OpenBSD
ducks
From Wikipedia, the free encyclopedia
Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).
Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.
Community icon by Alpár-Etele Méder, licensed under CC BY 3.0
OpenBSD
ducks
But x11 is insecure
ducks
I mean... Not wrong
I think most Linux distros will be fine. As of today desktop marketshare is still small, the governments mostly work within custom business applications. And to this date Linux malware and viruses for the desktop are practically unheard of. The common attacks are against the browsers, not the underlying operating system (so do timely updates and install an adblocker) or we'd expect phishing or phone scams and that's against the human in front of the computer, again not the operating system. That makes me say they're about all alright. Of course they're not all equal. Immutable distros and sandboxing will help here. But the real deal is other countermeasures, like be aware how phishing works and try not to mix online banking and pirating games from shady websites. That belongs on separate user accounts or even installed operating systems. And use password managers, 2 factor authentication and these things. (And don't use Edge, or some browser from some random third-party repository.)
And to this date Linux malware and viruses for the desktop are practically unheard of.
This is dangerously false.
edit: I'm sorry to see I have disturbed a few people here, downvoting the truth without a comment. Explains a lot of contemporary politics, I think.
Can I get some list or a reference to educate myself? As far as I know it still holds true. There's rootkits, a lot of old stuff and exploits of webservers or embedded devices, supply chain attacks towards developers and the one day the Mint ISO file got compromised. But I'm completely unaware of desktop computer malware with high risk or actually spreading?! And the list on Wikipedia seems to confirm what i said...
I guess the problem is not “the truth” but a claim without sources combined with a short communication style for a really complex matter.
Even the link you posted just reporte of one malware instead of the current state or perception of the problem. Like a general threat assessment instead of one incident.
Regarding your edit:
Having read through the comment chains here, your source is a relatively new malware called RingReaper.
This article from cybersecurity news seemed nice and they linked to the actual PICUS security report which first identified the malware, I think.
I'm not sure whether this malware is actually used to infect Linux desktops or if it's mostly used for infecting servers, or whether it is used at all. I agree that people shouldn't let their guard down with malware on Linux. Anti-malware programs on Linux are a good idea and it seems there are already projects tracking and combating malware on Linux. I do agree that Linux malware is not unheard of.
Nonetheless you seem to over exaggerate a bit. There is malware attacking servers running Linux but I doubt that many of those would work on desktop Linux. Furthermore, desktop share of Linux is still low, so there won't be a big incentive for malicious actors to target Linux desktops specifically. The comments you posted here seem more like paranoia to me and do not seem useful, and your single example of a Linux kernel virus seems more like a derailment of the conversation. With that I can understand the downvotes. Don't take it too harsh either, no need for your witty comment:
Explains a lot of contemporary politics, I think
lol
There is malware attacking servers running Linux but I doubt that many of those would work on desktop Linux.
Linux kernel malware works just well on desktop Linux kernels, and that's the majority of Linux malware.
The comments you posted here seem more like paranoia to me
Honestly, when it comes to computer security, "paranoia" is a harsh word for being aware of possible risks. (It's been 12 years "since Snowden", and people have already forgot, it seems.) Even Windows desktops are not under constant attack, but still there are reasons to maybe take security measurements on them before you can call them "secure". And that applies just as well to Linux.
security or ease , pick one
Qubes OS gives him high security with relative ease.
Fedora Silverblue with auto update and Flatseal tightened apps is a nice middle ground.
RHEL minimises supply chain attack risk and provides features like kernel hot patching. He can use free developer subscriptions. Also try SUSE.
Security wise Chromium is a bit better than Firefox. Try to seal it up with SELinux. Red Hat only supports Firefox however.
SecureBlue can be used as a reference, but it's still downstream so personally I'd avoid using it in case of supply chain attacks unless securing Silverblue is too much of a hassle.
Keep in mind that Flatpak sandbox interferes with browser sandboxes.
Ubuntu or mint both are fine
Based upon your wording, I am assuming your father is not particularly tech savvy, if this is the case first and foremost you should be picking a distro that is maintained by a large group of trustworthy developers, this removes the niche distros from the running. Secondly, since he isn't going to want to learn the terminal, you should be picking a distro that installs programs with a GUI package manager or flatpak manager, this removes the likes of arch, gentoo, & open suse tumbleweed. Thirdly, you will want a distro that is based on one you understand well enough to run tech support, I don't know which that is for you, if it is Debian based stick with mint, fedora based go with fedora workstation or fedora KDE, if it is opensuse I don't have any recommendations sorry.
After you select the distro you need to educate your dad that he should only be getting new programs through the package manager, and I would either tell him the inherit insecurity of some flatpaks or remove flathub from your mirror list unless there is something he really needs in which case you need to do your research.
In general security on Linux is a lot more active for IT than it is for Windows, but for the general user if they can get by using a well known distro's repos you shouldn't have any security issues.
If you are overly worried you could add apparmor to the system to isolate the system from programs or pick an immutable distro like bazzite, but in general the immutables are smaller teams which is why I don't prefer them.
Thanks for the thought process it’s really helpful and also reassuring since it’s quite similar to mine and yeah. Secureblue definitely sounds cool but I’m afraid it would not fit my dad’s need. In the end it’s gonna be up to whether I and my father can trust the maintainers or not
OpenSUSE is big on the security and usability front. None of the services you install activate by themselves. Firewall active by default. The first user doesn't get access to every group under the sun after installation.
And everything can be controlled through GUI tools. But it doesn't throw a fit when you've done something yourself through the CLI.
Opensuse MicroOS variants kalpa and aeon are probably what they are looking for. Stupid easy to set up and, from what I understand, quite secure.
Downside is that it needs workarounds for some things like Steam Flatpak and such, but that is the nature of atomic distros.
Also SELinux by default now instead of AppArmor. It can be a pain but it works. I.e. files dumped into a SAMBA share aren't autoshared unless they have the samba SELinux setting applied, etc
If you're picking a distro for someone else I would not recommend a small project distro or something incredibly niche 😅
Any of the big projects should be decent. Fedora, maybe fedora silverblue or whatever their imutable variant is called, opensuse, Mint, Ubuntu, debian. (Personally I don't like some of the choices Ubuntu makes but it may still be a very good option for less technical folks)
Others can tell you which of those have the best security defaults, but to be honest it doesn't sound like you actually have particularly exceptional security needs relative to what any distro will provide. I'd prioritize something stable and user friendly- which, again, your best bet is NOT picking a niche small project or something most people have never heard of
Secureblue is what I'd use if security was a major concern. Every time I've tried to use a non-Ubuntu distro I've immediately ran into a few technical issues so I stick with Ubuntu.
Generally I think I'm safe as long as I don't install untrusted software, and the distro didn't package untrusted software.
Top choice regarding security? Qubes OS. But that's not just a distro.
this is the first time knowing the Qubes OS. and upon researching on wikipedia, it's meant to be used with multiple OSes for different tasks...? wow
It essentially is multiple OSes, one host and plethora of separate virtual machines that only communicate what they were designed to communicate.
This way pretty much nothing can get access to userspace.
It is. the underlying OS is actually a type 1 hypervisor, XEN. better take a look at their official website then wikipedia though.
Maybe Secureblue?
That also comes with its own hardened browser based on GrapheneOS's.
And if you don't go with Secureblue and its browser, I'd recommend using a browser Chromium based, probably Brave. I know that's a controversial choice, but in terms of security and ad blocking, it's one of the better options. And disable JIT for V8.
First time hearing about Secureblue. And it sounds great. Though their motivation is quite welcome to see, I’m unsure if it will be actively maintained for a long time. It’s quite young project.
Security is the output of removing vulnerabilities and insecure configs
So, the real answer is: what's the minimal software you need and the most regularly updated.
So, my choice is Arch.
Yep, installation takes a little longer and needs more technical skills, but only install the bits you need (also learn a little more this way) and then updates are tiny and can be done as often as you're comfortable with.
Whatever you choose, it will break / die / be deleted or corrupted one day, so always backup your data separately than the OS (separate drive partitions can help) and you're done.
if you're looking for something with the most security, then Qubes. It's heavy, it's slow, but good luck to anyone looking to break into that system.
Bit of a learning curve and a bit to wrap your head around it but I would tell him to think of it like you have access to a bunch of individual computers that don't talk to each other but you control all of them. So he could have a Qube for casual web browsing, could have a Qube for work, and another Qube for financial stuff. all independent of each other. IF something were to happen (malware, trojan, whatever) just simply close that qube window and spin up another.
Between Debian and AlmaLinux, depending on the exact use case.
Education + Up to date and highly popular distro with tons of contributors + good track record regarding security
Kali Linux
/s