@AQUAR :-
AQUAR wrote: Thu Sep 12, 2024 5:42 am
....security through obscurity....
Heh. Um; yeeees.....
Granted, this has almost been a 'mantra' of the Linux community for long enough. Granted, too, that while there is nothing like the quantity of Linux malware out there in the wild, it DOES exist. And as desktop Linux slowly & steadily increases its market share, that quantity will gradually increase, too.
Most Linux malware still tends to target server and enterprise set-ups more than home users. Linux is a very secure system by default IF used correctly & properly, but 100% secure? That's a pipe-dream. My own view has always been simple:-
"What man can invent, man can circumvent..."
You must credit the hackers/malware authors/bad actors with being at LEAST as intelligent as the people writing the very code they're attempting to break into. This is as true today as it's ever been.
Bad actors are almost always financially motivated. Stat. If they figure it's worth their while.....they WILL "go for it".
========================
Here in the Puppy community, many have long taken the view that Puppy is secure by default due to her oddball construction, and loading into RAM from 'read-only' files. I still think that certain aspects of Puppy's functionality ARE as secure as possible.....but as for "un-hackable", mmm; nah. See above.
At the point when Puppy is fully up-and-running, you need to realise that she is presenting the exact same system file-hierarchy as every other distro out there. And those 'bad actors' are undeniably getting cleverer & cleverer by the day.
It's probably more awkward to "hack" Puppy than most, especially if you don't 'save' at session's end OR don't run with a 'save' in the first place. But I suspect we've lulled ourselves into a false sense of security.....to say she's totally secure is, I think, deluding ourselves. Those 'read-only', 'live' sessions aren't uncrackable.......they just need more work to breach. And bad actors are nothing if not persistent.
Security is an on-going process. You don't just "install & forget" it. Doesn't work like that. Malware constantly evolves, so countermeasures need to do the same.
And there's ONE variable that no amount of software can account for, or mitigate. It's usually between the seat-back and the keyboard.....
Mike.