I haven't assumed that you have said that. Do you think an average home user should run AV?
-
-
Replying to @cybergibbons @taviso and
I don't really have a position on this. But I am surprised at how polar it is given that there appears to be no empirical research into the effects.
1 reply 0 retweets 1 like -
Replying to @cybergibbons @csirac2 and
That is not what being discussed. What's being discussed is what a guide about not being hacked should recommend. If you don't want to be hacked, you should not use antivirus.
2 replies 1 retweet 1 like -
Replying to @taviso @cybergibbons and
If you don't run untrusted executables, then antivirus is an unnecessary liability. If you do run untrusted executables, then you're going to get hacked, because antivirus is inherently a blacklist and bypass is trivial. Both of these claims are well documented.
1 reply 1 retweet 5 likes -
Replying to @taviso @cybergibbons and
Now, if you do run untrusted executables and want to keep your machine operating in an insecure state for as long as possible between reinstalls. Maybe antivirus makes sense, but you are not secure.
2 replies 0 retweets 0 likes -
Replying to @taviso @cybergibbons and
Home users don't need antivirus, they need a copilot telling them not to do dumb things before they do them. (See: seatbelt reminders)
2 replies 0 retweets 1 like -
Replying to @halifaxbeard @taviso and
They need an OS that's not full of footguns. There should not be any non-expert UI for executing downloaded exe with your own perms.
1 reply 0 retweets 2 likes -
Replying to @RichFelker @halifaxbeard and
Either there should be no way to exec without going through cmdline chmod type stuff, or exec should always be in full virtualized environment.
2 replies 0 retweets 1 like -
Replying to @RichFelker @halifaxbeard and
Sure, and whitelisting can make this seamless for the vast majority of cases even on Windows. Pre-populated list of trusted authenticode vendors and software, only need roadblocks if not on the list.
1 reply 0 retweets 0 likes
I'm skeptical that whitelists are even needed. Vast majority of sw does not need to run with root/admin or even user permissions, just access to its own files & ones you explicitly open in it.
-
-
Replying to @RichFelker @halifaxbeard and
That would still require users to verify trusted executables, otherwise a malicious office suite (for example) could access all documents you create.
0 replies 0 retweets 0 likesThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.