With the increase popularity of the linux desktop and the steamdeck, will new viruses and malwares be developed for linux systems? should we better use an antivirus?

  • @[email protected]
    link
    fedilink
    242 years ago
    • Virus scanners only detect a fraction of the harmful programmes.
    • Virus scanners can often be tricked.
    • Virus scanners often have security vulnerabilities themselves, which are usually quite serious, since such programmes embed themselves quite deeply in the operating system.
    • Virus scanners cause many users to become careless because they rely too much on such tools.

    Therefore, from my point of view, the disadvantages outweigh the advantages. Therefore, I do not have such a tool permanently installed, neither under Linux nor under Windows. However, every 6 months I scan my Windows installation with a USB-bootable virus scanner. No actually harmful programme has been found for years.

    In my opinion, the following things are much more important than any security software.

    • Install updates as soon as possible. Under Windows, you can use tools like Chocolatey for this.
    • Only install software from trustworthy sources.
    • Only install software that you really need.
    • Only use root or administrator rights if you have to. For everything else, the rights of the user account are sufficient.
    • Create backups regularly.
    • Think before you act.

    Especially the last point is a problem for many users. I can’t tell you how many times I’ve witnessed someone receiving an alleged invoice from mobile provider A by email and opening it, even though they had a contract with provider B.

  • arthurpizza
    link
    fedilink
    22 years ago

    I don’t think there’s a need. I keep my system patched and I only install from trusted sources. It might make sense in a corporate environment but for a single user machine I can’t image ever needing it.

      • @[email protected]
        link
        fedilink
        42 years ago

        Yup, and much of stuff is just common apps. A browser based exploit may not care which OS you’re running Firefox/Chrome under (or Edge, I suppose if you’re one of the dozen running that in Linux). The log4j vulnerability was first seen in Minecraft hosts and clients, and that equally affects those running on Linux. Steam has also had vulnerabilities in the past, as have various document editors.

        That said, I really can’t say there’s any consumer-level antivirus that I’d trust to be effective on my desktop (especially without impacting performance) even on Windows, let alone Linux. If you really know what your box is doing and it doesn’t change much you might consider SELinux rules etc, but those are a significant amount of work even for servers (which tend to behave more predictably).

        Not using software from untrustworthy sources or visiting sketchy sites, plus some monitoring of your network traffic may be a more effective solution.

        • @[email protected]
          link
          fedilink
          2
          edit-2
          2 years ago

          This (Also is there a service that audits code’s maliciousness for me? I sometimes use some unfamous stuffs from github for gaming, customizing etc. As long as I don’t give them a root permission I should be ok?)

          • @[email protected]
            link
            fedilink
            32 years ago

            There are tools that do this but it’s mostly for known issues or vulnerabilities (i.e. bad practice in coding or done after the fact). Some stuff runs code on at sandbox looking for sketchy behavior, but hackers may work around that by having malware that only activates in CD l specific circumstances or times.

            There can also be “privilege escalation” exploits which can allow a rogue process to obtain root/admin, and even without the process would have full access to whatever the user does in terms of network/device/hardware/process access (or sudo, as applicable).

            Not being able to run as root doesn’t help all that much if the process is able to access sensitive saved data, files and/or the internet

      • falsem
        link
        fedilink
        162 years ago

        The pattern of using managed repositories instead of downloading random shit off the internet prevents a lot of it outright.

        • 0xtero
          link
          fedilink
          92 years ago

          Just have to remember which repos are “managed” and which are not. Installing stuff from PyPi or NPM might actually require you to read through quite a lot of code before installing. I don’t think most people are that diligent.

          • @[email protected]
            link
            fedilink
            12 years ago

            yup, that’s why i avoid it like the plague.

            It’s .deb’s and .rpm’s all the way down.

            And sometimes flatpaks. And sometimes AppImages.

            But never pips, gems or any of that sort of …

  • @[email protected]
    link
    fedilink
    52 years ago

    The anti virus industry boomed because of operating systems that were exceptionally vulnerable to attacks. Simply visiting a website could install software. The root cause of this problem isn’t that a user didn’t run third-party software. It’s that the operating system was vulnerable.

    After many years of neglect by operating system vendors, there really wasn’t much of a choice in how to be responsible if you insisted on running a vulnerable operating system. Therefore, the industry boomed and it became status quo for users of these operating systems.

    Or you could run an OS that regularly fixes vulnerabilities.

    • @[email protected]
      link
      fedilink
      22 years ago

      plus if your someone that makes malware are you really going to waste time making a linux version of your malware or just stick to the windows version.

      • @[email protected]
        link
        fedilink
        22 years ago

        This also assumes that Linux is vulnerable the same way that Windows is for the software, which is probably isn’t.

  • @[email protected]
    link
    fedilink
    22 years ago

    I pay for Dr Web for Linux and Android because I like the idea that I’m supporting white hat hackers find malware. Do I think I need it? No.

  • Mikelius
    link
    fedilink
    122 years ago

    I don’t, but that’s because of how I have things setup around the network. While most people here say it’s because they don’t need it, I am in a position that I need SOMETHING simply because others in the household could bring in malware and rather than trust them to make smart decisions, I proactively monitor all network activity for anything unusual. That being said, I have clamAv installed and run a weekly scan, but my real “antivirus solutions” are as follows: A syslog server that’s connected to grafana/MySQL and alerts me based on very specific criteria. Along this, I’ve got my network firewall configured to block all “untrustworthy countries” in and out 100%, as well as use an IDS/IPS (also connected to syslog for alerts). Lastly, an internal DNS which grabs from like 20 sources that include some reliable lists with malware domains and such, and a custom list of my own that I add to as useful security news feeds hit my RSS feed with urls in their blog posts.

    Actually got a list of other things going on in the network to make it even more secure, but just wanted to list the main things that’ll give you a step up in the anti-malware front.

    None of this is buletproof without proper care for how you use the Internet, though.

    • Check for router/modem/firewall updates weekly if they can’t be auto updated
    • never click any links in an email even if you feel you know you trust it (exception to this would be something you KNOW is coming into your inbox, such as an account registration verification)
    • avoid tiny urls or suspicious looking urls when possible
    • don’t open ports unless you really really really know what you’re doing. If you absolutely need to open a port, then for the love of god define the source IP address/CIDR. Opening ports to the world includes opening them to cyber criminals
    • turn off upnp, I don’t care what that game or service you use says, it doesn’t need it

    You get the idea. My message got way too long and turned into a rant lol.

  • @[email protected]
    link
    fedilink
    -22 years ago

    I don’t use one, it’s unnecessary. Keep your system light, use only free software and utilize some of your common sense and you’ll be all right.
    This one time my brother had his pc(winblows) infested just by plugging in a flash-drive, seriously, just that!!. I hate proprietary software.

  • SapienSRC
    link
    fedilink
    82 years ago

    Anti-virus software is like a condom. If you don’t go sticking your computer in places it doesn’t belong you won’t really need one.

  • @[email protected]
    link
    fedilink
    192 years ago

    Haven’t really felt the need to. On Linux ad blocking + common sense has worked out fine. When I was still using Windows I just relied on Windows Defender since around the Windows 8.1 days, but either way my time downloading .exe files from sketchy sites is long behind me.

  • denny
    link
    fedilink
    72 years ago

    No. That would defeat the purpose of me installing Linux in (old) laptops. Windows feels sluggish enough with a sea of bad things wanting your minimum wage and have Windows Defender prevent it but not all of it, obviously.

    I put all my attention to prevention and set strict rules on the router. It can be as simple as setting the DNS to stuff like dnsforge.de or DIY it with PiHole with hosts lists of your hearts content that update itself weekly, I do the latter. Nothing beats a cross platform solution that protects every device in the network, if you’re after 100% performance. Of course you can still catch bad things, such as social engineering by email that happened over at Linus Tech Tips. You better stay vigilant no matter what solution you use and don’t sleep on making backups, which can be as simple and automated when you use Syncthing for example.

    • @[email protected]
      link
      fedilink
      32 years ago

      I’m not sure if you recommended syncthing a backup tool, because it isn’t one. Just making sure that there’s no confusion…

      • denny
        link
        fedilink
        12 years ago

        You’re right. Syncthing isn’t a backup tool per se and the devs even tell you that in the FAQ. But forgive me if I did preach about it anyway, because you can enable file versioning (keep old and deleted files on each host) which kind of makes it backup incase something bad happens? Anyway it is my set and forget solution for Linux, Android and Windows. If you could recommend me a alternative that ticks these boxes I’d appreciate that. :)

    • ch1cken
      link
      fedilink
      62 years ago

      that update itself weekly

      i would highly recommend changing it to be sooner, i hate that pihole defaults to weekly updates as it makes security/phishing blocklists pretty useless. I set mine to every 12 hours personally by putting 0 */12 * * * pihole -g in crontab.

  • @[email protected]
    link
    fedilink
    202 years ago

    Run sandboxed software when possible and avoid doing unsafe things.

    There is no useful AV for Linux desktops.

  • @[email protected]
    link
    fedilink
    452 years ago

    I don’t use antivirus on Windows, let alone Linux. Just be mindful of what you’re downloading and you’ll be fine.

    • @[email protected]
      link
      fedilink
      122 years ago

      Same here. Ever since I remember I don’t have AV, just staying out of sketchy sites is enough. Most of malware is targeted at the least aware and cautious users.

  • Ulu-Mulu-no-die
    link
    fedilink
    English
    25
    edit-2
    2 years ago

    I don’t because no antivirus can protect you from yourself, I learned that the hard way while I was still using Windows many years ago.

    I had antivirus and antimalware on Windows and I kept them updated and ran scans regularly, almost religiously, than I got a malware that antivirus couldn’t detect (they take a while to be updated with new viruses/malware that constantly come out) and the only way to remove it was a blank new install following a specific procedure to clean it all.

    That day I understood that no matter how attentive you are about your antivirus, you’re never really protected until it’s you who learns what to do and what not while accessing the web, so I did a bit of research about how to better configure my PC, how to better recognize phishing/scamming, using adblocker, don’t download random software, stuff like that.

    I basically learned “how to behave”. I stopped using antivirus/antimalware on Windows and I didn’t catch a virus since, then I switched to Linux and I still apply the same principles of “good behavior”.

    That’s not to say I’m immune to viruses, I’m certainly not, but my mindset now is that if I ever catch a virus, it will be my fault for doing something I shouldn’t have done, and I’ll do my best to learn from it instead of relying on software to do that for me.