Writeup from 2022 that I assume is mostly still valid. TLDR:

  1. Mainstream Linux is less secure than macOS, Windows, and ChromeOS. (Elsewhere: “[iOS/Android] were designed with security as a foundational component. They were built with sandboxing, verified boot, modern exploit mitigations and more from the start. As such, they are far more locked down than other platforms and significantly more resistant to attacks.”)
  2. Move as much activity outside the core maximum privilege OS as possible.
  3. OP doesn’t mention immutable OS, but I assume they help a lot.
  4. Create a threat model and use it to guide your time and money investments in secure computing.

Once you have hardened the system as much as you can, you should follow good privacy and security practices:

  1. Disable or remove things you don’t need to minimise attack surface.
  2. Stay updated. Configure a cron job or init script to update your system daily.
  3. Don’t leak any information about you or your system, no matter how minor it may seem.
  4. Follow general security and privacy advice.
  • Soot [any]@hexbear.net
    link
    fedilink
    English
    arrow-up
    1
    ·
    17 days ago

    These are very subjective arguments, and even the objective points are completely subjective depending on your distro.

    I mean one of his arguments is that C++ is just inherently insecure. He just takes Microsoft’s claims at face-value that all their pointless shit is the magical security wall that it claims to be. He buys into the same lie that ACE on a Windows, Mac or Android is somehow much much safer than on Linux. Most of his claims that other OSes are more secure are rooted in “well yeah they do exactly the same but at least they knooow they do”.

    I’m not even acknowledging ChromeOS - it is Linux, except it only runs a browser.

    99% of this stuff also applies to Windows/MacOS/Android/iOS, except moreso and far more universally. And 90% of this stuff is only relevant if you’re being targeted by some state-funded intelligence like the CIA (cold reading your RAM?? minimum 16-character password?? Keystroke fingerprinting???)

    So whatever, I think the hardening guide looks fairly accurate, but unless you’re being spied on by world powers, I wouldn’t consider it worth peoples’ time to read, never mind implement. 90% of people are still going to be more secure by cluelessly using Linux instead of cluelessly using the others.

    • BCsven@lemmy.ca
      link
      fedilink
      arrow-up
      0
      ·
      17 days ago

      Some distros ship with no firewall enabled, some newbie using public WiFi is going to be less secure.

      A pain with OpenSUSE tumbleweed is firewall and SELinux by default, but it forces you to learn about security if you need to setup SAMBA or other connections to your machine

        • BCsven@lemmy.ca
          link
          fedilink
          arrow-up
          0
          ·
          17 days ago

          Last time I tried Ubuntu, it had a firewall but it wasn’t active by default. Unless something changed in the last few years.

          No firewall means your system is going to get scanned to see if anything is open or exploitable

            • BCsven@lemmy.ca
              link
              fedilink
              arrow-up
              0
              ·
              17 days ago

              People hang out on public WiFi sometimes with packet sniffing and other tools to exploit people. Especially some distros don’t have X server remote display locked down.

              If you want to know what is open or exploitable CVE you can run a script that discovers all CVE exploits against a machine

                • BCsven@lemmy.ca
                  link
                  fedilink
                  arrow-up
                  0
                  ·
                  edit-2
                  17 days ago

                  To answer all your questions I’d need some time, I’d have to go back to the 100s of hours of 2.5admins and security podcasts. But to clarify an exploit doesn’t have to be an open service especially if you aren’t running a firewall. Some bombard your network adapter into buffer overun etc, but network traffic is handled by the kernel stack. A good firewall drops packets instead of letting them all into the public interface and kernel TCP stack. Where CVE stuff can happen.

                  I’m not saying Linux can’t be hardened , but because it is user editable and not locked down like Mac, you have a lot of things people can alter (or not alter) by hand or packages that can leave you open.

                  There’s a reason we have AppArmor and SELinux, yet some don’t bother to use those tools.

                  There was something with discord? Discourse? screen sharing that used x11 forwarding, and was on by default. I want to say Ubuntu. When it was news I checked by SUSE install and thankfully its disabled by default. But also the reason Linux distros are moving to Wayland because X11 is a security problem.

                  Ubuntu ufw off by default https://documentation.ubuntu.com/server/how-to/security/firewalls/index.html

  • ISolox@lemmy.world
    link
    fedilink
    arrow-up
    0
    arrow-down
    1
    ·
    17 days ago

    Sorry man, your going to get down voted like crazy just because you posted something bad about Linux.

    Good info thoughm