this post was submitted on 13 Sep 2025
94 points (94.3% liked)

Linux

58164 readers
528 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 6 years ago
MODERATORS
 

Hi there,

Win10 is soon not supported. Tbh Linux have been on my radar since I started to break from the US big tech.

But how is security handled in Linux? Linux is pretty open-source, or am I not understanding it correctly. So how can I as a new user make sure to have the most secure machine as possible?

you are viewing a single comment's thread
view the rest of the comments
[–] utopiah@lemmy.ml 0 points 19 hours ago

Others have said it before but basically : what is YOUR (not me, not your best friend, nor your colleague, etc) threat model?

To clarify that means WHO is actually trying to threaten your security?

Typical for most people it would be :

  • scammers trying to get pieces of your identity or your local cryptocurrency wallet or resources they can use to repeat that on to others.

For some people, like activists or political journalists it would be :

  • national actors, e.g. governments, with their surveillance apparatus, who might end up on a list with a set of conditions that would trigger some automated scan to get e.g. Signal logs

For very very few people, say Edward Snowden, who within the previous group actually did trigger some action :

  • actual team of hackers trying to hack into their devices

So as you can imagine if you are part of group 1, 2 or 3 then way you will protect yourself is totally different. What you will also have to protect is also different, e.g. if you have no cryptowallet but are traveling you might have to protect your phone physical phone and its data.

So... if you are serious about this, take a cybersecurity class. There are plenty available but how a computer works, software and hardware alike, is precisely what makes them simultaneously powerful and also dangerous. There are plenty of ways to break security (e.g. return oriented programing), plenty of ways that practically impossible (e.g. encryption) due to the very nature of computers (i.e. computational complexity) which IMHO makes this one of the most fascinating topic. Ask yourself come the credit card in your pocket (costing few bucks to make) can't be cracked by the largest super computers (costing billions) on Earth?

TL;DR: no offense but you don't seem to be ready for the answer without getting the basics first.