With the increase popularity of the linux desktop and the steamdeck, will new viruses and malwares be developed for linux systems? should we better use an antivirus?
- Virus scanners only detect a fraction of the harmful programmes.
- Virus scanners can often be tricked.
- Virus scanners often have security vulnerabilities themselves, which are usually quite serious, since such programmes embed themselves quite deeply in the operating system.
- Virus scanners cause many users to become careless because they rely too much on such tools.
Therefore, from my point of view, the disadvantages outweigh the advantages. Therefore, I do not have such a tool permanently installed, neither under Linux nor under Windows. However, every 6 months I scan my Windows installation with a USB-bootable virus scanner. No actually harmful programme has been found for years.
In my opinion, the following things are much more important than any security software.
- Install updates as soon as possible. Under Windows, you can use tools like Chocolatey for this.
- Only install software from trustworthy sources.
- Only install software that you really need.
- Only use root or administrator rights if you have to. For everything else, the rights of the user account are sufficient.
- Create backups regularly.
- Think before you act.
Especially the last point is a problem for many users. I can’t tell you how many times I’ve witnessed someone receiving an alleged invoice from mobile provider A by email and opening it, even though they had a contract with provider B.
I don’t think there’s a need. I keep my system patched and I only install from trusted sources. It might make sense in a corporate environment but for a single user machine I can’t image ever needing it.
deleted by creator
Linux still can get viruses. Just not as likely
deleted by creator
I asked 😺👍
deleted by creator
I didn’t start using Linux in this decade, the last, or the one before that
Did I ask?
The duality of the man, so old but so edgy.
deleted by creator
No one cares
deleted by creator
Yup, and much of stuff is just common apps. A browser based exploit may not care which OS you’re running Firefox/Chrome under (or Edge, I suppose if you’re one of the dozen running that in Linux). The log4j vulnerability was first seen in Minecraft hosts and clients, and that equally affects those running on Linux. Steam has also had vulnerabilities in the past, as have various document editors.
That said, I really can’t say there’s any consumer-level antivirus that I’d trust to be effective on my desktop (especially without impacting performance) even on Windows, let alone Linux. If you really know what your box is doing and it doesn’t change much you might consider SELinux rules etc, but those are a significant amount of work even for servers (which tend to behave more predictably).
Not using software from untrustworthy sources or visiting sketchy sites, plus some monitoring of your network traffic may be a more effective solution.
This (Also is there a service that audits code’s maliciousness for me? I sometimes use some unfamous stuffs from github for gaming, customizing etc. As long as I don’t give them a root permission I should be ok?)
There are tools that do this but it’s mostly for known issues or vulnerabilities (i.e. bad practice in coding or done after the fact). Some stuff runs code on at sandbox looking for sketchy behavior, but hackers may work around that by having malware that only activates in CD l specific circumstances or times.
There can also be “privilege escalation” exploits which can allow a rogue process to obtain root/admin, and even without the process would have full access to whatever the user does in terms of network/device/hardware/process access (or sudo, as applicable).
Not being able to run as root doesn’t help all that much if the process is able to access sensitive saved data, files and/or the internet
The pattern of using managed repositories instead of downloading random shit off the internet prevents a lot of it outright.
Just have to remember which repos are “managed” and which are not. Installing stuff from PyPi or NPM might actually require you to read through quite a lot of code before installing. I don’t think most people are that diligent.
yup, that’s why i avoid it like the plague.
It’s .deb’s and .rpm’s all the way down.
And sometimes flatpaks. And sometimes AppImages.
But never pips, gems or any of that sort of …
deleted by creator
The anti virus industry boomed because of operating systems that were exceptionally vulnerable to attacks. Simply visiting a website could install software. The root cause of this problem isn’t that a user didn’t run third-party software. It’s that the operating system was vulnerable.
After many years of neglect by operating system vendors, there really wasn’t much of a choice in how to be responsible if you insisted on running a vulnerable operating system. Therefore, the industry boomed and it became status quo for users of these operating systems.
Or you could run an OS that regularly fixes vulnerabilities.
plus if your someone that makes malware are you really going to waste time making a linux version of your malware or just stick to the windows version.
This also assumes that Linux is vulnerable the same way that Windows is for the software, which is probably isn’t.
I pay for Dr Web for Linux and Android because I like the idea that I’m supporting white hat hackers find malware. Do I think I need it? No.
I don’t, but that’s because of how I have things setup around the network. While most people here say it’s because they don’t need it, I am in a position that I need SOMETHING simply because others in the household could bring in malware and rather than trust them to make smart decisions, I proactively monitor all network activity for anything unusual. That being said, I have clamAv installed and run a weekly scan, but my real “antivirus solutions” are as follows: A syslog server that’s connected to grafana/MySQL and alerts me based on very specific criteria. Along this, I’ve got my network firewall configured to block all “untrustworthy countries” in and out 100%, as well as use an IDS/IPS (also connected to syslog for alerts). Lastly, an internal DNS which grabs from like 20 sources that include some reliable lists with malware domains and such, and a custom list of my own that I add to as useful security news feeds hit my RSS feed with urls in their blog posts.
Actually got a list of other things going on in the network to make it even more secure, but just wanted to list the main things that’ll give you a step up in the anti-malware front.
None of this is buletproof without proper care for how you use the Internet, though.
- Check for router/modem/firewall updates weekly if they can’t be auto updated
- never click any links in an email even if you feel you know you trust it (exception to this would be something you KNOW is coming into your inbox, such as an account registration verification)
- avoid tiny urls or suspicious looking urls when possible
- don’t open ports unless you really really really know what you’re doing. If you absolutely need to open a port, then for the love of god define the source IP address/CIDR. Opening ports to the world includes opening them to cyber criminals
- turn off upnp, I don’t care what that game or service you use says, it doesn’t need it
You get the idea. My message got way too long and turned into a rant lol.
I don’t use one, it’s unnecessary. Keep your system light, use only free software and utilize some of your common sense and you’ll be all right.
This one time my brother had his pc(winblows) infested just by plugging in a flash-drive, seriously, just that!!. I hate proprietary software.Anti-virus software is like a condom. If you don’t go sticking your computer in places it doesn’t belong you won’t really need one.
Today I learned what a dickhead my computer is
Haven’t really felt the need to. On Linux ad blocking + common sense has worked out fine. When I was still using Windows I just relied on Windows Defender since around the Windows 8.1 days, but either way my time downloading .exe files from sketchy sites is long behind me.
No. That would defeat the purpose of me installing Linux in (old) laptops. Windows feels sluggish enough with a sea of bad things wanting your minimum wage and have Windows Defender prevent it but not all of it, obviously.
I put all my attention to prevention and set strict rules on the router. It can be as simple as setting the DNS to stuff like dnsforge.de or DIY it with PiHole with hosts lists of your hearts content that update itself weekly, I do the latter. Nothing beats a cross platform solution that protects every device in the network, if you’re after 100% performance. Of course you can still catch bad things, such as social engineering by email that happened over at Linus Tech Tips. You better stay vigilant no matter what solution you use and don’t sleep on making backups, which can be as simple and automated when you use Syncthing for example.
I’m not sure if you recommended syncthing a backup tool, because it isn’t one. Just making sure that there’s no confusion…
You’re right. Syncthing isn’t a backup tool per se and the devs even tell you that in the FAQ. But forgive me if I did preach about it anyway, because you can enable file versioning (keep old and deleted files on each host) which kind of makes it backup incase something bad happens? Anyway it is my set and forget solution for Linux, Android and Windows. If you could recommend me a alternative that ticks these boxes I’d appreciate that. :)
that update itself weekly
i would highly recommend changing it to be sooner, i hate that pihole defaults to weekly updates as it makes security/phishing blocklists pretty useless. I set mine to every 12 hours personally by putting
0 */12 * * * pihole -g
in crontab.
Run sandboxed software when possible and avoid doing unsafe things.
There is no useful AV for Linux desktops.
I don’t use antivirus on Windows, let alone Linux. Just be mindful of what you’re downloading and you’ll be fine.
Same here. Ever since I remember I don’t have AV, just staying out of sketchy sites is enough. Most of malware is targeted at the least aware and cautious users.
Windows has done of the best antivirus built-in
I don’t because no antivirus can protect you from yourself, I learned that the hard way while I was still using Windows many years ago.
I had antivirus and antimalware on Windows and I kept them updated and ran scans regularly, almost religiously, than I got a malware that antivirus couldn’t detect (they take a while to be updated with new viruses/malware that constantly come out) and the only way to remove it was a blank new install following a specific procedure to clean it all.
That day I understood that no matter how attentive you are about your antivirus, you’re never really protected until it’s you who learns what to do and what not while accessing the web, so I did a bit of research about how to better configure my PC, how to better recognize phishing/scamming, using adblocker, don’t download random software, stuff like that.
I basically learned “how to behave”. I stopped using antivirus/antimalware on Windows and I didn’t catch a virus since, then I switched to Linux and I still apply the same principles of “good behavior”.
That’s not to say I’m immune to viruses, I’m certainly not, but my mindset now is that if I ever catch a virus, it will be my fault for doing something I shouldn’t have done, and I’ll do my best to learn from it instead of relying on software to do that for me.
No because I don’t download software via unsafe tools like web browsers or flatpak.