this post was submitted on 10 Sep 2024
162 points (96.0% liked)
Technology
59589 readers
2936 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
That's security through obscurity. It's not that Linux has better security, only that its already tiny desktop market share around 2003 was even smaller because of different variations.
That's again blaming the Microsoft user for not understanding computers but not blaming the Linux user for running as root.
Where you tech support at a company?
no, its absolutely not. its choosing software components based on known security vulns or limiting exposure to a suite of suspected or established attack vectors. its absolutely not security through obscurity. these are fundamental choices made every day by engineers and sysadmins everywhere as part of the normal design, implementation and maintenance process. there is nothing "obscure" about selecting for certain attributes and against others. this is how its done.
perhaps you disagree with this.
? its not the users job to understand OS security. to expect otherwise is unrealistic. also, virtually no "average" linux user, then or now, ran/runs as root. the "root X" issue related to related to requiring XWindows to run with and maintain root privs., not the user interacting with X running as root. it was much more common in the XP era to find XP users running as administrator than a "Linux user ~~for~~ running as root" because of deep, baked-in design choices made by microsoft for windows XP that were, at a fundamental level, incompatable with a secure system - microsofts poor response to their own tech debt broke everything "NT" about XP... which is exactly the point I am trying to make. I am not sure your statement has any actual relation to what I said.
You don't swap GUI's on 1,000 corporate users every time a new exploit comes out. You don't know which Window Manager or DE is more secure.
Besides the Window manager is rarely relevant to exploits the same as in Windows. DirtyCow, CVE-2024-1086, SSH, this entire list https://www.cvedetails.com/product/47/Linux-Linux-Kernel.html?vendor_id=33 didn't care which Window Manager you ran.
That's because Linux users already know about computers. In 2003, at the time of XP Linux distro did not disable root. Root was the default during install. You then had to create your own non privileged accounts. In some distros that meant using useradd.
The exact design choices of Linux at the time.
You have a double standard.
well, don't we all? but I think my argument is somewhat well founded. I have a reply in-composition, but just got project smacked. will reply as soon as I am able. didnt want you to think I had abandoned a conversation.