• Clbull@lemmy.world
      link
      fedilink
      arrow-up
      43
      ·
      edit-2
      1 year ago

      With SteamOS and ChromeOS now having millions of users, Linux attacks will become more commonplace.

      IIRC ChromeOS is either built on or can be configured to run applications like a Linux distro?

      • Honytawk@lemmy.zip
        link
        fedilink
        arrow-up
        21
        arrow-down
        1
        ·
        1 year ago

        Yes, so Linux better be ready, because those attacks will increase.

        And sentiments like the one from OP don’t help one bit.

    • Ooops@kbin.social
      link
      fedilink
      arrow-up
      34
      arrow-down
      3
      ·
      1 year ago

      Malware for desktop users is the low hanging fruit with little rewards. You just hear about it because it’s so rediculous easy.

      The real money is on servers, so that’s were real money/work is invested to develop malware for much higher gains. How successful are they again?

      • Gork
        link
        fedilink
        arrow-up
        14
        ·
        edit-2
        1 year ago

        I think you’re right. A single desktop, unless it is either someone in a position of power or access to trade secret files, is not a time effective attack vector.

        A server on the other hand can access all of that stuff across an entire organization.

        • Ooops@kbin.social
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          edit-2
          1 year ago

          Of course not. There is a market for investing very little for some cheap malware and then putting it out there, waiting for the small amount of people (out of a billion of desptop users) falling for it. Also you go for the weakest link in defense, so scamming random desktop users is rarely a technical feat. It usually exploits the human, not the system.

          But we also all know how money is actually distributed. So millions of random users being scammed for some money is still not the high reward scenario a server is. Much more work is invested there because the rewards are so much higher. And yet even then you often target people as the weak link. System security for a company is mainly user security. Teaching them to not fall for for scams as an entry way to the system. And there are a lot of professionals that basically made this their own social science of how I convey those things the best, how I enforce and regularly refresh those lessons, how to make people stick to best practices.

          Are you trying to tell me this all happens in parallel to a technical server structure that actually isn’t that safe but rarely exploited because nobody could be bothered to check for vulnerabilities as it’s just Linux and the adoption rate is low?

    • jol@discuss.tchncs.de
      link
      fedilink
      arrow-up
      13
      arrow-down
      1
      ·
      1 year ago

      Not just that but whenever you hear that company xyz was hacked and their data leaked, what do you think was powering their servers? Most likely Linux. Sure, they usually have more things exposed to the internet, but users install way more apps so the attack surface is vastly bigger in home computers running Linux than servers.