• 10 Posts
  • 1.16K Comments
Joined 3 years ago
cake
Cake day: June 7th, 2023

help-circle
  • While I don’t know the specific post you are referring to, Malware exists for Linux. Here’s a great overview from last year. If someone wants to argue, “oh it’s from a security company trying to sell a product” then let me point you at the Malware Bazaar and specifically the malware tagged elf. Those are real samples of real malware in the Linux specific ELF executable binary format (warning: yes it’s real malware, don’t run anything from this site). On the upshot, most seem to be Linux variants of the Mirai botnet. Not something you want running, but not quite as bad as ransomware. But, dig a bit and there are other threats. Linux malware exists, it has for a long time and it’s getting more prevalent as more stuff (especially servers) run on Linux.

    While Linux is far more secure than Windows by design, it’s not malware proof. It is harder for malware to move from user space into root (usually), but that’s often not needed for the activities malware gets up to today. Ransomware, crypto miners and info stealers will all happily execute in user-land. And for most people, this is where their important stuff lives. Linux’s days of living in “security through obscurity” are over. Attackers are looking at Linux now and starting to go after it.

    All that said, is it worth having a bloated A/V engine doing full on-access scanning? That depends on how you view the risk. Many of the drive-by type attacks (e.g. ClickFix, fake tech-support scams) all heavily target Windows and would fail on a Linux system. The malware and backdoors that come bundled with pirated software are likely to fail on a Linux system, though I’ll admit to not having tested that sort of thing with Wine/Proton installed. For those use cases, I’d suggest not downloading pirated software. Or, if you absolutely are going to, run those file through ClamAV at minimum.

    Personally, I don’t feel the need to run anything as heavy as on-access file scanning or anything to keep trawling memory for signatures on my home systems. Keeping software up to date and limiting what I download, install and run is enough to manage my risk. I do have ClamAV installed to let me do a quick, manual scan of anything I do download. But, I wouldn’t go so far as to buy A/V product. Most of the engines out there for Linux are crap anyway.

    Professionally, I am one of the voices who pushed for A/V (really EDR) on the Linux systems in my work environment. My organization has a notable Linux footprint and we’ve seen attackers move to Linux based systems specifically because they are less likely to be well monitored. In a work environment, we have less control over how the systems get (ab)used and have a higher need for telemetry and investigation.


  • One of the things to look at is the interest rate you would be paying for either loan and how that would effect the total cost of the loan. Also, there is the question of the utility of any money spent up front. For example, if using a loan on the existing house would result in no up front costs and a 5% interest rate over 30 years, and the standard mortgage would cost $20,000 and have an interest rate of 8%, you’re almost certainly better to use the existing house as backing and throw that same $20K in a long term interest bearing investment (e.g. government bonds). All this assuming you plan to hold onto the second property long term.

    Compounding interest is a fantastic tool and a fearful master. If you can make it work for you, then do it. If you are facing the possibility of paying it, you almost always want to lower it as much as possible.








  • I mean, no shit? Part of the Snowden leaks was information that the NSA had intercepted Cisco routers and backdoored them before they were shipped on to international customers. So, even without willing actions by US vendors, there is that to worry about. And the idea that a private company would install a backdoor for US Spy agencies in their infrastructure isn’t new. The fact that any Chinese company is using US hardware/software just seems incredibly stupid. And no one should be using CheckPoint.

    It’s the same reason Huiwei was thrown out of US infrastructure. You cannot build trusted architecture with hardware/software from a nation which you know wants to hack you. I work for a US based company in cybersecurity, we treat WeChat as Chinese State spyware, because it is. We wouldn’t consider a router or firewall from a Chinese based company and we treat any software from China with outright suspicion. Sure that all sucks and we may be missing out on some great stuff which isn’t malicious. But, the risks far outweigh the costs. I’d expect my Chinese counterparts to be making the exact same risk calculation for US based tech.




  • Steam is certainly in a dominant market position. They had a large first mover advantage and have also done a lot of work to make and keep gamers happy with the platform. That said, I can understand companies being upset at the 30% Steam tax on sales. It’s a pretty large cut and other stores (e.g. Epic) have tried to compete based on that cost. The problem being that many games have massive Steam libraries and want to keep everything on one place and they aren’t really affected by the cost to the devs; so, without a significant reason to change, they won’t. It also doesn’t help that some competitors (e.g Epic) have been user hostile in the past and so don’t have a high level of trust. Steam has also built a lot of goodwill with power users for their work on Proton.

    While I do think there needs to be healthy competition for storefronts, as long as Steam resists the temptation to enshitify their dominant market position, I don’t see them losing market share in any meaningful way. Perhaps it would be better if Steam were spun off from Valve, putting them Valve on equal footing with other devs. But, video games aren’t really fungible. It’s not like I’m going to say, “oh darn, Kingdom Come is too expensive, I guess I’ll buy Half Life instead”. They are just fundamentally different games and if I want to play the first one, I’m not able to get that by buying the second. So, the price of one of them isn’t really a factor in pushing me towards the other. Though, Valve might use Steam to push one game over the other, and that could be something that is a problem.



  • You could try using Autopsy to look for files on the drive. Autopsy is a forensic analysis toolkit, which is normally used to extract evidence from disk images or the like. But, you can add local drives as data sources and that should let you browse the slack space of the filesystem for lost files. This video (not mine, just a good enough reference) should help you get started. It’s certainly not as simple as the photorec method, but it tends to be more comprehensive.