You are viewing a single comment's thread from:

RE: Antivirus Software: A Veiled Instrument for Suppressing Piracy and Freedom of Speech

in #matrixyesterday

Screenshot 2025-12-16 at 00-14-15 GPTZero Dashboard.png

This looks AI-generated. Boo! No upvotes from me, but thanks for declining payout at least.

I use Malwarebytes as a backup scanner for unknown files, drives, etc. on top of basic Windows Defender. I'm not torrenting, and I also lock down Firefox a bit with extensions for privacy and security.

I generally suggest Linux, although it should be noted security through obscurity is not complete protection from malware. It tends to encourage better segregation of authority and access.

Sort:  

I was intending these posts for crawlers but I guess I need a better strategy if the AI score was this bad.

I generally use Brave for browsing. Do you have any extension recommendations on top of the built-in shields?

I don't see much security benefits in using Linux other than that it's not compatible with the exploits and malware built for Windows. Maybe if I bothered spending some time to tune SELinux I could achieve some cover but looking at Android the sandboxing approach does not seem to work very far and it quickly becomes inconvenient to fence off your workbench from your files.

I'm just stuck in my habits from back when my dad was on Team Netscape Navigator, and I maintain a general revulsion for all things Chromium despite assurances it can be had without Google intruding. Brave is on my computer, but old habits die hard.

The main benefit I see to Linux is the ease of locking admin power behind a password to prevent malicious installation of software or modification of the system files. Windows can do this too, but every Linux distro I've tried is pretty good about setting this expectation. And of course Windows and Mac remain the more viable targets. Don't be the low-hanging fruit.

I think that people put too much trust on the sudo prompt on the terminal. Scripts could easily produce a fake prompt for the intent to grab the password or they could just modify the path variable and add a malicious replica in the user's local bin directory. GUIs are generally not any better as they can just draw a shade layer on top of the other windows and drop a centered password prompt on the midpoint.

It is true that this design prevents the execution of admin level operations by default but you could just as well switch accounts when you need the elevated access. There is also so much to steal and try in the user's context that many attackers would be content with that alone if they want to pull a ransom attack or an identity fraud.