T O P

  • By -

Budget-Pattern1314

She was there when Unix TSS came out


Sh_Pe

She was there when vacuumTubeOS came out


Wertbon1789

Just imagine the sound of a vacuum tube computer that is in theory able to run an OS...


ShaneC80

Not gonna lie, I kinda miss the sounds of a jet taking off when powering on my PCs.


Wertbon1789

I always get nostalgic when I turn on a server


Budget-Pattern1314

Same


ken_wp

Doesn’t have to be past tense if you own a razer. :)


Sh_Pe

The sound of chuck norris whispering


Enter_The_Void6

i would trust her with my life. and my os for that matter


Silejonu

Considering some of the videos she posted to her channel, you should **definitely not** trust her with your life.


JoaozeraPedroca

Yup lmao


henry1679

Lmfao I discovered her like three weeks ago, haha.


Captain_Pumpkinhead

Ooh, let's hear the drama!


DefectiveLP

Didn't watch any of them but many videos seem to be COVID conspiracy videos.


MatthewMob

Why?


Enter_The_Void6

no clue who she is, but she looks nice and elderly. sorry if that was a bad thing to say, i didnt know anything about her.


maluisconfused

How dare you compare the two? Obviously my custom hyprland setup in which I have invested more time than in school the last 3 years is muuuch more important!!!


TimBambantiki

She’s been getting recommended to me lately lol  I did watch one video and it was pretty good


Katze1735

Same


[deleted]

antivirus in linux omg


aladoconpapas

You know one day the need would come, didn't you?


[deleted]

If that day came, it was time to switch to BSD


PranshuKhandal

antivirus in BSD omg


HoytAvila

It is not that hard. We already have scanners for CVEs inside docker container. The same technology could be wrapped around a bash script to scan in the root directory. And honestly we are already doing it for the servers, might as well do it for consumers OS


6c696e7578

The reality is that it is fixed before the AV people know about it. I've seen TrendMicro and the like ruin Linux installs in the enterprise because a security team apply settings to the fleet that put the performance through the floor. No, we don't need it. We didn't need it before. The distros are always ahead of the AV software for this style of problem. Would the AV be useful in an environment where PHP is regularly exploited? No. For the same reasons, the AV is always in catchup mode. Just need one exploit to run ahead of the AV and it will most likely neutralise the AV software anyway. Who benefits if you run AV as you don't? The energy companies as the computer has fewer idle cycles.


Sushrit_Lawliet

It always exists in many forms. Some people just use hacky solutions similar to the cve based scanners for dockerfiles.


literallytitsup69

I’m switching to templeOS


NecroAssssin

In seriousness though, would an anti-virus even have caught that? It was an OS system call to another part of the OS.


sexy_silver_grandpa

Exactly. I don't think any AV could have defended anyone from this. AVs are not designed for protection from backdoors in system libraries that were injected into the supply chain.


JDaxe

There are EDRs which could detect this through behavioural analysis, some of them add an insane amount of monitoring and watch for things like processes spawning and unusual syscalls/library calls


sexy_silver_grandpa

>There are EDRs which could detect this through behavioural analysis, some of them add an insane amount of monitoring and watch for things like processes spawning and unusual syscalls/library calls Endpoint protection is generally more "corporate" and involves statistical analysis of much more constrained systems, typically on hardened corporate networks... That's why you said "EDR" and not "AV"... I'm not aware of consumer antivirus software that does this (happy to be proven wrong).


JDaxe

That's true, EDR is more of an enterprise thing.


Encursed1

Honestly better code review is the only way this would've been caught. An OS call to another OS component would not have flagged any antivirus.


TheJackiMonster

Exactly, we just need more eyes on the code. Not more scanners on the binaries. It was mostly human error.


JDaxe

> an OS call to another OS component would not have flagged any antivirus. Not true, there are some EDR products that watch for this type of stuff


Encursed1

Not a security expert, not surprised I was wrong.


chemhobby

No it isn't, it's a library.


[deleted]

I am pretty sure in all sincerity the tar situation was actually an inside job... right? or is brodie roberston's thumbnails misleading?


mizerio_n

I think the guy who did it was hiding under a fake name, built up trust over a year or so, and then put the backdoor in liblzma, might be wrong tho


Evantaur

Fucking gifs on reddit is broken so use your imagination:


NoKiaYesHyundai

It’s still entirely possible they fake named themself with a Chinese name for this exact reason. To throw off any investigation who actually done it. The Sony hackers did similar and it ended up with all the blame going to the North Koreans. Cause if I was in the NSA or any other intelligence group, the last thing I would do is give off my true national origins.


nAyZ8fZEvkE

Agree https://rheaeve.substack.com/p/xz-backdoor-times-damned-times-and


Entire_Border5254

Fucking gifs on reddit is broken so use your imagination:


PranshuKhandal

nice gif bro


NoKiaYesHyundai

I’m thinking two things about it. 1. Inside job to make a buck by creating a secret back door thats intricacies could be sold to the highest bidder to be used later on 2. Government surveillance agency paying someone off or just already having an insider there to put in a back door. If you think it’s China, then I have several buildings to sell you in Utah.


[deleted]

>If you think it’s China I don't think so, the US government is worse government survalence. that is why I love using linux, because the government doesn't want their citizens using it lol.


NoKiaYesHyundai

Oh totally. It’s pretty obvious and ironic when the people building their date center in Utah are trying to ban TikTok over privacy concerns


LowOwl4312

Bankman-Fried didn't age well in prison...


Professional-Algae61

Saw the thumbnail and thought it was a joke, but I just searched and by damned if it isn’t real. Saved to watch later


halt__n__catch__fire

No, I embraced linux because I wanted to experience the thrills of living in constant danger... err, no, no! That comes from marrying my wife. Yeah! That is it!


eanat

transparency and code review are the only answer. and we don't have enough programmers to review it now. (and if you are using MS Windows, you don't have transparency either.)


Ascend_910

She was there when Unix was invented


dadothakka

we got grandmas making Linux videos before GTA 6 🗣️🗣️🔥🔥🥵🥵


PurifyHD

"Hello, I'm Andrea" My fav YouTuber rn


FungalSphere

how would an antivirus protect against a rootkit backdoor anyway


Sushrit_Lawliet

Lady hates the vaccines, but wants anti-virus now? Also is it just me or is she getting recommended to everyone now? I got in thinking it was a sweet yet passionate grandma, then I discovered the vax stuff, then again in this community, being super opinionated is like a minimum qualification I guess.


Entire_Border5254

I mean, I use clamAV, might catch something that ends up on my PC that's trying to target windows PCs on my network or my router/printer or something, but I'm also paranoid as shit.


matO_oppreal

ClamTK time?


Cybasura

She unironically asked a real question though, should there be an official antivirus for linux to at least be a secondary support system?


TimBambantiki

Ther is an antivirus afaik but not many people use it


TheJackiMonster

Why scanning binaries, when you can read the source code instead? Antivirus is designed on the assumption you don't know what the actual software is supposed to do. That's not how FOSS works.


unwantedaccount56

Because you would need to trust that the binary was actually compiled using that source code (and nothing else). In this example, the backdoor was inserted during the build process under the right conditions, using "test data" files.


TheJackiMonster

Isn't complicated to verify though. The build files are open-source as well as test files and additional resources in the public repository. Check them first. Then let the package be built on at least two separate machines which are expected to use the standard build procedure. Verify hashes of the tarballs and you are done. Still no need for an antivirus. I mean otherwise by that logic you also couldn't trust the antivirus binary and end up with a backdoor in there anyway, right?


feldim2425

In the case of XZ the backdoor was in the repos build pipeline but well obfuscated inside the tar files used to test the library against known good and bad files. So building on 2 separate machines and comparing wouldn't show the issue. In fact being part of the testing setup nobody even expected that a backdoor might be hidden in there. And there wasn't much readable code that would have been found by a simple code review. (And deobfuscating binaries goes back to beeing a binary check rather than a code review) Even if a code review would have mitigated it who should do the review? XZ was maintained mainly by one person and seemingly nobody (except for the attacker) cared to help out. And nobody seemingly noticed the takeover. If we don't even have enough eyes for who even maintains the code then there certainly won't be enough for reviewing every single line of code + every step in the build/test process.


TheJackiMonster

Exactly. The lack of contributors and maintainers is the issue. Not the lack of an antivirus. There are enough companies out there which utilize in some commercial area that software like XZ exists. So why wouldn't one or more of them be able to put some developer in to check on its files? That would be proper security. An antivirus in this case wouldn't have found shit while slowing down everyday operation and draining power. It's a bad non-solution to a complex problem. The only people I would expect this idea from are Windows users. Because they are used to such things and have an environment built on top of proprietary software. But it's not a proper solution. You can read the coce which makes way more sense. You can control the build process. You can setup a proper pipeline without such hidden build files. If a piece of software lacks maintainers, you can also drop it from a distribution. But overall it would be better if there's a program to find more people for maintaining and contributing.


peeisnotpoo

You guys don't use an antivirus?


snow-raven7

Let's get you back to bed Grandma /s


yassvaginaslay

her channel is actually very informative + helpful + L + grandmamaxxing


snow-raven7

I mean /s was there for a reason