• Mihies@programming.dev
    link
    fedilink
    arrow-up
    34
    arrow-down
    7
    ·
    1 day ago

    Security: Linux doesn’t need antivirus, just don’t install infected software. Riiiight? Sorry, but this is silly.

      • Mihies@programming.dev
        link
        fedilink
        English
        arrow-up
        1
        ·
        7 hours ago

        SELinux doesn’t help much when it comes to desktop apps. AFAIK it’s more geared towards server apps and its configuration is complicated. At least that’s my impression.

    • addie@feddit.uk
      link
      fedilink
      arrow-up
      46
      arrow-down
      1
      ·
      1 day ago

      Centrally managed repositories help a lot, here. Linux users tend not to download random software off of sketchy websites; it’s all installed and kept up to date via the package manager.

      Yes, Linux malware and viruses exist, and we shouldn’t pretend otherwise. The usual reason for installing Linux virus scanners is because you’re hosting a file/email server, and you want to keep infected files away from Windows users, tho.

      • Rooster326@programming.dev
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        36 minutes ago

        Linux users tend not to download random software off of sketchy websites; it’s all installed and kept up to date via the package manager.

        No experienced/power users do that. Those are who just so happen to install Linux.

        If you want Linux for everyone then you will get the users who will install anything, and you need a way to keep them reasonably safe.

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        2
        ·
        7 hours ago

        Linux does have some issues with social engineering since any file with the executable bit will run when clicked

        Outside of that, you are right

      • Railcar8095@lemmy.world
        link
        fedilink
        arrow-up
        11
        arrow-down
        2
        ·
        edit-2
        1 day ago

        Linux users tend not to download random software off of sketchy websites;

        Search for “sudo curl … | sh” and let me know how many hits you get.

        • Possibly linux@lemmy.zip
          link
          fedilink
          English
          arrow-up
          2
          ·
          7 hours ago

          Every time I see this a part of be dies inside. It is always a cursed install script that makes problematic changes to the system.

          • Flipper@feddit.org
            link
            fedilink
            arrow-up
            1
            ·
            7 hours ago

            It’s even worse. The server can detect if you are piping it straight into a shell or just downloading the file. It can then send different scripts based on that.

            • Railcar8095@lemmy.world
              link
              fedilink
              arrow-up
              1
              ·
              6 hours ago

              How can it see that? If possible, isn’t that a flaw of curl? I don’t see a good reason for the sever to know what you’re doing with the file

              • Flipper@feddit.org
                link
                fedilink
                arrow-up
                2
                ·
                4 hours ago

                Curl has a limited buffer and bash reads a line and then executes it, before reading the next line.

                So first you need a command that takes time if executed. So a delay, downloading a big file, user input work. Next you fill up the buffer. Just your normal script. Maybe some comments etc.

                Now the server can detect if after the first kB the stream stops.

        • 1984@lemmy.today
          link
          fedilink
          arrow-up
          7
          arrow-down
          2
          ·
          edit-2
          1 day ago

          Thats not random sketchy websites though.

          I would say Linux users who install software from the web knows what sites to trust. The beginners use the app store.

      • Mihies@programming.dev
        link
        fedilink
        arrow-up
        9
        arrow-down
        2
        ·
        1 day ago

        Even package managers are vulnerable to many security problems - can they guarantee that apps are not infected either directly or indirectly (through a library)? There is also flathub. Windows have also an option to verify apps through certificates which isn’t the case with Linux AFAIK. If you want to stay safe on Windows to some degree you can, but the real problem IMO is that Windows is hugely more used and run by less technical persons. 🤷‍♂️

        • Possibly linux@lemmy.zip
          link
          fedilink
          English
          arrow-up
          2
          ·
          7 hours ago

          This isn’t true

          Linux package managers typically use GPG which is a much better solution. It is simpler and doesn’t have the unnecessary complexity of certificates.

          What security problems do you think package managers are vulnerable to? If the upstream repo is compromised all bets are off regardless of the system.

          • Mihies@programming.dev
            link
            fedilink
            arrow-up
            1
            ·
            7 hours ago

            You are right, GPG signing is good as well. But in both cases you still have unsigned apps.

            What security problems do you think package managers are vulnerable to? If the upstream repo is compromised all bets are off regardless of the system.

            Yep. And in such case an antivirus software might come handy.