• fidodo@lemmy.world
    link
    fedilink
    arrow-up
    50
    arrow-down
    2
    ·
    11 months ago

    They’re super rare. I’ve not gotten one once in decades, whereas I’ve encountered countless viruses on Windows. Linux is more secure, but also it’s just a smaller target. Best way to avoid viruses is to use an OS nobody else wants to use *taps head

    • PutangInaMo@lemmy.world
      link
      fedilink
      arrow-up
      26
      arrow-down
      4
      ·
      11 months ago

      I think you have a false sense of security with regards to Linux vulnerabilities and exploitations. There are dozen of known exploits throughout the Linux ecosystem that are publicly disclosed frequently.

      What makes you think Linux is more secure than windows? I’m not trying to start an argument here I’m just curious.

      • fidodo@lemmy.world
        link
        fedilink
        arrow-up
        11
        ·
        11 months ago

        I find the Linux ecosystem has far better updating mechanisms than Windows and it doesn’t have as much backwards compatibility cruft as Windows. That and the open source nature I think is better at having exploits uncovered. I’m not saying Linux is perfectly secure, but that it’s more secure than Windows. But I think the biggest reason it’s less likely to get viruses is just that it’s a smaller target and that hackers aren’t spending as much time trying to attack it, plus the users are more tech savvy meaning any attacks will be less lucrative.

        • Freesoftwareenjoyer@lemmy.world
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          11 months ago

          it’s a smaller target and that hackers aren’t spending as much time trying to attack it

          It’s the most popular server system, so I’m not so sure about that.

          • fidodo@lemmy.world
            link
            fedilink
            arrow-up
            3
            ·
            11 months ago

            The target user base is much smaller. Most viruses are spread through user error and server administrators are far more competent than a typical OS user. Also, typical server exploits lead to exposing credentials rather than spreading viruses.

            • Freesoftwareenjoyer@lemmy.world
              link
              fedilink
              arrow-up
              1
              ·
              11 months ago

              Software is usually installed from repositories and not random websites, so there is less room for user error in general. Even if you download an executable file, you will most likely have to give it permissions to run first. So I think it’s more immune to viruses not because of its users, but because of the way it’s designed.

        • PutangInaMo@lemmy.world
          link
          fedilink
          arrow-up
          2
          arrow-down
          3
          ·
          11 months ago

          Open source can be a double edged sword for that but I dig it.

          I think dependencies in Linux packages does cause a lot of issues but that’s mostly on air gaped networks, and even still manageable.

          Sizing the target depends on what threat actors are involved though so those broad stroke statements don’t hold up well in reality, from my Experience.

      • taladar@sh.itjust.works
        link
        fedilink
        arrow-up
        9
        ·
        11 months ago

        Not sure what their answer is but not delaying security fixes until some fixed monthly date would be my answer.

        • AspieEgg@lemmy.blahaj.zone
          link
          fedilink
          arrow-up
          4
          ·
          11 months ago

          To be fair, critical security patches for Windows are often delivered out of band (not on patch Tuesday). And malware definitions for Defender are daily.

          Not trying to defend Microsoft entirely, but not everything is delayed until their monthly update schedule.

        • PutangInaMo@lemmy.world
          link
          fedilink
          arrow-up
          4
          arrow-down
          2
          ·
          11 months ago

          To be fair if it’s scored high enough there are usually workarounds posted and supported to hold you over for patch Tuesday.

          I’ve done patch management on both platforms and find the predictability easier to manage. But that’s not home use so grain of salt stuff.

      • ipkpjersi@lemmy.ml
        link
        fedilink
        arrow-up
        3
        ·
        11 months ago

        There’s a difference between exploits and malicious software (even though malicious software often makes use of exploits, it is different). I am willing to bet there is way way more malicious software written for Windows than Linux, simply because there’s way more Windows users than Linux users and there’s way more Windows software than Linux software.

        • PutangInaMo@lemmy.world
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          11 months ago

          Yeah that’s true. But I say false sense of security because that’s what happened to Apple back in the day and they got caught with their pants down lol

      • Freesoftwareenjoyer@lemmy.world
        link
        fedilink
        arrow-up
        3
        ·
        11 months ago

        GNU/Linux is Libre Software, so that already makes it more secure, because anyone can actually verify what it does and modify it if needed. This means that users are really in control of what the operating system does. It’s difficult to verify what Windows does, but we know that it contains spyware, which isn’t easy to remove.

        Installing software from a repository is also safer than downloading it from random websites.

        When some library like OpenSSL has a vulnerability, you will get a new version with system updates and all programs will start using that patched version. On Windows usually each program has to have its own update mechanism or it will be stuck with old libraries.

      • madcaesar@lemmy.world
        link
        fedilink
        arrow-up
        10
        ·
        11 months ago

        Getting a virus takes real effort. I feel like the whole virus debate is just 2000s hangover, and people never update their shit talking points.

        What is actually a threat are scams. Seniors being called, lied to and forced to compromise themselves. Those are the real viruses of 2023. And obviously 99% of seniors are on Windows.

      • nogrub@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        11 months ago

        yeah when you use your brain you don’t get viruses it better than any anti virus software

    • Tekchip@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      ·
      11 months ago

      Getting tired of this smaller target narrative. On desktop, maybe. We don’t know for sure since most Linux doesn’t carry telemetry and one ISO download doesn’t mean one install.

      Also, Linux runs some insanely high percentage of the Internet (server, VM, container), IOT and mobile. For every individual who might own a hand full of computers there are 10’s, or perhaps hundreds, of Linux servers out there doing tasks for them. Virus and malware don’t only target desktops. There’s literally no larger target.

      • PlutoParty@programming.dev
        link
        fedilink
        arrow-up
        5
        ·
        11 months ago

        I think when people say it is a smaller target for virii, they are talking about an actual virus such as ransomware, crypto miner, adware, trojans, etc. I have zero doubt these types of virii are more targeted on Windows platforms. Linux servers on the other hand are indeed going to be the largest target for exploits. The primary mechanism by which a Linux server is compromised is going to be via an exploit, not an actual virus. That’s not to say they don’t exist. I administer hundreds of Linux servers in several data centers. I don’t believe I’ve ever come across an actual virus in the last decade or so, but do deal with exploit and brute force attempts nonstop. Perhaps this is a matter of semantics. I don’t consider the tools and methods used to exploit systems as a virus.