Governor wrote: ↑Fri Aug 30, 2024 8:27 am
I was told that Puppy was considered safe, even though the user has root privileges by default.
Considered safe by who - by the person who told you it's safe? Safety is not boolean, it's a scale between 0 (guaranteed dangerous event) and 1 (complete safety). Some people consider 20% chance of their credit card info getting stolen when entering it in a random site to be "safe enough". And many Linux users don't do any kind of system auditing or malware detection, yet proudly claim that their system was never infected, deny the possibility of infection (despite the absence of any counter measures) or even dismiss the idea of malware as some kind of conspiracy or attempt to sell anti-malware products.
Think of it in terms of risk factors: for example, using an outdated browser with known vulnerabilities (and known ways to exploit them) that's easy to identify by the operator of a malicious site that pretends to be a site you know. This dangerous behavior increases the chance that your system gets compromised and your personal data (like credit card data you type in the browser) gets stolen, but it doesn't guarantee that. On the other hand, using the latest browser doesn't protect you from everything, because maybe it has new security holes discovered and exploited in the wild by attackers, before security researchers found and reported them to the browser vendor.
Governor wrote: ↑Fri Aug 30, 2024 8:27 am
1) Which Puppy version is the safest?
I can't suggest one version, but the general guidelines I can recommend for choosing a safe Puppy to use are:
- Timely point releases with all upstream security updates included - the actively exploited security vulnerabilities present in your OS are more likely to be known ones, and if your OS is outdated they probably got fixed already but you don't have the fixes applied
- Security hardening features - a firewall that's enabled by default and blocks all incoming connections, auto-enabled blocking of malicious/advertising sites, internet-facing or risky applications auto-configured to run as spot
- A Puppy built using a fully automated build procedure that runs in a sterile build environment, reducing the risk of something malicious sneaking in during the build process (for example, if the computer the build runs on, is infected with malware)
- Few preinstalled packages that were built long ago, manually, on somebody's computer, possibly on a compromised one, can't be verified to 100% match the source code they were built from (= no malicious changes, intentional or not), and don't receive any security updates
- Few preinstalled packages that are both unmaintained (= no security updates) and a potential remote attack vector (like a browser) - for example, the Light browser that ships with some Puppy releases, it's a fork of Firefox 48 from 2016, so it misses 8 years of security features and has 8 years old vulnerabilities at this point
- Few preinstalled packages that have bad reputation - X.Org and sudo are good examples (https://www.x.org/wiki/Development/Security/, https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=sudo)
Governor wrote: ↑Fri Aug 30, 2024 8:27 am
3) How can I use Puppy without admin privileges, and can I still save and/or run downloaded files?
Puppy had this weird feature of logging in as the "finn" user instead of root, until https://github.com/puppylinux-woof-CE/woof-CE/pull/2302. It was broken for years, didn't get any attention from any developers, and I proposed to remove it because Puppy users enabled this security feature but it broke their system. Nobody volunteered to fix this feature (we have backup of the code before the removal) and restore it since 2021.
Governor wrote: ↑Fri Aug 30, 2024 8:27 am
4) Is Vanilla Dpup safer than Bookworm?
If you do an apples to apples comparison of the out-of-the-box OS without additions and changes, it's probably a bit safer:
- It has fewer preinstalled packages
- It doesn't have any preinstalled .pet packages - it's built from Debian packages and packages built from source (grub4dos in the ISO is the only thing that's prebuilt and old - if you don't use the ISO, it's not a security risk)
- It has some extra security hardening - for example, X.Org and internet-facing applications like the browser are preconfigured to run as spot
- It has bi-weekly automated releases with all security updates from Debian
- The preinstalled Firefox has many privacy-related configuration tweaks applied, they should reduce the attack surface
Development versions of Vanilla Dpup 11.0.x (will be released once Debian 13 is out) bring many more things to the table. They drop X.Org (big can of worms) by switching to Wayland (with Xwayland running as spot, sandboxed), replace packages like Geany with Debian packages that get security updates, make the sandbox for applications running as spot stricter, improve the firewall in various ways, make the system much easier to audit for tampering (because it's super close to stock Debian) and apply various system hardening recommendations by big security organizations. IMO the best new security feature is encryption for save folders, which protects sensitive data against theft and malicious modification by someone with physical access to the drive Puppy is installed on.
With all that said, if you don't have good cyber hygiene (for example, install an outdated browser, run it as root, disable the firewall, ...), the biggest risk factors you have are risks you created yourself, and don't come from the OS you installed in its clean state right after installation.
Governor wrote: ↑Fri Aug 30, 2024 8:27 am
6) Both Fossapup and Bookworm, seem to be getting slower and slower (I use the same Firefox in both). How can I tell if my system has been compromised?
Slower perceived speed is normal. For example, if Puppy is installed on a slow hard drive and the browser has lots of history, bookmarks and cache to read from disk, the browser might feel slower. It's unlikely that the primary reason for slowness is malware infection, because malware (minus cryptominers or ransomware that encrypts your files, maybe) tends to be stealthy (with varying degrees of success) and slowing down your computer is not exactly stealthy.
If you want to check if your system is compromised, dpkg -V
is a good place to start. It will allow you to detect files that came from Debian packages but got modified, either during the build process of this Puppy, or by you after the installation.