.
Hey all. I recently read Barry saying that in EasyOS 3.0, entering a password at first boot not only encrypts the user filesystem, but that also becomes the root password instead of "woofwoof" that everyone knows.
Well, I'm running Buster (I think 2.4) and I opted not to enter a password when I first booted (it's a desktop PC that never leaves my house so physical security isn't a problem and not encrypting makes it far easier to recover my files if Easy ever gets screwed up and won't boot). However I like the potential security benefits of changing root's password away from the generic "woofwoof".
With root as "woofwoof", if I run a browser as "spot", what's to prevent rogue code from simply doing a "sudo" (or similar privilege-escalation technique) with the KNOWN password "woofwoof"? Probably unlikely, but still unsettling.
Can I change root's password without screwing things up? Can I use the standard Linux method (the "passwd" command, I think it is), or will that mess up EasyOS somehow (e.g. does the boot-up process have a hardcoded "woofwoof" assumption, or any other implications?)
Thanks!
.