And what exactly is the problem with the call of wget in this case?
Don't you trust docker.com?
Is the installation script borked?
Are you afraid of a priviledge escalation?
I could easily agree with your general lamento:
» but if a common way to use a software is to execute random stuff from other people's servers on your machine«
You wouldn't know without checking. This does not seem what most people do. There is no checking step in the tutorial.
Are you afraid of a priviledge escalation?
I am afraid of other people doing unwanted things on my computers, effectively making them their computers instead. And I can only try and warn everyone to not just type random commands from the internet because it is so nice and cozy to not care what happens on your computer.
And what exactly is the problem with the call of wget in this case?
Don't you trust docker.com?
Is the installation script borked?
Are you afraid of a priviledge escalation?
I could easily agree with your general lamento:
» but if a common way to use a software is to execute random stuff from other people's servers on your machine«
Though I see no problem here.
Perhaps you elaborate.
Do you? If you do: why?
You wouldn't know without checking. This does not seem what most people do. There is no checking step in the tutorial.
I am afraid of other people doing unwanted things on my computers, effectively making them their computers instead. And I can only try and warn everyone to not just type random commands from the internet because it is so nice and cozy to not care what happens on your computer.
In effect, you have no substantial critique regarding the script, the domain or something else in this case.
So: yes it is good to be careful. But without substantial critique you help effectively nobody.
I have a substantial critique regarding "containers" which are effectively blackboxes.
I would call that a generalization at best or just a prejudice.
Containers aren't black boxes.