• 0 Posts
  • 47 Comments
Joined 2 years ago
cake
Cake day: August 6th, 2023

help-circle
  • Majestic@lemmy.mltoLinux@lemmy.mlAntiviruses?
    link
    fedilink
    arrow-up
    14
    ·
    edit-2
    1 month ago

    I would say there are not any worth recommending and that best practices are avoiding running random scripts you don’t understand, keeping software up to date with package managers, and using virtualization tools. Also look into Portmaster perhaps which is an interactive firewall.

    Meta rant on this subject

    What frustrates me about the answers these questions get is no one ever offers tools comparable to Windows tools, perhaps I think increasingly because they simply don’t exist outside of very expensive subscription enterprise offerings that require plunking down no less than a thousand dollars a year. (Certainly none of the major AV vendors offers consumer Linux versions of their software though most offer enterprise endpoint Linux that comes with the caveat of minimum spends of several hundred dollars if not several thousand a year)

    ClamAV is primarily a definition AV, the very weakest and most useless kind. Sure it’s kind of useful to make sure your file server isn’t passing around year old malware but it’s basically useless for real time prevention of emerging and unknown threats. For that you needs HIPS, behavior control, conditional/mandatory access control, heuristics, etc. ClamAV has one of the worst detection rates in the industry. It’s just laughably bad (often under 60%) so it’s really not a front line contender at all.

    Compare clam to consumer offerings with complex behavioral control like ESET, Kaspersky, etc that offered “suite” software that featured the aforementioned HIPS, behavioral control, complex heuristics to detect and in real time block malware-like behavior (for example accessing and then seeking to upload your keepass database files or starting to surreptitiously encrypt all your user files using RSA4096) and it just isn’t in the same ballpark as anything competently done in the last 20 years.

    I haven’t used or relied on a traditional AV for definition detections for years. They’re worthless, it’s impossible to keep up. The AV’s I’ve deployed are for their heuristics, behavior control, HIPS, etc which actually stops new and emerging and unknown threats or at least puts real obstacles in their way. So what Linux needs, what users need is software like that, forget the traditional virus definitions, something with behavior control, HIPS, and some basic heuristics for “gee this sure looks like malware behavior, better ask the user whether they want and intend this”.

    “Just be smart about what you run” isn’t a realistic solution when people say Linux is for everyone including their tech illiterate relatives. Yes, Linux is a lot safer if you just install things from package managers but that isn’t bulletproof either as we’ve seen a number of spectacular impact upstream malware insertions into build repos for huge software projects in recent years.

    Just maintain back-ups isn’t helpful with smart cryptolocker software which may hide itself for weeks or months and encrypt your files as you back them up. Nor does it protect against account compromise from all your passwords being stolen or a keylogger. Nor does it defend you against persecution after being hit by mercenary/government police-ware and spyware from overreaching governments and makes the bar for them getting evidence you’re an illegal gay person or whatever that much lower technically in terms of capabilities.

    Back-ups are disaster recovery. Everyone should have them but part of a layered defense is preventing the disaster and inconvenience and invasion of privacy and so on before it happens. Having your identity stolen or accounts taken over isn’t as simple as reverting to a back-up, it can result in hours, days of phone calls, emails, stress, hassle, etc that can drag on for weeks or months.

    Portmaster is a start for this type of system control and protection as it’s a very effective interactive firewall but as far as I know there aren’t any consumer available comprehensive behavior control + HIPS type Linux desktop security solutions. There are several vendors of default deny mandatory access control with interactive mode for Windows but none offer solutions for Linux that aren’t part of enterprise sized contracts beyond affordability and reason. If anyone knows otherwise I would love to know of these solutions as I want to implement them on my Linux machines as I am not comfortable with just my network IPS and firewall solutions by themselves without comprehensive end-point security.


  • I think the home media collector usecase is actually a complete outlier in terms of what these formats are actually being developed for.

    Well yeah given who makes it but it’s what I care about. I couldn’t care less about obscure and academic efforts (or the profits of some evil tech companies) except as vague curiosities. HEVC wasn’t designed with people like me in mind either yet it means I can have oh 30% more stuff for the same space usage and the enccoders are mature enough that the difference in encode time between it and AVC is negligible on a decently powered server.

    Transparency (or great visual fidelity period) also isn’t likely the top concern here because development is driven by companies that want to save money on bandwidth and perhaps on CDN storage.

    Which I think is a shame. Lower bitrates for transparency -should- be the goal. The goal should be to get streaming content to consumers at a very high quality, ideally close to or equivalent to UHD BluRay for 4k. Instead we get companies that bit-starve and hop onto these new encoders because they can use fewer bits as long as they use plenty of tricks to maintain a certain baseline of perceptual visual image quality that passes the sniff test for your average viewer so instead of getting quality bumps we just get them using less bits and passing the savings onto themselves with little meaningful upgrade in visual fidelity for the viewer. Which is why it’s hard to care at all really about a lot of this stuff if it doesn’t benefit the user in any way really.


  • And which will be so resource intensive to encode with compared to existing standards that it’ll probably take 14 years before home media collectors (or yar har types) are able and willing to use it over HEVC and AV1. :\

    As an example AV1 encodes to this day are extremely rare in the p2p scene. Most groups still work with h264 or h265 even those focusing specifically on reducing sizes while maintaining quality. By contrast HEVC had significant uptake within 3-4 years of its release in the p2p scene (we’re on year 7 for AV1).

    These greedy, race to the bottom device-makers are still fighting AV1. With people keeping devices longer and not upgrading as much as well as tons of people relying on under-powered smart-TVs for watching (forcing streaming services to maintain older codecs like h264/h265 to keep those customers) means it’s going to take a depressingly long time to be anything but a web streaming phenomenon I fear.




  • Probably the best choice if OP is dreading 11. Put it off, hope that in 3 years Linux support has matured even more for their use cases.

    MS support has used this software themselves in an edge case where they couldn’t get Windows to active properly.

    You have two options here:

    1. Enable the extended support (no pay needed with this software but if OP absolutely refuses to run it they can pay Microsoft money directly though it takes work to find where to do that at) and run on that for 3 years until 2028.

    2. Upgrade to LTSC IOT using the method they outline at the link there. Again they have two options, one is free, the other is following that guide but paying for a gray-market key (G2a for instance) for LTSC IOT which would avoid running this software on their PC but would mean paying someone some money for a corporate volume key they’re not technically allowed to sell. Which means support until 2032.



  • Presumably given they’ve all been released in the past few years and are still getting updates the manufacturers would release an update disabling the functionality to comply with law. Same with end user devices removing the functionality via software update.

    You’d have a small percentage of holdouts who have auto updates off and also refuse to apply it manually and who also have non-updated computers or smartphone. They’d leave it up to whoever buys the spectrum to locate illegal use like this based on detected interference in their usage, report it to the FCC and they send you a nasty letter followed by debilitating fines and a legal order to seize your equipment if that fails.

    In practice people who go out of their way to avoid the updates that disable it will probably see no consequences but decreasing benefits as well and will eventually update or replace devices.


  • The only thing I would note is -IF- your volumes are not partition or disk based BUT -files- based there is the possibility that corruption of the host file system of the disk the files containing the volumes are on could result in pieces of those files being marked unreadable by the disk and it’s POSSIBLE one way to solve this would be a file system check utility.

    HOWEVER such activities carry a -large- risk of data loss so I would advise a bit for bit copy of the disk and doing the repair on that so if it goes wrong you’re not worse off. -IF- you cannot make a copy then I would advise at least trying to mount using backup headers before doing that and copying off anything you can salvage as file system checks can really mess up data recovery and should only be used in certain circumstances.

    You’re much better off trying the recovery software I linked in fact than doing a file system check as it will tend to have better results.

    You can also use the option to mount as read only in VC to prevent writes to a suspected failing disk.

    Let me know if you need further advice.


  • Veracrypt has back-up headers located elsewhere in the volume that are unlikely to have been overwritten.

    First thing’s first I would strongly recommend copying the drive as it currently exists bit for bit to another drive of equal or larger size. Don’t work on the original if you can help it.

    Now with this copy, you should try to check the option to use the backup header when mounting and try again. If the partition is gone and veracrypt doesn’t see it you’ll need to try using something that recovers partitions and doesn’t mind encrypted partitions or partitions or file system types it doesn’t understand and use that to ON THE COPY recover and recreate the partition (this will write data and can cause the possibility of further loss or worsen your ability to recover which is why it is important to perform it on a copy). Testdesk may work for this but there are other options that probably are better.

    See this list: https://old.reddit.com/r/datarecovery/wiki/software and choose something from there if this data is truly important. Again only work on a copy on another drive. Some of these software examples actually work against the original drive and make a copy elsewhere and should be safe to use on the original drive so long as they have you select a target drive to push the recovered data to but read the documentation. Testdisk absolutely must be used on a copy.

    You will incur data loss and likely should run one of the file recovery software mentioned on the drive once successfully mounted to attempt to recover as much as possible.


  • Apple TV: No ads. Been around for over a decade.

    Google TV: homescreen ads for a decade+ and even pushed onto Nvidia shield owners who originally may have bought the devices because Nvidia made a premium customized version without ads until they got tired of that and put ads in.

    Apple has problems but ads aren’t a big one.

    Neither big company is your friend. They both exploit workers and are both bad.

    It’s just Google tends to be better at cutting edge bad like enabling genocide with their products and stuffing ads down the throats of people while Apple tries to maintain a crunchier appearance and vibe and is fine reaping 30% App Store fees on all transactions and making side loading very hard.

    Apple rips you off on low storage and high costs to upgrade compared to Google/Samsung it’s definitely true.


  • Majestic@lemmy.mltoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    71
    arrow-down
    4
    ·
    6 months ago

    Never cared for pocket and always disabled it as spyware. Fake spot will be missed though.

    This is an ill omen however. They’re cutting back dramatically in anticipation of their Google funding being lost forever and perhaps as some suggest in anticipation of enshitifying. These were both sold originally as additional revenue streams for Mozilla.


  • Use secure erase function which is built into the SATA and other specs, it applies a voltage spike to clear the cells of all held charges thus wiping them. This happens near instantly, it’ll be a process that will signal it’s finished within a minute and takes much less time than that.

    If you want to be extra paranoid I suppose you could follow that up by encrypting the entire (empty) drive and then doing it again though I’m not sure this has any benefit however it’s the closest to forcing the cells to be used again and then cleared again. However this does not guarantee that exhausted and worn out areas are flash are not potentially spared both. It’s unlikely for large amounts of data to be recovered from this unless your drive is failing or has been completely worn out but it’s also why if you ever store sensitive data on an SSD it’s preferable to do so in an encrypted form (such as encrypting the whole disk or partition).


  • Yes, absolutely. And they can drag Canonical into it as well if they wish though it’s harder. Being UK based doesn’t protect them from the long arm of US law including arresting any US personnel, freezing and seizing their funds, putting out arrest warrants for and harassing those in the UK with the fear of arrest and rendition to the US if they go to a third country (for a conference, vacation, etc, most would buckle rather than live under that). Additionally the US could sanction them for non-cooperation by making it illegal for US companies to sell them products and services, for US citizens to work for or aid them, etc.

    They can go after community led projects too, just send the feds over to the houses of some senior US developers and threaten and intimidate them, intimate their imminent arrest and prison sentence unless they stop contact and work with parties from whatever countries the US wishes to choose to name. Raid their houses, seize their electronics, detain them for hours in poor conditions. Lots of ways to apply pressure that doesn’t even have to stand up to extensive legal scrutiny (they can keep devices and things and the people would have to sue to get them back).

    The code itself is likely to exist in multiple places so if someone wanted to fork from say next week’s builds for an EU build they could and there would be little the US could do to stop that but they could stop cooperation and force these developers to apply technical measures to attempt to prevent downloads from IP addresses known to belong to sanctioned countries of their choosing.

    It’s not like the US can slam the door and take its Linux home and China and the EU and Russia are left with nothing, they’d still have old builds and code and could develop off of those though with broken international cooperation it would be a fragmented process prone to various teething issues.



  • There is AFAIK no way to do this.

    Apple’s never open-sourced the APIs and interfaces and it only works on Macs and Windows. For this you will need to have either a Windows install (recommend separate drive so it doesn’t break Linux bootloader) or a persistent or not Windows VM with USB passthrough. I’m not even sure how well the VM situation works but it probably should. You don’t even have to have a license for Windows, you can just run it in the VM for this purpose alone but it does mean oh at least 40GB set aside on your drive for the VM image plus more if you want to do things like back-up the phone.


  • Jellyfin needs to partner with someone people can pay a very low and reasonable and/or one-time fee to enable remote streaming without the fuss of setting up either dangerous port-forwarding or the complexity of reverse proxies (paying for a domain-name, the set-up itself including certificates, keeping it updated for security purposes).

    And no a VPN is not a solution, the difficulty for non-technical users in setting up a VPN (if it’s even possible, on smart-tvs it’s almost always not, and I don’t think devices like AppleTV and other streaming boxes often support them) is too high and it’s an unwanted annoyance even for technical users.

    I’m not talking about streaming video’s through someone else’s servers or using their bandwidth. I’m talking about the connection phase of clients and servers where Plex acts like an enhanced dynamic DNS service with authentication. They have an agent on the local media server which sends to the remote web service of the third party the IP address, the port configured for use, the account or server name, etc. When a client tries to connect they go to this remote web service with the servername/username info, the web service authenticates them then gives them the current IP address and any other information necessary. It then sends some data to the local Jellyfin server about the connecting client to enable that connection and then the local media Jellyfin server and the client talk directly and stream directly.

    Importantly the cost of running this authentication and IP address tracking scheme would be minimal per Jellyfin server. You could charge $5/year for up to 20 unique remote clients and come out ahead with a slight profit which could be put back into Jellyfin development and things like their own hosting costs for code, etc. Even better if they offer lifetime for this at $60-$80 they’d get a decent chunk of cash up-front to use for development (with reasonable use restrictions per account so someone hosting stuff in Hetzner or whatever and serving 300 people with 400 devices will need to pay more because they’re clearly doing this for profit and can afford to throw some more money at Jellyfin).

    Until Jellyfin offers something that JUST WORKS like that it’s not going to be a replacement for Plex, whatever other improvements they offer to users it’s still a burden for the server runner to set up remote streaming in a way that isn’t either incredibly dangerous (port forwarding) OR either involves paying money to third parties AND/OR the trouble of running your own reverse proxy and/or involves walking users through complicated set-up process for each device that you have to repeat if you change anything major like your domain name when using a VPN.




  • It just does more and more easily. It styles things better, makes them more professional looking with a click. It can do certain things like nested tables in Word that Writer cannot do. Excel is much more powerful than calc, it has more functions, more refined functions, it’s easier to work with, has more and prettier chart options. And oh you can create tables in Excel that are sortable. There are many other cases.

    Now for the last two the die-hards will whine and whinge about how you should just use a software for creating charts and a database but sometimes you just want to make something quick, sometimes that’s overkill for what you need. Grandpa doesn’t need to learn how to deal with databases just to make a sortable list of books he’s read, he can just use excel and the Libreoffice people telling him to pound sand because they won’t add that feature to calc because it doesn’t belong there means he and many other people don’t use calc, they use MS office. Likewise the Libreoffice defense force saying of making graphs and charts to just use dedicated software, well many corporate types, business people, white collar workers don’t understand those things and may not be able to get them installed, what they understand, what they already have is MS office and it works and has lots of pretty, professional, very slick options which don’t make them look poorly in office meeting presentations.

    Just on the sortable tables front, I can’t tell you how many times I’ve run into hobby stuff that’s based on an excel file with tables that rely on being sortable. From stat sheet creators to mini-databases (<2000 rows) on some game created by fans.

    It’s useful for those who need the very bare basics of being able to open and read basic MS word documents, csv files, excel files, and to write an occasional letter. But the moment you need to start doing beyond basic formatting or dealing with files that have that, you run into issues.

    You have this gulf of usability, it’s useful for people at the very bottom of the basic needs pole, barely computer literate types who think facebook is the internet and it’s useful for highly technically competent people who can and do use other dedicated software, often without GUIs to solve problems, it’s a frustration for the middle 60% of the population who are more than basically computer literate but not scientifically trained, not CS or IT.