440
you are viewing a single comment's thread
view the rest of the comments
[-] addie@feddit.uk 50 points 5 days ago

Centrally managed repositories help a lot, here. Linux users tend not to download random software off of sketchy websites; it's all installed and kept up to date via the package manager.

Yes, Linux malware and viruses exist, and we shouldn't pretend otherwise. The usual reason for installing Linux virus scanners is because you're hosting a file/email server, and you want to keep infected files away from Windows users, tho.

[-] Railcar8095@lemmy.world 14 points 5 days ago* (last edited 5 days ago)

Linux users tend not to download random software off of sketchy websites;

Search for "sudo curl ...... | sh" and let me know how many hits you get.

[-] possiblylinux127@lemmy.zip 2 points 4 days ago

Every time I see this a part of be dies inside. It is always a cursed install script that makes problematic changes to the system.

[-] Flipper@feddit.org 2 points 4 days ago

It's even worse. The server can detect if you are piping it straight into a shell or just downloading the file. It can then send different scripts based on that.

[-] Railcar8095@lemmy.world 3 points 4 days ago

How can it see that? If possible, isn't that a flaw of curl? I don't see a good reason for the sever to know what you're doing with the file

[-] Flipper@feddit.org 4 points 4 days ago

Curl has a limited buffer and bash reads a line and then executes it, before reading the next line.

So first you need a command that takes time if executed. So a delay, downloading a big file, user input work. Next you fill up the buffer. Just your normal script. Maybe some comments etc.

Now the server can detect if after the first kB the stream stops.

[-] Mihies@programming.dev 10 points 5 days ago

Even package managers are vulnerable to many security problems - can they guarantee that apps are not infected either directly or indirectly (through a library)? There is also flathub. Windows have also an option to verify apps through certificates which isn't the case with Linux AFAIK. If you want to stay safe on Windows to some degree you can, but the real problem IMO is that Windows is hugely more used and run by less technical persons. 🤷‍♂️

[-] possiblylinux127@lemmy.zip 4 points 4 days ago

This isn't true

Linux package managers typically use GPG which is a much better solution. It is simpler and doesn't have the unnecessary complexity of certificates.

What security problems do you think package managers are vulnerable to? If the upstream repo is compromised all bets are off regardless of the system.

[-] Mihies@programming.dev 1 points 4 days ago

You are right, GPG signing is good as well. But in both cases you still have unsigned apps.

What security problems do you think package managers are vulnerable to? If the upstream repo is compromised all bets are off regardless of the system.

Yep. And in such case an antivirus software might come handy.

[-] possiblylinux127@lemmy.zip 2 points 3 days ago

Antivirus software would be totally useless since the problem is your own system.

There is also the issue of trust in the antivirus. This programs are typically high privilege and mostly snake oil.

[-] Rooster326@programming.dev 2 points 4 days ago* (last edited 4 days ago)

Linux users tend not to download random software off of sketchy websites; it's all installed and kept up to date via the package manager.

No experienced/power users do that. Those are who just so happen to install Linux.

If you want Linux for everyone then you will get the users who will install anything, and you need a way to keep them reasonably safe.

[-] BunScientist@lemmy.zip 2 points 3 days ago

Until you have random people install manjaro, enable aur in their package manager and install any package that's effectively a random github repo

Yes, this is user error, but it amazes me how many people claim the AUR is better than sliced bread

[-] possiblylinux127@lemmy.zip 2 points 4 days ago

Linux does have some issues with social engineering since any file with the executable bit will run when clicked

Outside of that, you are right

this post was submitted on 18 Oct 2025
440 points (100.0% liked)

Linux

9868 readers
361 users here now

A community for everything relating to the GNU/Linux operating system (except the memes!)

Also, check out:

Original icon base courtesy of lewing@isc.tamu.edu and The GIMP

founded 2 years ago
MODERATORS