I haven't assumed that you have said that. Do you think an average home user should run AV?
-
-
Replying to @cybergibbons @taviso and
I don't really have a position on this. But I am surprised at how polar it is given that there appears to be no empirical research into the effects.
1 reply 0 retweets 1 like -
Replying to @cybergibbons @csirac2 and
That is not what being discussed. What's being discussed is what a guide about not being hacked should recommend. If you don't want to be hacked, you should not use antivirus.
2 replies 1 retweet 1 like -
Replying to @taviso @cybergibbons and
If you don't run untrusted executables, then antivirus is an unnecessary liability. If you do run untrusted executables, then you're going to get hacked, because antivirus is inherently a blacklist and bypass is trivial. Both of these claims are well documented.
1 reply 1 retweet 5 likes -
Replying to @taviso @cybergibbons and
Now, if you do run untrusted executables and want to keep your machine operating in an insecure state for as long as possible between reinstalls. Maybe antivirus makes sense, but you are not secure.
2 replies 0 retweets 0 likes -
Replying to @taviso @cybergibbons and
Home users don't need antivirus, they need a copilot telling them not to do dumb things before they do them. (See: seatbelt reminders)
2 replies 0 retweets 1 like -
Replying to @halifaxbeard @taviso and
They need an OS that's not full of footguns. There should not be any non-expert UI for executing downloaded exe with your own perms.
1 reply 0 retweets 2 likes -
Replying to @RichFelker @halifaxbeard and
Either there should be no way to exec without going through cmdline chmod type stuff, or exec should always be in full virtualized environment.
2 replies 0 retweets 1 like -
Replying to @RichFelker @halifaxbeard and
Windows (also Linux desktop env crap) is at the absolute opposite end of this spectrum: UI for exec is indistinguishable from document view/open to a non-expert user.
1 reply 0 retweets 1 like -
Replying to @RichFelker @halifaxbeard and
Powershell, macros etc. also are exceptions to "untrusted executable" and are a big risk.
1 reply 0 retweets 0 likes
MS has fetishized blurring of data/code since at least Windows 3.0 days (OLE/DDE/Word macros/etc.) and this is the non-surprising result.
-
-
Replying to @RichFelker @halifaxbeard and
It is going to take a lot to shift a business to any other OS or model now though. Suspect virtualization and isolation are only way forward long term.
0 replies 0 retweets 1 likeThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.