotal.com/gui/file/0b8ad9d23e56a0171760a69bfbb0d9dd5706b302ff995be32385b49af64ce423) are... something signed by longpanda's private key, aptly named `grub`. I still don't know where to get those shims or how to build the 2nd thing (probably something in https://github.com/ventoy/Ventoy/tree/master/EDK2/edk2_mod/edk2-edk2-stable201911/MdeModulePkg/Application), but at least I have something.
Author
Owner

@catherinedoyel commented on GitHub (Apr 13, 2025):

are... something signed by longpanda's private key, aptly named grub.

This is the MOK itself we have the password to it 123 as seen in the https://www.ventoy.net/en/doc_delete_key.html
I hope the key is present here if not your new fork could create a new path, this should be the key that is the enroll.cer file. If we can't access the original you can install a new one.

@catherinedoyel commented on GitHub (Apr 13, 2025): > are... something signed by longpanda's private key, aptly named `grub`. This is the MOK itself we have the password to it 123 as seen in the https://www.ventoy.net/en/doc_delete_key.html I hope the key is present here if not your new fork could create a new path, this should be the key that is the enroll.cer file. If we can't access the original you can install a new one.
Author
Owner

@Long0x0 commented on GitHub (Apr 13, 2025):

Does anyone here know which efi binary in (VTOYEFI)/BOOT/EFI is which?

I had listed some of them earlier: https://github.com/ventoy/Ventoy/issues/2795#issuecomment-2269378561 —see if they’re any help?

@Long0x0 commented on GitHub (Apr 13, 2025): > Does anyone here know which efi binary in `(VTOYEFI)/BOOT/EFI` is which? I had listed some of them earlier: https://github.com/ventoy/Ventoy/issues/2795#issuecomment-2269378561 —see if they’re any help?
Author
Owner

@fnr1r commented on GitHub (Apr 13, 2025):

Does anyone here know which efi binary in (VTOYEFI)/BOOT/EFI is which?

I had listed some of them earlier: #2795 (comment) —see if they’re any help?

They are. Shims + MokManager are in 5.10 (you missed the 32-bit one btw, INSTALL/EFI/BOOT/mmia32.efi), but the other two are still a mystery.
Thanks.

EDIT: It could be the bundled insecure preloader, but it's not in the build docs.

EDIT 2: I checked the hash. It probably is the preloader.

EDIT 3: Yep. github.com/ValdikSS/Super-UEFIinSecureBoot-Disk@f49380c586/efi-tools-patches/preloader.c.patch (L11)

@fnr1r commented on GitHub (Apr 13, 2025): > > Does anyone here know which efi binary in `(VTOYEFI)/BOOT/EFI` is which? > > I had listed some of them earlier: [#2795 (comment)](https://github.com/ventoy/Ventoy/issues/2795#issuecomment-2269378561) —see if they’re any help? They are. Shims + MokManager are in 5.10 (you missed the 32-bit one btw, `INSTALL/EFI/BOOT/mmia32.efi`), but the other two are still a mystery. Thanks. EDIT: It could be the bundled insecure preloader, but it's not in the build docs. EDIT 2: I checked the hash. It probably is the preloader. EDIT 3: Yep. https://github.com/ValdikSS/Super-UEFIinSecureBoot-Disk/blob/f49380c5867a5f4401dffbd3b45ff93eae469a05/efi-tools-patches/preloader.c.patch#L11
Author
Owner

@fnr1r commented on GitHub (Apr 16, 2025):

Progress update: I got IPXE with Ventoy patches building on Debian 12 after using NO_WERROR=1 and cherry-picking f982a712979619dbae2c6e0d741757e2ce94be11.
This took me way too long.

@fnr1r commented on GitHub (Apr 16, 2025): Progress update: I got IPXE with Ventoy patches building on Debian 12 after using NO_WERROR=1 and cherry-picking `f982a712979619dbae2c6e0d741757e2ce94be11`. This took me way too long.
Author
Owner

@fnr1r commented on GitHub (Apr 17, 2025):

For anyone who wants to try out the build system for shared components, it's here:
https://github.com/fnr1r/ventoy-boot/tree/experimental
As the branch name implies, it's still experimental. I'll squash it at some point.

@fnr1r commented on GitHub (Apr 17, 2025): For anyone who wants to try out the build system for shared components, it's here: https://github.com/fnr1r/ventoy-boot/tree/experimental As the branch name implies, it's still experimental. I'll squash it at some point.
Author
Owner

@fnr1r commented on GitHub (Apr 24, 2025):

Sorry for the recent lack of progress. I'm trying to work on tools for OSes I'm less familiar with (i.e. geom-ventoy for FreeBSD and whatever else is needed). I also have a bit of a code block / lack of inspiration. I'm also learning more about the inner workings of libc (and trying to split it up into smaller libraries).
It'll probably take me a couple of days to get back on track. In the meantime, I have a poll on a new name for the project in case my changes don't get accepted upstream.
https://github.com/fnr1r/ventoy-meta/discussions/1
I'm also still accepting feedback and pull requests.
Cheers and sorry for the silence. I don't wanna spam this thread.

@fnr1r commented on GitHub (Apr 24, 2025): Sorry for the recent lack of progress. I'm trying to work on tools for OSes I'm less familiar with (i.e. geom-ventoy for FreeBSD and whatever else is needed). I also have a bit of a code block / lack of inspiration. I'm also learning more about the inner workings of libc (and trying to split it up into smaller libraries). It'll probably take me a couple of days to get back on track. In the meantime, I have a poll on a new name for the project in case my changes don't get accepted upstream. https://github.com/fnr1r/ventoy-meta/discussions/1 I'm also still accepting feedback and pull requests. Cheers and sorry for the silence. I don't wanna spam this thread.
Author
Owner

@dzek69 commented on GitHub (Apr 24, 2025):

No worries @fnr1r , your "spam" is much more appreciated than any other comment in this thread 🙏🏻 Thanks for the good work.

@dzek69 commented on GitHub (Apr 24, 2025): No worries @fnr1r , your "spam" is much more appreciated than any other comment in this thread 🙏🏻 Thanks for the good work.
Author
Owner

@EpicLPer commented on GitHub (Apr 28, 2025):

@fnr1r Protogens taking over the world one by one, but first they take over your ISOs 👀
Great work so far!

@EpicLPer commented on GitHub (Apr 28, 2025): @fnr1r Protogens taking over the world one by one, but first they take over your ISOs 👀 Great work so far!
Author
Owner

@AchmadFathoni commented on GitHub (Apr 28, 2025):

Is the author still silent? Very fishy, no little convenient worth security risk.

@AchmadFathoni commented on GitHub (Apr 28, 2025): Is the author still silent? Very fishy, no little convenient worth security risk.
Author
Owner

@Aera23 commented on GitHub (May 2, 2025):

Is the author still silent? Very fishy, no little convenient worth security risk.

I wonder why wouldn't they have removed the issue to hide it?
If not... maybe they just left this as is... tho a concern to me is if the binaries are out of date and no longer secure...
an attacker would wait for the binaries to be insecure then make an exploit and distribute it somehow.

@Aera23 commented on GitHub (May 2, 2025): > Is the author still silent? Very fishy, no little convenient worth security risk. I wonder why wouldn't they have removed the issue to hide it? If not... maybe they just left this as is... tho a concern to me is if the binaries are out of date and no longer secure... an attacker would wait for the binaries to be insecure then make an exploit and distribute it somehow.
Author
Owner

@AchmadFathoni commented on GitHub (May 2, 2025):

Is the author still silent? Very fishy, no little convenient worth security risk.

I wonder why wouldn't they have removed the issue to hide it?
If not... maybe they just left this as is... tho a concern to me is if the binaries are out of date and no longer secure...
an attacker would wait for the binaries to be insecure then make an exploit and distribute it somehow.

It will be more fishy if they remove this issue, being neutral in this scenario is the best strategy to maintain status quo

@AchmadFathoni commented on GitHub (May 2, 2025): > > Is the author still silent? Very fishy, no little convenient worth security risk. > > I wonder why wouldn't they have removed the issue to hide it? > If not... maybe they just left this as is... tho a concern to me is if the binaries are out of date and no longer secure... > an attacker would wait for the binaries to be insecure then make an exploit and distribute it somehow. It will be more fishy if they remove this issue, being neutral in this scenario is the best strategy to maintain status quo
Author
Owner

@dzek69 commented on GitHub (May 2, 2025):

tho a concern to me is if the binaries are out of date and no longer secure...
an attacker would wait for the binaries to be insecure then make an exploit and distribute it somehow.

But... what would be the vector of attack in this case? An ISO file with a malware? Then even without Ventoy you're out of luck. I don't see a way to exploit an existing Ventoy install unless you put a malware on the disk yourself or your already infected PC does that for you, but both ways it's not Ventoy being exploited.

I don't like random binaries, but let's get real with throwing attacks.

@dzek69 commented on GitHub (May 2, 2025): > tho a concern to me is if the binaries are out of date and no longer secure... an attacker would wait for the binaries to be insecure then make an exploit and distribute it somehow. But... what would be the vector of attack in this case? An ISO file with a malware? Then even without Ventoy you're out of luck. I don't see a way to exploit an existing Ventoy install unless you put a malware on the disk yourself or your already infected PC does that for you, but both ways it's not Ventoy being exploited. I don't like random binaries, but let's get real with throwing attacks.
Author
Owner

@AchmadFathoni commented on GitHub (May 2, 2025):

tho a concern to me is if the binaries are out of date and no longer secure...
an attacker would wait for the binaries to be insecure then make an exploit and distribute it somehow.

But... what would be the vector of attack in this case? An ISO file with a malware? Then even without Ventoy you're out of luck. I don't see a way to exploit an existing Ventoy install unless you put a malware on the disk yourself or your already infected PC does that for you, but both ways it's not Ventoy being exploited.

I don't like random binaries, but let's get real with throwing attacks.

Something like xz should not be impossible

@AchmadFathoni commented on GitHub (May 2, 2025): > > tho a concern to me is if the binaries are out of date and no longer secure... > an attacker would wait for the binaries to be insecure then make an exploit and distribute it somehow. > > But... what would be the vector of attack in this case? An ISO file with a malware? Then even without Ventoy you're out of luck. I don't see a way to exploit an existing Ventoy install unless you put a malware on the disk yourself or your already infected PC does that for you, but both ways it's not Ventoy being exploited. > > I don't like random binaries, but let's get real with throwing attacks. Something like xz should not be impossible
Author
Owner

@josephernest commented on GitHub (May 6, 2025):

Someone reported this 2 hours ago: https://github.com/ventoy/PXE/issues/106

TL;DR:

  • download of official "iventoy-1.0.20-win64-free.zip"

  • extraction of iventoy.dat

  • conversion back to iventoy.dat.xz thanks to @ppatpat's Python code

  • I confirm that wintool.tar.xz is recognized by VirusTotal as something that injects fake trusted root certificates

The next steps are scary:

Analyzing "iventoy.dat.xz\iventoy.dat.\win\vtoypxe64.exe" we see it includes a self signed certificate named "EV" certificate "JemmyLoveJenny EV Root CA0" at offset=0x0002C840 length=0x70E.
vtoypxe64.exe programmatically installs this certificate in the registry as a "trusted root certificate"

@josephernest commented on GitHub (May 6, 2025): Someone reported this 2 hours ago: https://github.com/ventoy/PXE/issues/106 TL;DR: - download of official "iventoy-1.0.20-win64-free.zip" - extraction of `iventoy.dat` - conversion back to `iventoy.dat.xz` thanks to @ppatpat's Python code - I confirm that `wintool.tar.xz` is recognized by VirusTotal as something that injects fake trusted root certificates The next steps are scary: > Analyzing "iventoy.dat.xz\iventoy.dat.\win\vtoypxe64.exe" we see it includes a self signed certificate named "EV" certificate "JemmyLoveJenny EV Root CA0" at offset=0x0002C840 length=0x70E. > vtoypxe64.exe programmatically installs this certificate in the registry as a "trusted root certificate"
Author
Owner

@0x8008 commented on GitHub (May 7, 2025):

Thanks for giving me yet another reason as to refuse to use this shit.

@0x8008 commented on GitHub (May 7, 2025): Thanks for giving me yet another reason as to refuse to use this shit.
Author
Owner

@ventoy commented on GitHub (May 7, 2025):

Hi everyone, we can discuss this in ##3224

@ventoy commented on GitHub (May 7, 2025): Hi everyone, we can discuss this in ##3224
Author
Owner

@ventoy commented on GitHub (May 7, 2025):

I close the issue now and we can discuss this in #3224

@ventoy commented on GitHub (May 7, 2025): I close the issue now and we can discuss this in #3224
Author
Owner

@no-usernames-left commented on GitHub (May 7, 2025):

"Completed"? Wild.

@no-usernames-left commented on GitHub (May 7, 2025): "Completed"? Wild.
Author
Owner

@ventoy commented on GitHub (May 7, 2025):

"Completed"? Wild.

This thread is too long, I just open a new issue #3224, let's discuss there.

@ventoy commented on GitHub (May 7, 2025): > "Completed"? Wild. This thread is too long, I just open a new issue #3224, let's discuss there.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/Ventoy-ventoy#2162
No description provided.