With the recent windows 10 EoL news, I was able to move my dad over to Linux mint. But he does a lot of finance stuff. Long ago, Linux had a belief that desktop Linux are not the primary target for crackers but I don’t believe that true anymore since it’s getting significantly popular lately like Europe government migration over to Linux and Libreoffice.

My question would be , given my dad is just as careful on Linux as he has been on windows, would it be fine to do finance like banking and trading (not the fastest kind )?

If not, what would be your distro of choice for that? Even browsers (I installed Firefox and Edge from Microsoft website deb file)

  • Cris@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    8 hours ago

    If you’re picking a distro for someone else I would not recommend a small project distro or something incredibly niche 😅

    Any of the big projects should be decent. Fedora, maybe fedora silverblue or whatever their imutable variant is called, opensuse, Mint, Ubuntu, debian. (Personally I don’t like some of the choices Ubuntu makes but it may still be a very good option for less technical folks)

    Others can tell you which of those have the best security defaults, but to be honest it doesn’t sound like you actually have particularly exceptional security needs relative to what any distro will provide. I’d prioritize something stable and user friendly- which, again, your best bet is NOT picking a niche small project or something most people have never heard of

  • Tenderizer78@lemmy.ml
    link
    fedilink
    English
    arrow-up
    4
    ·
    15 hours ago

    Secureblue is what I’d use if security was a major concern. Every time I’ve tried to use a non-Ubuntu distro I’ve immediately ran into a few technical issues so I stick with Ubuntu.

    Generally I think I’m safe as long as I don’t install untrusted software, and the distro didn’t package untrusted software.

  • Attacker94@lemmy.world
    link
    fedilink
    English
    arrow-up
    8
    ·
    19 hours ago

    Based upon your wording, I am assuming your father is not particularly tech savvy, if this is the case first and foremost you should be picking a distro that is maintained by a large group of trustworthy developers, this removes the niche distros from the running. Secondly, since he isn’t going to want to learn the terminal, you should be picking a distro that installs programs with a GUI package manager or flatpak manager, this removes the likes of arch, gentoo, & open suse tumbleweed. Thirdly, you will want a distro that is based on one you understand well enough to run tech support, I don’t know which that is for you, if it is Debian based stick with mint, fedora based go with fedora workstation or fedora KDE, if it is opensuse I don’t have any recommendations sorry.

    After you select the distro you need to educate your dad that he should only be getting new programs through the package manager, and I would either tell him the inherit insecurity of some flatpaks or remove flathub from your mirror list unless there is something he really needs in which case you need to do your research.

    In general security on Linux is a lot more active for IT than it is for Windows, but for the general user if they can get by using a well known distro’s repos you shouldn’t have any security issues.

    If you are overly worried you could add apparmor to the system to isolate the system from programs or pick an immutable distro like bazzite, but in general the immutables are smaller teams which is why I don’t prefer them.

  • hendrik@palaver.p3x.de
    link
    fedilink
    English
    arrow-up
    18
    arrow-down
    2
    ·
    edit-2
    1 day ago

    I think most Linux distros will be fine. As of today desktop marketshare is still small, the governments mostly work within custom business applications. And to this date Linux malware and viruses for the desktop are practically unheard of. The common attacks are against the browsers, not the underlying operating system (so do timely updates and install an adblocker) or we’d expect phishing or phone scams and that’s against the human in front of the computer, again not the operating system. That makes me say they’re about all alright. Of course they’re not all equal. Immutable distros and sandboxing will help here. But the real deal is other countermeasures, like be aware how phishing works and try not to mix online banking and pirating games from shady websites. That belongs on separate user accounts or even installed operating systems. And use password managers, 2 factor authentication and these things. (And don’t use Edge, or some browser from some random third-party repository.)

    • rhabarba@feddit.org
      link
      fedilink
      arrow-up
      20
      arrow-down
      18
      ·
      edit-2
      1 day ago

      And to this date Linux malware and viruses for the desktop are practically unheard of.

      This is dangerously false.

      edit: I’m sorry to see I have disturbed a few people here, downvoting the truth without a comment. Explains a lot of contemporary politics, I think.

      • Señor Mono@feddit.org
        link
        fedilink
        arrow-up
        14
        ·
        edit-2
        1 day ago

        I guess the problem is not “the truth” but a claim without sources combined with a short communication style for a really complex matter.

        Even the link you posted just reporte of one malware instead of the current state or perception of the problem. Like a general threat assessment instead of one incident.

      • hendrik@palaver.p3x.de
        link
        fedilink
        English
        arrow-up
        15
        ·
        edit-2
        1 day ago

        Can I get some list or a reference to educate myself? As far as I know it still holds true. There’s rootkits, a lot of old stuff and exploits of webservers or embedded devices, supply chain attacks towards developers and the one day the Mint ISO file got compromised. But I’m completely unaware of desktop computer malware with high risk or actually spreading?! And the list on Wikipedia seems to confirm what i said…

        • rhabarba@feddit.org
          link
          fedilink
          arrow-up
          3
          arrow-down
          7
          ·
          1 day ago

          Okay, let’s assume for fun that there’s highly developed Linux malware that exclusively infects servers and leaves desktops alone. What exactly is a server? Is it a server as soon as a web server service is running? A DNS service? An SMTP service? Some of these are also included with Linux desktops.

          But that’s not the point. There’s no specific “Linux server malware”. There’s Linux malware. It targets the Linux kernel (current data point), not any web stuff.

          • hendrik@palaver.p3x.de
            link
            fedilink
            English
            arrow-up
            4
            ·
            edit-2
            1 day ago

            For example it’s something that has an Apache webserver installed and that Apache is accessible from outside… So the Apache exploit can do something. Do you have both conditions met on your laptop/desktop computer? I’m pretty sure that won’t be the case, and that’s the difference here. And yes, that’s specific.

            • rhabarba@feddit.org
              link
              fedilink
              arrow-up
              1
              arrow-down
              4
              ·
              1 day ago

              Let me repeat my last paragraph, as you seem to have stopped reading after the first question mark:

              But that’s not the point. There’s no specific “Linux server malware”. There’s Linux malware.

              • hendrik@palaver.p3x.de
                link
                fedilink
                English
                arrow-up
                3
                arrow-down
                1
                ·
                edit-2
                1 day ago

                You’re wrong. How would an Apache exploit “hack” your Steam or online banking app? That’s just not possible.

                How would something that exploits the default password on a router infect my machine with a different password?

                Malware uses specific attack vectors and specific vulnerabilities.

                • rhabarba@feddit.org
                  link
                  fedilink
                  arrow-up
                  1
                  arrow-down
                  5
                  ·
                  1 day ago

                  Malware uses specific attack vectors and specific vulnerabilities.

                  The “specific vulnerabilities” are usually in the Linux kernel, quite present on every single Linux system. Please follow the link I posted above. This is not about Apache or any other arbitrary user-facing software.

            • hendrik@palaver.p3x.de
              link
              fedilink
              English
              arrow-up
              3
              ·
              edit-2
              1 day ago

              I don’t think OP’s dad will host a misconfigured cloud service on their computer or set an insecure password, enable ssh and then also open a port in the router. Most attacks on that list are specific to how internet servers are set up. And well, insecure old embedded devices. And we in fact have those systems targeted regularly. My servers gets bombarded with malicious traffic trying to get in.

              • Señor Mono@feddit.org
                link
                fedilink
                arrow-up
                1
                ·
                edit-2
                1 day ago

                Yes. That is part of the insight. But the auto upgrade is a good practice for Desktop PCs, too. And the article shows, that there are vectors and counter measures. Root kits are known for ages.

                • hendrik@palaver.p3x.de
                  link
                  fedilink
                  English
                  arrow-up
                  2
                  ·
                  1 day ago

                  Sure. We get security vulnerabilities in Chrome and Firefox all the time. Sometimes the libraries handling images are vulnerable and that’s a big issue. And zero-days are a small fraction of actual attacks, most likely you’re getting hacked because of old, vulnerable software. So updates are the first priority. And backups is something people also frequently forget to set up.

      • Ethanol@pawb.social
        link
        fedilink
        English
        arrow-up
        1
        ·
        24 hours ago

        Regarding your edit:
        Having read through the comment chains here, your source is a relatively new malware called RingReaper.
        This article from cybersecurity news seemed nice and they linked to the actual PICUS security report which first identified the malware, I think.
        I’m not sure whether this malware is actually used to infect Linux desktops or if it’s mostly used for infecting servers, or whether it is used at all. I agree that people shouldn’t let their guard down with malware on Linux. Anti-malware programs on Linux are a good idea and it seems there are already projects tracking and combating malware on Linux. I do agree that Linux malware is not unheard of.
        Nonetheless you seem to over exaggerate a bit. There is malware attacking servers running Linux but I doubt that many of those would work on desktop Linux. Furthermore, desktop share of Linux is still low, so there won’t be a big incentive for malicious actors to target Linux desktops specifically. The comments you posted here seem more like paranoia to me and do not seem useful, and your single example of a Linux kernel virus seems more like a derailment of the conversation. With that I can understand the downvotes. Don’t take it too harsh either, no need for your witty comment:

        Explains a lot of contemporary politics, I think

        lol

        • rhabarba@feddit.org
          link
          fedilink
          arrow-up
          3
          ·
          22 hours ago

          There is malware attacking servers running Linux but I doubt that many of those would work on desktop Linux.

          Linux kernel malware works just well on desktop Linux kernels, and that’s the majority of Linux malware.

          The comments you posted here seem more like paranoia to me

          Honestly, when it comes to computer security, “paranoia” is a harsh word for being aware of possible risks. (It’s been 12 years “since Snowden”, and people have already forgot, it seems.) Even Windows desktops are not under constant attack, but still there are reasons to maybe take security measurements on them before you can call them “secure”. And that applies just as well to Linux.

  • Björn@swg-empire.de
    link
    fedilink
    arrow-up
    9
    ·
    1 day ago

    OpenSUSE is big on the security and usability front. None of the services you install activate by themselves. Firewall active by default. The first user doesn’t get access to every group under the sun after installation.

    And everything can be controlled through GUI tools. But it doesn’t throw a fit when you’ve done something yourself through the CLI.

    • JustEnoughDucks@feddit.nl
      link
      fedilink
      arrow-up
      2
      ·
      5 hours ago

      Opensuse MicroOS variants kalpa and aeon are probably what they are looking for. Stupid easy to set up and, from what I understand, quite secure.

      Downside is that it needs workarounds for some things like Steam Flatpak and such, but that is the nature of atomic distros.

    • BCsven@lemmy.ca
      link
      fedilink
      arrow-up
      4
      ·
      23 hours ago

      Also SELinux by default now instead of AppArmor. It can be a pain but it works. I.e. files dumped into a SAMBA share aren’t autoshared unless they have the samba SELinux setting applied, etc

  • SayCyberOnceMore@feddit.uk
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    23 hours ago

    Security is the output of removing vulnerabilities and insecure configs

    So, the real answer is: what’s the minimal software you need and the most regularly updated.

    So, my choice is Arch.

    Yep, installation takes a little longer and needs more technical skills, but only install the bits you need (also learn a little more this way) and then updates are tiny and can be done as often as you’re comfortable with.

    Whatever you choose, it will break / die / be deleted or corrupted one day, so always backup your data separately than the OS (separate drive partitions can help) and you’re done.

    • tiz@lemmy.mlOP
      link
      fedilink
      arrow-up
      1
      ·
      1 day ago

      this is the first time knowing the Qubes OS. and upon researching on wikipedia, it’s meant to be used with multiple OSes for different tasks…? wow

      • kylian0087@lemmy.dbzer0.com
        link
        fedilink
        arrow-up
        1
        ·
        19 hours ago

        It is. the underlying OS is actually a type 1 hypervisor, XEN. better take a look at their official website then wikipedia though.

      • Allero@lemmy.today
        link
        fedilink
        arrow-up
        2
        ·
        23 hours ago

        It essentially is multiple OSes, one host and plethora of separate virtual machines that only communicate what they were designed to communicate.

        This way pretty much nothing can get access to userspace.

  • Ashley Thorne@lemmy.world
    link
    fedilink
    arrow-up
    6
    arrow-down
    1
    ·
    edit-2
    1 day ago

    Maybe Secureblue?

    That also comes with its own hardened browser based on GrapheneOS’s.

    And if you don’t go with Secureblue and its browser, I’d recommend using a browser Chromium based, probably Brave. I know that’s a controversial choice, but in terms of security and ad blocking, it’s one of the better options. And disable JIT for V8.

    • tiz@lemmy.mlOP
      link
      fedilink
      arrow-up
      1
      ·
      1 day ago

      First time hearing about Secureblue. And it sounds great. Though their motivation is quite welcome to see, I’m unsure if it will be actively maintained for a long time. It’s quite young project.

  • Sonalder@lemmy.ml
    link
    fedilink
    arrow-up
    1
    ·
    1 day ago

    Education + Up to date and highly popular distro with tons of contributors + good track record regarding security

  • rozodru@piefed.social
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    2
    ·
    1 day ago

    if you’re looking for something with the most security, then Qubes. It’s heavy, it’s slow, but good luck to anyone looking to break into that system.

    Bit of a learning curve and a bit to wrap your head around it but I would tell him to think of it like you have access to a bunch of individual computers that don’t talk to each other but you control all of them. So he could have a Qube for casual web browsing, could have a Qube for work, and another Qube for financial stuff. all independent of each other. IF something were to happen (malware, trojan, whatever) just simply close that qube window and spin up another.

  • rhabarba@feddit.org
    link
    fedilink
    arrow-up
    5
    arrow-down
    11
    ·
    1 day ago

    OpenBSD. No Linux, but much more secure. And yes, there is quite some amount of Linux-specific malware around these days.

    • Auli@lemmy.ca
      link
      fedilink
      English
      arrow-up
      3
      ·
      1 day ago

      Ah now it makes sense why you are spamming the Ring reaper. Still needs an exploit to get it on your machine. BSD has way less hardware support then Linux.

      • rhabarba@feddit.org
        link
        fedilink
        arrow-up
        1
        arrow-down
        4
        ·
        1 day ago

        The precise amount of hardware support of an operating system largely depends on your hardware. For example, iOS runs on iPhones while Linux does not. Does iOS have greater hardware support now?

        Frankly, there is not one piece of hardware in my household that wouldn’t work with OpenBSD. I’m sure I could say the same about Linux. And you.

    • Ashley Thorne@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      1 day ago

      True, but my issue with OpenBSD is that the performance is really lacking in terms of desktop smoothness. It feels like sub 60 fps compared the smoothness of Linux and FreeBSD.

      I hope it’s just a current driver incompatibility and not related to their hardening. Will try again once 7.8 releases.

      • rhabarba@feddit.org
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        1 day ago

        OpenBSD gets SMP improvements all the time, so yes, chances are that 7.8 will be even snappier. For banking, however, desktop smoothness would not be my primary concern.