Hi there,

Win10 is soon not supported. Tbh Linux have been on my radar since I started to break from the US big tech.

But how is security handled in Linux? Linux is pretty open-source, or am I not understanding it correctly. So how can I as a new user make sure to have the most secure machine as possible?

  • Synapse@lemmy.world
    link
    fedilink
    arrow-up
    2
    ·
    3 hours ago
    • Set a decently good password (password is required frequently on Linux, so do go overboard with a 40-random-characters-long password, you will regret it)
    • don’t install programs or run scripts from shady sources, prefer to install programs from the Software store (package manager and flatpak)
    • setup a backup system to regularly copy all your files to a separate storage device. This is the way to protect yourself from ransomware but also user errors! Having the possibility to format your drive, reinstall and restore backup in a 1 hour time span is going to give you the peace of mine you need for exploring and experimenting with Linux
  • Ardens@lemmy.ml
    link
    fedilink
    arrow-up
    8
    arrow-down
    1
    ·
    7 hours ago

    Linux is always more secure than win10, so whatever your need, Linux is more secure. The biggest threat is almost always yourself, and what you open up, give away, and how easy you make the codes you use and so forth.

  • atzanteol@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    5
    ·
    7 hours ago

    So how can I as a new user make sure to have the most secure machine as possible?

    That’s not what you want. You want a reasonable level of confidence that your system is secure.

    The process is similar to Windows - keep it up-to-date, use good passwords, don’t run things as root (admin), and don’t install things that are questionable.

    The package manager under linux is where you should start, and that varys by distro some. But generally speaking things installed from there are “safe” and will be updated by the package manager when you do updates.

  • ColdWater@lemmy.ca
    link
    fedilink
    arrow-up
    14
    arrow-down
    1
    ·
    11 hours ago

    Nothin, just install your favourite distro and don’t run random command/scripts/binaries you found on the internet

  • utopiah@lemmy.ml
    link
    fedilink
    arrow-up
    2
    arrow-down
    1
    ·
    8 hours ago

    Others have said it before but basically : what is YOUR (not me, not your best friend, nor your colleague, etc) threat model?

    To clarify that means WHO is actually trying to threaten your security?

    Typical for most people it would be :

    • scammers trying to get pieces of your identity or your local cryptocurrency wallet or resources they can use to repeat that on to others.

    For some people, like activists or political journalists it would be :

    • national actors, e.g. governments, with their surveillance apparatus, who might end up on a list with a set of conditions that would trigger some automated scan to get e.g. Signal logs

    For very very few people, say Edward Snowden, who within the previous group actually did trigger some action :

    • actual team of hackers trying to hack into their devices

    So as you can imagine if you are part of group 1, 2 or 3 then way you will protect yourself is totally different. What you will also have to protect is also different, e.g. if you have no cryptowallet but are traveling you might have to protect your phone physical phone and its data.

    So… if you are serious about this, take a cybersecurity class. There are plenty available but how a computer works, software and hardware alike, is precisely what makes them simultaneously powerful and also dangerous. There are plenty of ways to break security (e.g. return oriented programing), plenty of ways that practically impossible (e.g. encryption) due to the very nature of computers (i.e. computational complexity) which IMHO makes this one of the most fascinating topic. Ask yourself come the credit card in your pocket (costing few bucks to make) can’t be cracked by the largest super computers (costing billions) on Earth?

    TL;DR: no offense but you don’t seem to be ready for the answer without getting the basics first.

  • Cysio@lemmygrad.ml
    link
    fedilink
    arrow-up
    1
    ·
    8 hours ago

    There’s plethora of resources if you want to make your Linux install even more secure than the defaults (so-called “hardening”)

  • MonkderVierte@lemmy.zip
    link
    fedilink
    arrow-up
    8
    arrow-down
    5
    ·
    12 hours ago

    So how can I as a new user make sure to have the most secure machine as possible?

    Shut the computer down. That’s it; computer as secure as possible.

    Otherwise, if you actually want to use your computer, google for “threat model” first.

    But generally: use an adblocker in your webbrowser, don’t execute random commands/tools from the internet before you know for sure what you’re doing, update stuff now and then and make backups.

  • reluctant_squidd@lemmy.ca
    link
    fedilink
    English
    arrow-up
    1
    ·
    9 hours ago

    I would argue that Linux is inherently much more secure than windoze, simply because of how it handles user space vs. System (root access vs. User access). Also by how transparent its configuration is and how much information is readily accessible detailing how it works and how to adjust things.

    However, when talking security for anything above the average user’s browsing needs, it can get very complicated depending on what you are trying to achieve.

    Think of it like building something to keep out honest people vs. to keep out hardened, knowledgeable, clever thieves. Obviously the latter is going to take more time and resources to achieve, while the need to keep out more sophisticated bad actors would probably only be needed if you have something they might want.

    Here are some suggestions for searching if actual security is your goal. Others can chime in with more things if they want. This is just some topics/programs you can read about to dip your toes in.

    • nftables/Firewalld (common firewalls)
    • wireguard/openvpn (vpn protocols)
    • rootless containers (podman)

    Best of luck!

  • SayCyberOnceMore@feddit.uk
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    12 hours ago

    Just make sure everything’s updated.

    Microsoft do a good job of updating drivers and their applications, but Windows application updates vary so much.

    For Linux - mostly - the distro maintainers handle all updates and just updating is usually enough.

    After that it’s down to you… if you disable all the built-in protection and visit dodgy websites then any OS is going to struggle.

    You can improve the out-of-box security by removing software you don’t use, improving default configurations (one size doesn’t fit all) and considering if you want additional security software - this applies to any OS.

    So, to return to your question, choose a Linux distro which has regular updates and only contains applications that you use.

    • fodor@lemmy.zip
      link
      fedilink
      arrow-up
      2
      arrow-down
      1
      ·
      12 hours ago

      Visiting dodgy websites in itself isn’t as risky as you make it out to be. There are very few exploits in an updated version of Chrome or Firefox that would compromise your machine.

  • fodor@lemmy.zip
    link
    fedilink
    arrow-up
    3
    arrow-down
    1
    ·
    11 hours ago

    You don’t actually need “perfect” security in the future, any more than you did in the past. Windows was not perfect, right? So stop looking for perfection. Instead, look for “good enough for 99.9% of the world”. And you can get that with many of the popular Linux distributions.

    Basically, install a popular distro, and keep your software to whatever is in the package manager. Don’t install random shit manually. Don’t download random software from random websites. Don’t fuck with security settings unless you read up on the topic very thoroughly. Then you’ll be fine.

  • /home/pineapplelover@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    41
    arrow-down
    1
    ·
    1 day ago

    There’s a lot of people with the idea that open source can’t be secure because people see the source code.

    But imagine this. You have 2 locks, one that is completely viewable of the innerworkings, and another that is covered, both have been unbreakable, but could you imagine the balls on the guy that made the clear lock? Imagine feeling so confident that your lock was clearly the best, that you just expose it to any hacker ever and they still can’t get in.

    Microsoft can barely get things working with their closed source code.

    In reality, anything is exploitable and hackable eventually. With the open source community there are so many eyes on it that when someone notices that the program is running 2 seconds slower than it used to, they discover a vulnerability instead of just accepting it and saying “probably MS doing some BS” and dealing with it.

    • CheesyFox@lemmy.sdf.org
      link
      fedilink
      arrow-up
      8
      ·
      15 hours ago

      your analogy doesn’t quite work here tbh.

      It’s not a transparent lock, a transparent lock would be easy to pick. It’s more of a usual lock, but everyone can see all the blueprints and changes done to them. You can make changes to the blueprints yourself, and if the locksmiths approve of it, the next iteration of the lock will have them included.

      Everyone who’s in the set of users of OSS software can contribute, therefore the set of people in control of the software that want it to have no backdoors whatsoever is always larger than the set of people who want to let the backdoors in, unlike in closed source, where corporate can singlehandedly decide to include a backdoor on purpose, not to mention, lots of OSS projects have such a large quantities of different people working on them, corpos won’t be able to gather so much humanpower under a single project ever.

  • shreyan@lemmy.cif.su
    link
    fedilink
    arrow-up
    2
    arrow-down
    1
    ·
    12 hours ago

    Security is a rabbit hole.

    You’re going to end up wasting a lot of time and effort on learning about something that in the end will not have a substantial impact on your computing experience.

    It will make you look good in front of losers on the internet you’ll never meet, though.

  • missfrizzle@discuss.tchncs.de
    link
    fedilink
    arrow-up
    10
    arrow-down
    1
    ·
    edit-2
    20 hours ago

    the most secure possible? you’ll need to learn a ton. you’ll get there, but it’ll take a while.

    decently secure? install Linux Mint, install your updates, don’t run sketchy commands with URLs in them unless you know what you’re doing, maybe follow a hardening guide. you’ll be okay.

    if you need to be extremely secure and private, install Tails on a USB stick. it will be slow and frustrating, and you’ll need to save files to a second USB drive, but it will probably keep you pretty safe, and it’s decently user-friendly. just make sure you keep Tails updated! you’ll have to do that by flashing the new Tails onto a new USB drive, there’s no easy way around that.

    those are your two most user-friendly, safe approaches.

  • 🧟‍♂️ Cadaver@lemmy.world
    link
    fedilink
    arrow-up
    3
    arrow-down
    1
    ·
    15 hours ago

    To have the most secure machine possible, you might need a hardened kernel but you absolutely need to have SELinux (or equivalent) rules set up.

    The easiest way to have a go at this would be to install OpenSuSE (any version will do, they all ship with SELinux ootb) and follow guides on how to setup SELinux permissions.