Crowdstrike's malware-as-a-service is now affecting Linux. Red Hat, Rocky and Debian stable are affected. According to distrowatch.com, most of us here running linux as a desktop are using debian and debian stable based distros like Mint, Ubuntu, MX. Stop updating, 2 wks+
(www.theregister.com)
🚔 Crime & Democrats 💸
You're viewing a single comment thread. View all comments, or full comment thread.
Comments (25)
sorted by:
Someone who bills himself as a 'computer guru' and who reconditions laptops and sells them, recently told me that Linux was the way to go, as it was (in his words) impervious to hacking and malware. Hmmm... maybe he's full of it too.
No, linux is still much more secure than windows. Your guru is right.
The security models are better in linux than windows. Windows is and always has been a total security mess on the other side of the tapestry.
Windows is LITERALLY only good for one thing: Playing Games.
And that's because game developers go where there is greater market share, and they don't take the extra time to make a game work in all platforms.
Also, the first thing people do in linux-as-a-desktop is they turn off automatic updates. Many distros don't do this any more. People in linux are encouraged to update their systems themselves with apt-get / apt update or 'yay' on the commandline. And in linux you can choose which updates to get, and by default, distros try to be very safe and conservative with the updates they get.
There's a lot more checking of software before sending it out. It's very rare for a bad linux update to go out there, but believe me it's happened before. There is a famous example recently of an update that nearly affected every linux (xz hack)
This would be the first such thing to happen in maybe over 20 yrs, to my memory. I also want to note that it DID NOT happen. It ALMOST happened, but ironically a microsoft engineer found it first.
User or admin having complete control over the OS is fundamentally more secure than a central 'authority' releasing updates and pushing them no matter what the use case for the device. I am so sick of people trying to argue that Microsoft should be able to update Windows and reboot it on something like a factory control system computer rather than to keep entire control over when and how the control system OS updates and reboots with those designing and maintaining the control system.
Security and stability go hand in hand.. Without stability, there is zero security. Somehow the software industry has pushed this idea of 'security no matter what' which means often the least tested code is pushed out to everyone to close 'security holes' that may or may not matter depending on the end user environment.
Exactly. Which is a good example of why decentralized systems are superior to excessively centralized alternatives.
In the companies where I worked, no patch or update was EVER made directly to production environments... especially for Windows and Linux OS (many companies run mixed environments).
All patches and updates were downloaded to safe environments, thoroughly tested and proven to be safe BEFORE ever pushing them to production environments - which in corporate networks also included user desktops/laptops, etc.
Crowdstrike Falcon pushed updates directly from the cloud to local computers - which is bat shit crazy from a security/reliability perspective. Will people learn from this? That remains to be seen...
I wonder if Crowdstrike hiring policies, and the people they have attracted to their company due to such policies, had anything to do with it:
"CrowdStrike is an advocate for diversity and equal employment opportunities. To enhance our culture as we grow, we offer unconscious bias training for recruiters and hiring managers with the goal of helping our people be more inclusive managers, run inclusive meetings and be thoughtful of inclusivity in everyday process and practice."
https://www.crowdstrike.com/about/environmental-social-governance/diversity-equity-inclusion/