Mahmoud Khalil Discusses 3-Month Detention in First Interview Since Release
cross-posted from: lemmy.ml/post/32115867
By Jonah E. Bromwich
June 22, 2025 Updated 8:10 p.m. ETThe administration argued that he had contributed to the spread of antisemitism through his role in the protests at the university.
But Mr. Khalil, a Palestinian born in a Syrian refugee camp, rejected the idea that protesting against Israel is inherently antisemitic.
“I was not doing anything antisemitic,” he said. “I was literally advocating for the right of my people. I was literally advocating for an end of a genocide. I was advocating that the tuition fees that I and other students pay don’t go toward investing in weapons manufacturers. What’s antisemitic about this?”
https://www.nytimes.com/2025/06/22/nyregion/mahmoud-khalil-interview-trump.html
Mahmoud Khalil Discusses 3-Month Detention in First Interview Since Release
By Jonah E. Bromwich
June 22, 2025 Updated 8:10 p.m. ET
The administration argued that he had contributed to the spread of antisemitism through his role in the protests at the university.
But Mr. Khalil, a Palestinian born in a Syrian refugee camp, rejected the idea that protesting against Israel is inherently antisemitic.
“I was not doing anything antisemitic,” he said. “I was literally advocating for the right of my people. I was literally advocating for an end of a genocide. I was advocating that the tuition fees that I and other students pay don’t go toward investing in weapons manufacturers. What’s antisemitic about this?”
https://www.nytimes.com/2025/06/22/nyregion/mahmoud-khalil-interview-trump.html
Sorella di Perfezione - le poesie di Giuseppe Iannozzi - in libreria e negli Store online - LFA Publisher
Sorella di Perfezione - le poesie di Giuseppe Iannozzi - in libreria e negli Store online - LFA Publisher
**youtube.com/shorts/hk8RXKTvNTw…
Ulteriori informazioni su "Sorella di Perfezione"
**iannozzigiuseppe.wordpress.com…
“Sorella di Perfezione” di Giuseppe Iannozzi – booktrailer – LFA Publisher
Sorella di Perfezione offre al lettore poesie che trattano molteplici temi: amore, amicizia, erotismo, vita, morte, tristezza, solitudine, paranoia, ossessione, spiritualità. L’autore Giuseppe Iann…Iannozzi Giuseppe - scrittore e giornalista
Israel slams EU over ‘outrageous and indecent’ Gaza human rights review
Israel slams EU over ‘outrageous and indecent’ Gaza human rights review
An internal EU review of the trade agreement with Israel says there are "indications of a breach" of the humanAlexandra Brzozowski (EURACTIV)
Met chief 'shocked' by planned Palestine Action protest
Met Police chief 'shocked' by planned Palestine Action protest in London
The force says it cannot legally stop Monday's protest in support of the pro-Palestine group.Jacqueline Howard (BBC News)
Israeli Forces Slaughter 48 More Palestinians in Gaza Over 24 Hours
Israeli Forces Slaughter 48 More Palestinians in Gaza Over 24 Hours - News From Antiwar.com
Gaza's Health Ministry said on Sunday that Israeli attacks killed at least 48 Palestinians and wounded 104 over the previous 24 hours as the US-backed genocidal war continues, with much of the world's attention focused on the US attacks on Iran.News From Antiwar.com
Are there any examples of Linux (desktop) viruses that are actively or were recently in circulation?
like this
Desperation mounts in Gaza as Palestinians are killed while seeking food aid
Desperation mounts in Gaza as Palestinians are killed while seeking food aid
While the world’s attention is focused on Iran, Israel’s war in Gaza continues. Gaza health officials said Israeli strikes over the past 24 hours killed 51 Palestinians and wounded 104.John Yang (PBS News)
Why Are Americans Letting Israel Starve Us to Death in Gaza?
Why Are Americans Letting Israel Starve Us to Death in Gaza? | Truthout
US veto power at the UN is blocking Gaza’s chance for survival.Samantha Borek (Truthout)
Criminals could pick up your voice through a foot-thick concrete wall, thanks to AI and a flaw in popular laptop microphones - here's what you need to know
Criminals could pick up your voice through a foot-thick concrete wall, thanks to AI and a flaw in popular laptop microphones - here's what you need to know
New AI trick turns regular FM radios into creepy eavesdropping toolsEfosa Udinmwen (TechRadar)
Hackers could trick users into downloading malware and opening malicious sites using a flaw in Android - here's what you need to know
Hackers could trick users into downloading malware and opening malicious sites using a flaw in Android - here's what you need to know
That Android notification link may not be what it looks like, and it could cost youEfosa Udinmwen (TechRadar)
Right to self-defense with no consideration of UN Charter leads to chaos — Lavrov
Right to self-defense with no consideration of UN Charter leads to chaos — Lavrov
US President Donald Trump reported overnight into June 22 that the US had conducted a successful attack on three nuclear sites in Iran, including Isfahan, Natanz, and FordowTASS
Coral Creek Canyon Trail/Cline River Trail Kiska/Wilson PLUZ, Alberta
Still to the east of Icefields Parkway the Cline river feeds into the N. Saskatchewan river. You’ll hike above the canyons carved over time by the Cline for 2 miles before heading back while seeing 3 or 4 waterfalls (still frozen at time of hike) and have sweeping views of Sentinel mountain. On the return, you can come back the way you came (recommended) or return via a horse trail that loses the majority of the view. Hiked 5/21
The Cline river flows away from Sentinel Mountain before cutting its way into the canyon below.
The Cline river cut through this ridge over time, creating the entrance to a slot canyon. The stream quickly redirects itself as it hammers into the cliff wall.
The still frozen waterfall shows some life as a small trickle finds its way out the lower section. There were 3 or 4 still frozen falls along the trail. Black and white.
The Cline river exits a slot canyon with Sentinel mountain off in the distance.
Republican representative’s ectopic pregnancy clashes with Florida abortion law
Republican representative’s ectopic pregnancy clashes with Florida abortion law
Kat Cammack blames left’s fearmongering after medical staff hesitated to give her drugs needed to end pregnancyEdward Helmore (The Guardian)
Sir Trevor Chinn: The Tycoon Who Hijacked British Democracy for Israel
He likes to keep a low profile. But Sir Trevor Chinn is one of the most powerful men in British politics.
The retired businessman has donated millions to politicians, facilitated Prime Minister Keir Starmer’s rise to power, helped destroy the movement around Jeremy Corbyn, and, above all, has made sure that both major parties support Israel and its expansionist project in the Middle East.
MintPress News profiles perhaps the most influential man in the pro-Israel lobby and lifts the veil of anonymity he hides behind.
Chinn, McEvoy told MintPress, plays an “important but overlooked role in British politics.” Since the 1980s, he noted, Chinn has funded both Labour Friends of Israel (LFI) and Conservative Friends of Israel (CFI), pressure groups within the U.K.’s two largest political parties. He was also a member of the executive committee of the Britain Israel Communications and Research Centre (BICOM), the most influential pro-Israel lobbying organization in the United Kingdom.
As such, Chinn sits at the head of a massive influence operation aiming to make sure that Great Britain continues to support Israeli interests. The scope of this operation is staggering; pro-Israel lobby groups have funded the majority of the British cabinet. In total, 13 out of 25 sitting cabinet members have accepted money directly from Chinn, or pro-Israel groups, according to McEvoy’s investigation.
This includes many extremely powerful figures, such as Foreign Secretary David Lammy, Home Secretary Yvette Cooper, and Health Secretary Wes Streeting. Chinn himself has donated hundreds of thousands of pounds to these individuals.
Sir Trevor Chinn: The Tycoon Who Hijacked British Democracy for Israel
Sir Trevor Chinn has bankrolled politicians across the spectrum, from Blair to Starmer, using his fortune to ensure Britain serves Israeli interests.Alan Macleod (MintPress News)
Sources mean nothing these days. I cannot name a single trustworthy newspaper anymore.
The only thing that matters is whether they have the evidence to back up their claims. On that Alan McLeod delivers like usual.
Kneecap’s Glastonbury performance not ‘appropriate’, says Keir Starmer
Kneecap’s Glastonbury performance not ‘appropriate’, says Keir Starmer
UK prime minister criticises band’s inclusion in festival lineup after Liam Óg Ó hAnnaidh allegedly displayed flag supporting HezbollahHayden Vernon (The Guardian)
you can still use OpenRC instead if you want, and sxmo will continue to do so by default.
you can read here about why they added systemd.
As much as we might want to romanticise the idea of spending 6, 12, 24 months attempting to come up with an even vaguely competitive alternative to systemd,
There are alternatives like runit, dinit, s6. About some of the more useful features of systemd, how about we recreate them without thight coupling to one specific init+service manager-in-one?
like this
Elon Musk wants to rewrite "the entire corpus of human knowledge" with Grok
We will use Grok 3.5 (maybe we should call it 4), which has advanced reasoning, to rewrite the entire corpus of human knowledge, adding missing information and deleting errors.Then retrain on that.
Far too much garbage in any foundation model trained on uncorrected data.
::: spoiler More Context
Source.
:::
Elon Musk (@elonmusk)
Please reply to this post with divisive facts for @Grok training. By this I mean things that are politically incorrect, but nonetheless factually true.Nitter
like this
Elon Musk wants to rewrite "the entire corpus of human knowledge" with Grok
We will use Grok 3.5 (maybe we should call it 4), which has advanced reasoning, to rewrite the entire corpus of human knowledge, adding missing information and deleting errors.Then retrain on that.
Far too much garbage in any foundation model trained on uncorrected data.
::: spoiler More Context
Source.
:::
adhocfungus likes this.
Why America Is at War with Iran [Michael Hudson]
Opponents of the war with Iran say that the war is not in American interests, seeing that does not pose any visible threat to the United States. This appeal to reason misses the neocon logic that has guided U.S. foreign policy for more than a half century, and which is now threatening to engulf the Middle East in the most violent war since Korea. That logic is so aggressive, so repugnant to most people, so much in violation of the basic principles of international law, the United Nations and the U.S. Constitution, that there is an understandable shyness in the authors of this strategy to spell out what is at stake.What is at stake is the U.S. attempt to control the Middle East and its oil as a buttress of U.S. economic power, and to prevent other countries from moving to create their own autonomy from the U.S.-centered neoliberal order administered by the IMF, World Bank and other international institutions to reinforce U.S. unipolar power.
Around 1974 or 1975 there was much talk of creation a New International Economic Order (NIEO). I was working at the Hudson Institution with Herman Kahn on international finance and trade, and he brought me to sit in on a military strategy discussion of plans being made already at that time to possibly overthrow Iran and break it up into ethnic parts. Herman found the weakest spot to be Baluchistan, on Iran’s northeast border with Pakistan. The Kurds, Tajiks and the Turkic Azerbaijanis are others whose ethnicities were to be played off against each other, giving U.S. diplomacy a key potential client dictatorship to reshape both Iranian and Pakistani political orientation if need be.
Three decades later, by 2003, General Wesley Clark pointed to Iran as being the capstone of seven countries that the United States needed to control in order to dominate the Middle East, starting with Iraq and Syria, Lebanon, Libya, Somalia and Sudan, culminating in Iran.
From the view of U.S. strategists, the emergence of China’s industrial socialism poses an existential danger to U.S. unipolar control in providing a model that other countries might seek to join to recover the national sovereignty that has been steadily eroded in recent decades.
The motivation has nothing to do with Iran’s attempt to protect its national sovereignty by developing an atom bomb. The basic problem is that the United States has taken the initiative in trying to pre-empt Iran and other countries from breaking away from dollar hegemony.
Here’s how the neocons spell out the U.S. national interest in overthrowing the Iranian government and introducing a regime change – not necessarily a secular democratic regime change, but perhaps an extension of the ISIS-Al Qaida Syrian Wahabi terrorists.
With Iran and its component parts turned into a set of client oligarchies, U.S. diplomacy can control Near Eastern oil. And control of oil has been a cornerstone of U.S. international economic power for a century, thanks to U.S. oil companies operating internationally and also as domestic U.S. producers of oil and gas. Control of Near Eastern oil also means control of the vast holdings of U.S. Treasury securities and private-sector investments by Saudi Arabia and other OPEC countries.
Iran also is a key to blocking Russian development via the Caspian and access to the south. Under U.S. control, an Iranian client regime could threaten Russia from its southern flank, bypassing the Suez Canal.
To the Neocons, this makes Iran a central pivot on which U.S. national interest is based – if you define that national interest as creating a coercive empire of client states.
The ostensible US military budget actually is much larger than is reported in the bill. Congress funds it in two ways: The obvious way is by direct arms purchases paid for by Congress directly. Less acknowledged is MIC spending routed via U.S. foreign military aid to its allies – Ukraine, Israel, South Korea, Europe and Asian countries to buy U.S. arms. This shows the extent to which the military burden is what normally accounts for the entire U.S. budget deficit and hence the rise in ostensible government debt (much of it self-financed by the Federal Reserve since 2008, to be sure).
Michael Hudson: Why America Is at War with Iran | naked capitalism
The neocon logic for needing to defeat Iran and break it into ethnic partsYves Smith (naked capitalism)
'We don't want to outsource what makes us human' as AI starts replacing workers
ABC News
ABC News provides the latest news and headlines in Australia and around the world.Rhiana Whitson (Australian Broadcasting Corporation)
'We don't want to outsource what makes us human' as AI starts replacing workers
ABC News
ABC News provides the latest news and headlines in Australia and around the world.Rhiana Whitson (Australian Broadcasting Corporation)
Fatphobia Is Fueled by AI-Created Images, Study Finds
Fatphobia Is Fueled by AI-Created Images, Study Finds
A Fordham student's research found that negative words were more likely to produce images of overweight people in image generation programs.Chris Gosier (Fordham Now)
Fatphobia Is Fueled by AI-Created Images, Study Finds
Fatphobia Is Fueled by AI-Created Images, Study Finds
A Fordham student's research found that negative words were more likely to produce images of overweight people in image generation programs.Chris Gosier (Fordham Now)
Bill Gates and Linus Torvalds meet for the first time.
I had the thrill of a lifetime, hosting dinner for Bill Gates, Linus Torvalds and David Cutler. Linus had never met Bill, and Dave had never met Linus. No major kernel decisions were made, but maybe next dinner 😉
I had the thrill of a lifetime, hosting dinner for Bill Gates, Linus Torvalds and David Cutler.
I had the thrill of a lifetime, hosting dinner for Bill Gates, Linus Torvalds and David Cutler. Linus had never met Bill, and Dave had never met Linus. No major kernel decisions were made, but maybe next dinner 😉 | 577 comments on LinkedInMark Russinovich (www.linkedin.com)
Bill Gates and Linus Torvalds meet for the first time.
I had the thrill of a lifetime, hosting dinner for Bill Gates, Linus Torvalds and David Cutler. Linus had never met Bill, and Dave had never met Linus. No major kernel decisions were made, but maybe next dinner 😉
I had the thrill of a lifetime, hosting dinner for Bill Gates, Linus Torvalds and David Cutler.
I had the thrill of a lifetime, hosting dinner for Bill Gates, Linus Torvalds and David Cutler. Linus had never met Bill, and Dave had never met Linus. No major kernel decisions were made, but maybe next dinner 😉 | 577 comments on LinkedInMark Russinovich (www.linkedin.com)
adhocfungus likes this.
Linus Torvalds and Bill Gates Meet for the First Time Ever
Bill Gates and Linus Torvalds meet for the first time.
Microsoft co-founder Bill Gates and Linus Torvalds, the creator of the Linux kernel, have surprisingly never met before. That all changed at a recent dinner hosted by Sysinternals creator Mark Russinovich.Tom Warren (The Verge)
like this
New Orleans debates real-time facial recognition legislation
New Orleans has emerged as a flashpoint in debates over real-time facial recognition technology. The city’s leaders are weighing a landmark ordinance that, if passed, would make New Orleans the first U.S. city to formally legalize continuous facial surveillance by police officers.The move follows revelations that, for two years, the New Orleans Police Department (NOPD) quietly used automated alerts from a privately operated camera network known as Project NOLA that bypassed the strictures of the city’s 2022 ordinance which explicitly banned such practices. Project NOLA is a non-profit surveillance network founded by ex-police detective Bryan Lagarde.
Despite this, Project NOLA’s network was set to continuously and automatically scan public spaces. Every face that passed within view was compared in real time, and officers were pinged via an app whenever a watchlist match occurred, leaving no requirement for supervisory oversight, independent verification, or adherence to reporting standards.
Opponents argue that automated surveillance everywhere in public spaces raises profound threats to privacy, civil rights, and due process. The American Civil Liberties Union (ACLU) of Louisiana described the system as a “facial recognition technology nightmare” that enables the government to “track us as we go about our daily lives.”
The wrongful arrest of Randal Reid based on misidentification from still-image facial recognition is touted as highlighting the real-world dangers of facial recognition. Reid is a 29‑year‑old Black logistics analyst from Georgia who was wrongfully arrested in late 2022 and held for six days due to a false facial recognition match.
The ACLU has urged the City Council to reimpose a moratorium and demand an independent audit covering privacy compliance, algorithmic bias, evidence admissibility, record retention, and public awareness. The organization said that NOPD currently lacks any system for logging or disclosing facial-recognition-derived evidence, and Project NOLA operates outside official oversight entirely.
A vote by the City Council is expected later this month. If passed, NOPD and any authorized third party will be legally empowered to scan live public feeds using facial recognition, provided reports are submitted according to the new law.
Meanwhile, NOPD is awaiting the outcome of its internal audit and Kirkpatrick has stated that policy revisions will be guided by the council’s decisions. Meanwhile, the ACLU and partners are preparing to escalate their opposition, pushing for either outright prohibition or deeply strengthened accountability measures.
The decision facing New Orleans encapsulates the broader tension between embracing AI-based public safety tools and protecting civil liberties. Proponents emphasize the edge that real-time intelligence can provide in stopping violent crime and responding to emergencies, while critics warn that indiscriminate surveillance erodes privacy, civil rights, and due-process safeguards.
A few things I feel are very important that none of the recent June articles about this mention:
- The city has managed to keep this all relatively under wraps. Few people are even aware of this, and even if they are they are not aware of the level of surveillance.
- This seems to be being kept in the dark even by people that we should be able to trust. I only found out about the City Council vote this month bc I make a habit of searching for updates about this every so often. I cannot find any information about when the vote is actually scheduled, just sometimes at the end of June. This is the last week of June so presumably this week?
- State Police and ICE can't be regulated by city government. There is a permanent state police force in New Orleans that was established as of last year by Governor Landry.
I believe they have continued using this technology however they please, and there is no real way for the city to regulate how they use it, and who they share it with.
New Orleans debates real-time facial recognition legislation
The landmark ordinance, if passed, would make New Orleans the first U.S. city to formally legalize continuous facial surveillance by police officers.Anthony Kimery (BiometricUpdate.com)
adhocfungus likes this.
Vaxry: About Hyprland Premium
(from Vaxry, creator of Hyprland)
Hey hey people, vax here.
I've seen the post about Hyprland Premium go a bit viral and people don't seem to understand fully what we're doing.
There is a reason no pages link to the account. subdomain, because it's a work in progress, after all. That's why wording is a bit lacking, that's why registrations are closed.
Anyways, here are some key takeaways:
Yes, it's real
It's the official website. I did not get hacked.
Hyprland is not going closed source
It says that in the first sentence on the page. No paid features, beta branches, etc. We continue development as always.
Why money
I need something to eat too. Once I end university, if I can't make this my full-time job, I will have to severely decrease my contributions in favor of a real job. If this gets us somewhere, it will be only with benefits to you, the users. If I get enough money to hire another guy to help me work on Hyprland full time, I will.
Forums:
Already on forum.hypr.land. To log in, you need a Hyprland Account, that's why we haven't "fully" launched them yet.
"Premium" Forums:
Additional categories on the same forum for premium subscribers - these include premium support (where you get answers from me instead of the community at large), Q&A with me, and some banter chats.
Desktop Experience:
Free desktop experience: Dotfiles provided by us, with one-click installs and updates.
Premium desktop experience: Same as above, but with more customization options. (dotfile customizations, e.g. "bar on what side", "what button where", etc, not Hyprland features)
"Further premium services":
A general catch-all clause if any premium services come out in the future, they will most likely just be a part of the premium subscription. This might be dotfile sync, or other ideas. We don't know yet, that's why we didn't say.
Cheers, happy Hyprlanding.
Schizophrenic I doubt, but how on earth could he NOT have delusions of grandeur?
Rich as fuck, does the most stupid shit, still get elected to be the representing spearhead-figure of the US, does even more stupid things and yet people love him and even get tattoos of his fuckface....
If that doesn't skew your self-criticism to "dang, I really must be frigging awesome" in an unhealthy way, what could?
Israelis emerge from shelters to devastation after Iran attacks 🎻
Israelis emerge from shelters to devastation after Iran attacks
First responders fanned out across Israel Sunday following fresh waves of Iranian missile strikes that left pockets of devastation in their wake -- as the Islamic republic hit back after a US attack on its nuclear sites.France 24 (FRANCE 24)
Quando l’Italia si fece rispettare dagli Stati Uniti… con un incrociatore! da Difesa Online
Quando l’Italia si fece rispettare dagli Stati Uniti… con un incrociatore!
Nel marzo del 1891, a New Orleans, si consumò una delle pagine più oscure nella storia degli Stati Uniti: undici immigrati italiani furono linciati da una folla inferocita che fece irruzione nella prigione locale dopo che la giustizia aveva assolto o…Difesa Online
just_another_person
in reply to monovergent • • •Not in the way you're probably thinking, which I assume is like in a Windows-y kind of way.
Finding an exploitable escalation of privileges in Linux is rare, but unpatched machines get hacked all the time, but the world of worms, and such is kind of gone.
The way most end-user machines get compromised these days is by supply chain attacks, undiscovered zero-day exploits, user error, and social engineering. Groups that discover zero-days usually keep it close the vest, and they don't get found for long periods of time after they've been out in the wild.
The way most corporate machines get attacked is social engineering, supply chain, and zero-days. Mostly crypto mining schemes and enterprise-level ransoms for data.
All the Windows botnets you hear about out there are largely unpatched machines exposed to the internet in various stupid ways that groups prey on to take control of.
Edit: Forgot about leaked secrets. Lots of companies get hit from plaintext secrets that get out in the wild via various stupid means.
slackness
in reply to just_another_person • • •SmoochyPit
in reply to monovergent • • •I haven’t heard of any such cases, but it is a smaller pool of users. Also, many desktop Linux users know more about using a computer than other operating system users, since it’s less common for Linux to come preinstalled. So that may affect it, too.
I imagine vulnerabilities with the Linux kernel or common utilities do apply to desktop users as well, which is a good reminder why staying up-to-date is important. But to my understanding, exploiting remotely would need a way of sending data to the target. And most desktop computers won’t have ports open to the internet for anyone like servers will.
I know that Wayland’s design does make it more difficult for a user-mode program to act maliciously, like as key-loggers or reading the clipboard.
Quazatron
in reply to SmoochyPit • • •~~There, I fixed it for you.~~
This is about desktop Linux, so I was wrong to correct you. My bad.
SmoochyPit
in reply to Quazatron • • •a Kendrick fan
in reply to SmoochyPit • • •Sorry, can you tell me more about this?
SmoochyPit
in reply to a Kendrick fan • • •Sorry for the late reply. Also @Cricket’s response is great and actually references a source!
Anecdotally though, as a user, I’ve noticed that some things require extra permissions. Usually there’s a prompt from the operating system that’ll ask for permission capture the desktop, which lets me specify which window or monitor to share. It uses the “XDG Desktop Portal”, which was already what allowed Flatpaks to securely access OS resources, and it has a whole bunch of different requests for resources and permissions. It’s similar to a web browser, where it’ll prompt you for privileges when an app wants them.
The hardest pain point for me has been that an app cannot detect keyboard input if it isn’t focused. This could prevent key loggers, but it also makes global shortcuts not work. There is a protocol that allows an app to request a key be forwarded to it, but it’s not widely implemented in apps (discord, for example) and I’ve had to rely on workarounds.
BCsven
in reply to monovergent • • •DeuxChevaux
in reply to monovergent • • •XXIC3CXSTL3Z
in reply to monovergent • • •squaresinger
in reply to monovergent • • •HiddenLayer555
in reply to monovergent • • •TLDR: While Linux is less susceptible to malware in some ways, it mostly boils down to Linux having a more technically minded userbase whereas Windows is a "mainstream" operating system.
Most Windows malware nowadays come from social engineering scams (complete this "captcha" by pressing Windows+R and pasting in this powershell script we conveniently put in your clipboard) or untrusted third party installers because Windows doesn't natively have a package manager. Like others have said, the old school self-propagating worms and drive by downloads that activate just by clicking on a link aren't really possible anymore (outside of state actors with unlimited budgets to buy zero days) unless your system or browser is horrifically outdated.
In terms of social engineering, Linux is not necessarily better at preventing it than Windows. In fact, sudo in Linux will unquestioningly delete the kernel and system software or make unlimited changes to them. Windows, for better or for worse (tbh more worse than better), uses TrustedInstaller to limit access to system files. Windows 11 won't easily let you delete or modify System32 for example, even if you're an admin. So it's in theory easier to do more damage to your system on Linux if you don't know what you're doing. But if someone is using Linux full time, they're most likely technical enough to not be fooled into running random untrusted bash commands.
The biggest thing is to be careful with those Linux terminal tutorial sites that have a "add to clipboard" button, they can put literally anything into your clipboard, including an enter key to run the script as soon as you put it in your terminal (though this may or may not be possible depending on your terminal app). Actually, they don't even need you to use their copy button. They can just set an event listener for control-C anywhere on their site and automatically replace the clipboard content. Just double check everything you copy before running it, especially since there's a lot of times where Linux users have to rely on obsecue tutorials hosted on untrusted websites.
You also don't really need to run untrusted installers on Linux because almost everything you need is in a properly moderated software repository, be it your native package manager, Flatpak, or Snap. Everything is signed by the authors and has a ton of eyes from the open source community on it. The only things to look out for is compiling something from GitHub, random AppImages, Elf binaries, scripts, and last but not least third party repositories that can be added as an installation source to your package manager/Flatpak/Snap. Basically, Linux gets most of its "doesn't get malware" reputation from the same place Mac does: you rarely have to manually download and run an executable from a random website, which is the norm on Windows. Add to the fact that even when that's needed, the Linux userbase is more technical and is more able to discern which sources are reputable and which are suspicious.
Another major source of malware is pirated versions of Windows or untrusted "license activators" from the internet. This just isn't a problem on Linux because there's no license to activate and it's free to begin with so there's nothing to pirate. And again, if someone is running Linux, they're probably technical enough to know not to run random pirated versions of paid software to begin with, helped by the fact that the vast majority of paid software is Windows only.