• addie@feddit.uk
    link
    fedilink
    arrow-up
    44
    arrow-down
    1
    ·
    2 天前

    Centrally managed repositories help a lot, here. Linux users tend not to download random software off of sketchy websites; it’s all installed and kept up to date via the package manager.

    Yes, Linux malware and viruses exist, and we shouldn’t pretend otherwise. The usual reason for installing Linux virus scanners is because you’re hosting a file/email server, and you want to keep infected files away from Windows users, tho.

    • Rooster326@programming.dev
      link
      fedilink
      arrow-up
      1
      ·
      edit-2
      9 小时前

      Linux users tend not to download random software off of sketchy websites; it’s all installed and kept up to date via the package manager.

      No experienced/power users do that. Those are who just so happen to install Linux.

      If you want Linux for everyone then you will get the users who will install anything, and you need a way to keep them reasonably safe.

      • BunScientist@lemmy.zip
        link
        fedilink
        English
        arrow-up
        2
        ·
        4 小时前

        Until you have random people install manjaro, enable aur in their package manager and install any package that’s effectively a random github repo

        Yes, this is user error, but it amazes me how many people claim the AUR is better than sliced bread

    • Possibly linux@lemmy.zip
      link
      fedilink
      English
      arrow-up
      2
      ·
      16 小时前

      Linux does have some issues with social engineering since any file with the executable bit will run when clicked

      Outside of that, you are right

    • Railcar8095@lemmy.world
      link
      fedilink
      arrow-up
      13
      arrow-down
      1
      ·
      edit-2
      1 天前

      Linux users tend not to download random software off of sketchy websites;

      Search for “sudo curl … | sh” and let me know how many hits you get.

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        2
        ·
        16 小时前

        Every time I see this a part of be dies inside. It is always a cursed install script that makes problematic changes to the system.

        • Flipper@feddit.org
          link
          fedilink
          arrow-up
          1
          ·
          16 小时前

          It’s even worse. The server can detect if you are piping it straight into a shell or just downloading the file. It can then send different scripts based on that.

          • Railcar8095@lemmy.world
            link
            fedilink
            arrow-up
            2
            ·
            15 小时前

            How can it see that? If possible, isn’t that a flaw of curl? I don’t see a good reason for the sever to know what you’re doing with the file

            • Flipper@feddit.org
              link
              fedilink
              arrow-up
              3
              arrow-down
              1
              ·
              13 小时前

              Curl has a limited buffer and bash reads a line and then executes it, before reading the next line.

              So first you need a command that takes time if executed. So a delay, downloading a big file, user input work. Next you fill up the buffer. Just your normal script. Maybe some comments etc.

              Now the server can detect if after the first kB the stream stops.

      • 1984@lemmy.today
        link
        fedilink
        arrow-up
        7
        arrow-down
        4
        ·
        edit-2
        1 天前

        Thats not random sketchy websites though.

        I would say Linux users who install software from the web knows what sites to trust. The beginners use the app store.

    • Mihies@programming.dev
      link
      fedilink
      arrow-up
      9
      arrow-down
      1
      ·
      1 天前

      Even package managers are vulnerable to many security problems - can they guarantee that apps are not infected either directly or indirectly (through a library)? There is also flathub. Windows have also an option to verify apps through certificates which isn’t the case with Linux AFAIK. If you want to stay safe on Windows to some degree you can, but the real problem IMO is that Windows is hugely more used and run by less technical persons. 🤷‍♂️

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        3
        ·
        16 小时前

        This isn’t true

        Linux package managers typically use GPG which is a much better solution. It is simpler and doesn’t have the unnecessary complexity of certificates.

        What security problems do you think package managers are vulnerable to? If the upstream repo is compromised all bets are off regardless of the system.

        • Mihies@programming.dev
          link
          fedilink
          arrow-up
          1
          arrow-down
          2
          ·
          16 小时前

          You are right, GPG signing is good as well. But in both cases you still have unsigned apps.

          What security problems do you think package managers are vulnerable to? If the upstream repo is compromised all bets are off regardless of the system.

          Yep. And in such case an antivirus software might come handy.

          • Possibly linux@lemmy.zip
            link
            fedilink
            English
            arrow-up
            2
            ·
            8 小时前

            Antivirus software would be totally useless since the problem is your own system.

            There is also the issue of trust in the antivirus. This programs are typically high privilege and mostly snake oil.