• eldain@feddit.nl
    link
    fedilink
    arrow-up
    2
    ·
    edit-2
    27 minutes ago

    Everyone should think about threats to their data. Cloud backup and laptops better be encrypted, services with open ports be shielded. Linux viruses do exist, especially for android and routers. But also whatever system has an outdated dokuwiki open in the wild is a welcome addition to a botnet. The value of a botnet is in number of infected systems and you don’t need root access to mine monero or take part in a ddos on a machine. Linux security is sincerely undervalued. Selinux, the grsec kernel patches, chrootjail, tripwire… do exist, but are a hassle to setup and maintain. The new container options are nice (docker or flatpack) having your webbrowser contained is not a bad idea.

    Update your router, your desktop is spoiled for updates. I stop my 1 am ramblings here.

  • drosophila@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 hour ago

    An antivirus is mostly just a blacklist of known malware. Sometimes heuristics are used such as ‘this piece of software isn’t installed on many PCs, and it appears to be doing shady stuff like, monitoring keystrokes or listening to your microphone’. But unless your antivirus is actually sentient there’s no way for it to really distinguish between a chat application that listens to your microphone so you can talk to your friends / monitor your keystrokes to know when you’ve hit the push-to-talk key, and a piece of actual malware that intends to spy on you and blackmail you.

    What you have with a package manager is a whitelist of programs that have been selected by your distro maintainers. Is it completely impossible for someone to sneak malware into a distro’s repository? No, but its a lot easier to maintain a list of known good software than it is to maintain a list of known bad software. And in that situation your antivirus isn’t going to help you anyway, since the people maintaining its malware list aren’t going to magically know that something is malware before the distro maintainers do.

    So, generally, just using your package manager instead of running random shit you find online is going to be a lot better than any antivirus. With things like Wayland and Flatseal becoming more common we’re heading towards a situation where fine-grained per-package permissions will become the standard way distros do things, making antivirus even more unnecessary.

    We should have done that a long time ago, as the security model of ‘any program you run can do anything you can by default’, then blacklist the ones that inevitability abuse that privilege, is completely backwards.

      • drosophila@lemmy.blahaj.zone
        link
        fedilink
        English
        arrow-up
        1
        ·
        7 minutes ago

        In addition to what groet said, I’ll add that this is a little bit like asking “what’s the difference between a public library and Amazon?”.

        Yes, there are other public libraries you could go to if the one you subscribe to didn’t have something you wanted or ‘went bad’ somehow, but the most important difference is you don’t have an antagonistic relationship with your public library. Your public library doesn’t have a financial incentive to try to trap you or screw you over.

      • groet@feddit.org
        link
        fedilink
        arrow-up
        1
        ·
        25 minutes ago

        You can install packages from other places and create your own (and then install them). The distro maintainers have one (or multiple) list of “approved” software but you can add as many lists as you want to your package manager. Often software developers will have their own package list that contains only their own software and if you install it you have to add that list to your package managers trusted software locations. In that sense it isn’t really better than going to the developers website and downloading an installer on windows but it is quite rare you have to do that

  • Dizzy Devil Ducky@lemm.ee
    link
    fedilink
    English
    arrow-up
    18
    ·
    4 hours ago

    As someone who may obtain games and shows/movies through less than rights holder approved methods, ClamAV is a necessity.

    • Maiq@lemy.lol
      link
      fedilink
      arrow-up
      11
      ·
      3 hours ago

      Not just for the pirate though. If you share any files between nix and win OS’s. I wouldn’t want to share any computer std with those I care for, friend, family or business.

      There are also cool tools like chkrootkit and rkhunter that might come in handy.

  • Screen_Shatter@lemmy.world
    link
    fedilink
    arrow-up
    12
    ·
    4 hours ago

    I just switched to linux and totally forgot about this. Do I really not need one? 99% of what I do is steam gaming anyway so I’m not too worried, worst case I just format and reinstall, but still…

    • kernelle@0d.gs
      link
      fedilink
      arrow-up
      1
      ·
      7 minutes ago

      ‘The best anti-virus is common sense [current year]’ - was a meme more than decade ago and is still true. Linux is not safer than any other OS.

      The reason why people think otherwise is because statistically, when bad actors release malware it’s made for the OS with the largest market share. Which for computers, is still Windows by a landslide.

    • Forester@pawb.social
      link
      fedilink
      English
      arrow-up
      7
      ·
      2 hours ago

      Most malware is not Linux compatible. However the stuff that is will fuck you over very hard. Get clamav set a cron

      • LordKitsuna@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        59 minutes ago

        Nah just enable and enforce apparmor, use bubblewrap for the browser or unknown sources. Clamav is mostly useful for ingress detection on like email or ftp servers

    • azha@lemm.eeOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 hour ago

      better be safe than sorry so get Clamav and scan your system frequently

  • bleistift2@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    37
    ·
    5 hours ago

    A few years ago I found a text (probably as image) where somebody ‘tried’ to run a virus on linux. It went something like this:

    Wanted to install a virus on Ubuntu, but it was only available as an aur package. Tried converting. Didn’t work … Tried make virus, but didn’t work. Upgraded cmake, tried again, but some libraries were missing.

    Tried installing libraries, but they were very outdated and I couldn’t find proper versions.

    Checked the source to see what the libs were doing and replaced them.

    and so on.

    Does someone know what I’m talking about and possibly has the source?

  • wizzim@infosec.pub
    link
    fedilink
    arrow-up
    7
    ·
    edit-2
    5 hours ago

    Does anyone have an idea what would happen if one runs a Windows virus with Wine ?

    • azha@lemm.eeOP
      link
      fedilink
      English
      arrow-up
      12
      arrow-down
      1
      ·
      5 hours ago

      Can only access Wine’s directory not your actual Linux files

      • voodooattack@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        5 minutes ago

        Nope. With a stock wine prefix it can access anything you have the permission to access. Your FS root is mapped to the Z:\ drive by default.

        • azha@lemm.eeOP
          link
          fedilink
          English
          arrow-up
          5
          ·
          4 hours ago

          They simply can’t because its designed to do that on windows not on Linux because they are different. Plus use ClamAV and you should be good. (I am not an expert in this)

        • knightly the Sneptaur@pawb.social
          link
          fedilink
          arrow-up
          4
          ·
          4 hours ago

          I suppose if there was a wine config that had an appropriate dosdevice setup for the boot sector then it’d be able to write to it, but wine doesn’t need to boot so I don’t think that would do anything.

          • 乇ㄥ乇¢ㄒ尺ㄖ@infosec.pub
            link
            fedilink
            arrow-up
            5
            ·
            4 hours ago

            Probably because FileZilla requires special access to personal files and WD probably knows It’ll try to send them elsewhere

            The things that trigger antivirus software aren’t just hashes anymore, it’s the behavior of the software on your machine… That’s why I said it’s better now…

              • 乇ㄥ乇¢ㄒ尺ㄖ@infosec.pub
                link
                fedilink
                arrow-up
                3
                ·
                3 hours ago

                Oh, wait… I just remembered… users have reported that Filezilla does by itself install malware/bundleware, unless you’re very careful to untick some boxes during the installation… IT IS malicious that they install other stuff on your machine and it’s hard for you to find what exactly they installed…

                See the Negative reviews on Alternativeto

                • go $fsck yourself@lemmy.world
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  1 hour ago

                  The detection happens with the update download, which does not have any bundled software. It also detects the installer that specifically does not have the option for installing bundled software.

  • Crazyslinkz@lemmy.world
    link
    fedilink
    arrow-up
    2
    arrow-down
    1
    ·
    5 hours ago

    When you get to server levels it’s about making sure the firewall rules are filtering correctly. Need external access for support, while blocking script kiddies attempts to gain ssh access. (Figuratively speaking)