• EmperorHenry@discuss.tchncs.de
    link
    fedilink
    arrow-up
    9
    arrow-down
    8
    ·
    edit-2
    8 months ago

    At least microsoft is honest enough to admit their software needs protection, unlike apple and unlike most of the people who have made distros of linux. (edit: microsoft is still dishonest about what kind of protection it needs though)

    Even though apple lost a class action lawsuit for false advertising over the claim “mac can’t get viruses” they still heavily imply that it doesn’t need an antivirus.

    any OS can get infected, it’s just a matter of writing the code and finding a way to deliver it to the system…Now you might be thinking “I’m very careful about what I click on” that’s a good practice to have, but most malware gets delivered through means that don’t require the user to click on anything.

    You need an antivirus on every computer you have, linux, android, mac, windows, iOS, all of them. There’s loads of videos on youtube showing off how well or not so well different antivirus programs work for windows and android.

    • Possibly linux@lemmy.zipOP
      link
      fedilink
      English
      arrow-up
      20
      arrow-down
      1
      ·
      8 months ago

      A “antivirus” tends to be a proprietary black box. Such “antivirus” programs could not of detected the XZ backdoor

          • EmperorHenry@discuss.tchncs.de
            link
            fedilink
            arrow-up
            2
            arrow-down
            3
            ·
            8 months ago

            Prevention and detection

            Most of the time, detection also means prevention, but with a whitelisting antivirus, prevention often means that the threat isn’t detected, it was just prevented from running.

            A whitelisting application has a list of what it knows it bad AND what it knows in advance to be good.

            Anything it can’t identify on the spot is treated as unknown and not allowed to run, not deleted, not quarantined, just blocked from running until the user can upload it to things like virustotal and other services like it to figure out if its safe.

            upload it to virustotal, if it wasn’t already known, do a re-scan a few hours later to see if it’s malicious, if it was already known, do a re-scan to see if anything has figured out if its malicious.

            which is why I think it’s borderline criminal that most antivirus programs don’t work that way.

              • EmperorHenry@discuss.tchncs.de
                link
                fedilink
                arrow-up
                1
                arrow-down
                4
                ·
                8 months ago

                who was it trusted by? There’s whitelisting applications that indiscriminately block everything that isn’t already installed too.

            • Portable4775@lemmy.zip
              link
              fedilink
              arrow-up
              2
              ·
              8 months ago

              A whitelisting application has a list of what it knows it bad AND what it knows in advance to be good.

              How would it know this? Is this defined by a person/people? If so, that wouldn’t have mattered. liblzma was known in advance to be good, then the malicious update was added, and people still presumed that it was good.

              This wasn’t a case of some random package/program wreaking havoc. It was trusted malicious code.

              Also, you’re asking for an antivirus that uploads and uses a sandbox to analyze ALL packages. Good luck with that. (AVs would probably have a hard time detecting malicious build actions, anyways).

              • EmperorHenry@discuss.tchncs.de
                link
                fedilink
                arrow-up
                2
                arrow-down
                1
                ·
                8 months ago

                Also, you’re asking for an antivirus that uploads and uses a sandbox to analyze ALL packages. Good luck with that. (AVs would probably have a hard time detecting malicious build actions, anyways).

                three different antivirus programs already do that. Comodo for example has a built in sandbox to do that.

                • Portable4775@lemmy.zip
                  link
                  fedilink
                  arrow-up
                  2
                  ·
                  8 months ago

                  It places unknown/new software in a sandbox. You want an AV that tests all pre-existing packages in a sandbox.