55 points

Lol as if Linux is free of malware.

permalink
report
reply
61 points

It was, 25 years ago. Same as Windows’ security was absent at that time.

But people never update their prejudices, so all the jokes are from the last millenium.

If you want an OS that is really malware-free, you need to run temple os.

permalink
report
parent
reply
34 points

If you want an OS that is really malware-free, you need to run temple os.

Can’t get malware if the OS is the malware. jk. RIP you crazy genius SOB.

permalink
report
parent
reply
25 points

It’s also pretty hard to get malware without network capabilities

permalink
report
parent
reply
12 points

God wouldn’t let you get malware on his chosen OS.

permalink
report
parent
reply
6 points

If you want an OS that is really malware-free, you need to run temple os.

*anything unpopular

permalink
report
parent
reply
2 points

Well, anything unpopular that doesn’t use any software (even low-level software) that is also commonly used in popular environments. For example, game consoles, embedded devices or car entertainment systems often use outdated versions of popular browser engines. So to hack these, you don’t need to be a highly skilled hacker, you just need to be able to try some older vulnerabilities.

And there are enough malicious websites that will just automatically check for these vulnerabilities. And then it’s enough to accidentally open one of these malicious websites and even though nobody wrote the hack specifically for your car, you might catch some malware regardless.

permalink
report
parent
reply
13 points

It isn’t, but you’re unlikely to encounter Linux specific malware.

permalink
report
parent
reply
6 points

I’ve been using Linux for almost 20 years, and AFAIK in all that time I’ve never encountered a Linux virus. OTOH when I run Windows, I hit a virus within the first six months.

permalink
report
parent
reply
8 points

Sounds like you have bad habits, I’ve had windows for years and no problems. Just scan with Defender after a download, occasional Malwarebytes scans to make sure, and you’re pretty safe.

Most viruses are written for windows but that doesn’t mean you’re just instantly safe. You can bet as Linux grows they’ll see far more.

permalink
report
parent
reply
3 points

Yeah last time I had a windows virus was because I got a bad Photoshop crack. But the virus was just a coin miner. Before that, I hadn’t had a virus in 13 years.

permalink
report
parent
reply
2 points
*

— When the Indian Amazon support guy sees you’re a junior on your first week and tells you to execute a script to install a software for a video call with him. And you do, but it needs sudo access, so you give it…

— You have sudo power here

Sadly, true story. I never told anyone. My neurons clicked a day after that and I removed everything from the computer. It was too late, they hacked some things but IT just laughed and recovered some backups. They never knew I was the virus all along.

Good times.

permalink
report
parent
reply
67 points

Pro tip: Infect your Windows friends with malware, then get them to switch to Linux

/s

permalink
report
reply
43 points

#unethicallinuxevangelismtips

permalink
report
parent
reply
1 point

Anarchy = War Anarchy = You killed

permalink
report
parent
reply
110 points

Wine appears in the output of ps aux.

Nervous not-an-emulator noises.

permalink
report
reply
4 points
*

Have people tried running malware in Wine? Would be interesting to see how ‘well’ the malware would work.

permalink
report
parent
reply
11 points

The cruder the malware, the better your chances of running successfully in Wine.

Because throwing together some simple executable using inbuild windows functions is much easier than programming something well-build and hidden based on deeper system layers. So your random “I just encrypted all your files because you clicked this .exe, now send me bitcoin to get it back”-bullshit might work well on wine (which is why wine should be run as it’s own user with no priviledges to access anything but your Windows programs).

permalink
report
parent
reply
3 points
*

winetricks sandbox

permalink
report
parent
reply
116 points
*
Deleted by creator
permalink
report
reply
-15 points

OSS is a double edged sword. It’s great, but the people looking for flaws that are exploitable are more often bad actors than good. At least that’s been my experience working in cyber security. Many CVEs that are responsibly disclosed are found to be actively exploited already.

permalink
report
parent
reply
38 points

The difference is the timing.

Exploit found in closed source software:

Probably years of usage by intelligence agencies and criminals until someone notices. (with no possible way to know for anyone that there even is a exploit). And even then it might take months for them to fix it.

Exploit found in oss: Depending on the usage of the software several people are looking for security holes and they usually get fixed ASAP. Of course it is possible that there’s an exploit nobody finds and a criminal uses, but it is not more likely because he can read the code. If your code must be secret to be secure your code is anything but secure

permalink
report
parent
reply
21 points

Yes, because “security through obscurity is not security”.

permalink
report
parent
reply
6 points

Also there is no incentive for companies to fix an exploit quickly. They will only release the fix with some scheduled update anyway or else people might notice that there was something worth fixing and that’s bad for your stock price.

permalink
report
parent
reply
43 points

Just use trusted repos 👍
We have GPG for a reason.

permalink
report
parent
reply
29 points
Deleted by creator
permalink
report
parent
reply
33 points
*

Possibly, but Firefox & Chrome based browsers have the same built-in isolation and other security measures as on Windows. Plus you can use Ublock Origins to get rid of malvertisements. If you really wanted, you can also isolate the browser entirely with something like firejail.
Hardend forks like LibreWolf are good too.
Oh, and Wayland also isolates clients from each other too.

I don’t think it’s that big of a threat as long as you keep some level of common sense.

permalink
report
parent
reply
3 points

Okay, what happens if your repo doesn’t have a specific software you are looking for? A trusted repo is good, but it won’t have everything you might want. This is especially true for new software or less popular software.

permalink
report
parent
reply
6 points
*

Install nix, flatpack, etc. ◉⁠‿⁠◉

permalink
report
parent
reply
2 points

You audit the code

permalink
report
parent
reply
13 points

There are a lot more ways to sneak malware into a system. Especially if some apps aren’t being maintained anymore. Linux is definitely safer, but you shouldn’t let your guard down

permalink
report
parent
reply
1 point
*
Deleted by creator
permalink
report
parent
reply
7 points

especially if you’re a developer. There are a lot of shenanigans going on with malware npm packages that prey on easy typos. I imagine it’s the same with other library installers for other languages too

permalink
report
parent
reply
9 points

I don’t think that’s the correct path. There is a scanner already, called ClamAV, which works well enough.
Virus scanners don’t fix the problem though. Android does it better: security by isolation and verification of system components.

permalink
report
parent
reply
6 points

The most important part in malware protection is whoever sits in front of the screen. Systems like Android have so many safeguards in place, the only way to get a virus is the user forcing it through themselves, pretty much.

permalink
report
parent
reply
5 points
*

I’m surprised it hasn’t seen wider workplace adoption.

A call centre I used to work in once scrapped all our Microsoft Office licences and installed OpenOffice on everyone’s workstations to cut costs. It was bad for the MI staff because they relied on Excel functionality that OO Calc simply didn’t have, but the vast majority of staff could get by on OpenOffice.

My only real criticisms of how they handled this was not giving people any notice, and making us use a shitty webmail app that only booted in Internet Explorer and would sign you out after a minute of inactivity to access our work emails. They could have easily installed and configured Mozilla Thunderbird to give us some quality of life that Outlook once afforded us.

Also this happened a few years after Oracle got their hands on OO, so not using LibreOffice was also questionable.

But still. Think about the shitloads of money you’d save by using Linux in the office.

permalink
report
parent
reply
8 points

There’s already a ton of such exploits. Most servers use Linux and many exploits of corporations this had to go through Linux (though many exploits aren’t related to the OS at all – eg, SQL injection is OS independent). I expect it’s more common, though, that attacks on Linux systems are either meant to target servers or were personalized attacks that you’re not gonna accidentally download.

On that vein, I also kinda suspect that many people who use Linux may be bigger targets for their employer than their personal PC. Which is actually scary, cause personalized attacks are far harder to defend against. I expect the average Linux user is technically savvy. Not a lot of money in try to do a standard, broad attack on such types (I think most attacks on personal computers are broad attempts that mostly depend on a small fraction of technologically incompetent people falling for simple schemes). But a personalized attack that happens to infiltrate a fortune 500 company? Now that’s worth a lot of money. Using Linux won’t protect you against those kinda attacks.

permalink
report
parent
reply
5 points

What if the virus is written in javascript

permalink
report
reply
9 points

Then I’ll go back in time and install NoScript on my browser

permalink
report
parent
reply
12 points

then i will contact the malware developers and rewrite it in rust /s

permalink
report
parent
reply

linuxmemes

!linuxmemes@lemmy.world

Create post

I use Arch btw


Sister communities:
Community rules
  1. Follow the site-wide rules and code of conduct
  2. Be civil
  3. Post Linux-related content
  4. No recent reposts

Please report posts and comments that break these rules!

Community stats

  • 7.5K

    Monthly active users

  • 1.2K

    Posts

  • 66K

    Comments