• EmperorHenry@discuss.tchncs.de
      link
      fedilink
      arrow-up
      2
      arrow-down
      3
      ·
      8 months ago

      Prevention and detection

      Most of the time, detection also means prevention, but with a whitelisting antivirus, prevention often means that the threat isn’t detected, it was just prevented from running.

      A whitelisting application has a list of what it knows it bad AND what it knows in advance to be good.

      Anything it can’t identify on the spot is treated as unknown and not allowed to run, not deleted, not quarantined, just blocked from running until the user can upload it to things like virustotal and other services like it to figure out if its safe.

      upload it to virustotal, if it wasn’t already known, do a re-scan a few hours later to see if it’s malicious, if it was already known, do a re-scan to see if anything has figured out if its malicious.

      which is why I think it’s borderline criminal that most antivirus programs don’t work that way.

        • EmperorHenry@discuss.tchncs.de
          link
          fedilink
          arrow-up
          1
          arrow-down
          4
          ·
          8 months ago

          who was it trusted by? There’s whitelisting applications that indiscriminately block everything that isn’t already installed too.

          • Possibly linuxOP
            link
            fedilink
            English
            arrow-up
            8
            ·
            edit-2
            8 months ago

            The developer of XZ. What your describing is package verification which already happens

      • Portable4775
        link
        fedilink
        arrow-up
        2
        ·
        8 months ago

        A whitelisting application has a list of what it knows it bad AND what it knows in advance to be good.

        How would it know this? Is this defined by a person/people? If so, that wouldn’t have mattered. liblzma was known in advance to be good, then the malicious update was added, and people still presumed that it was good.

        This wasn’t a case of some random package/program wreaking havoc. It was trusted malicious code.

        Also, you’re asking for an antivirus that uploads and uses a sandbox to analyze ALL packages. Good luck with that. (AVs would probably have a hard time detecting malicious build actions, anyways).

        • EmperorHenry@discuss.tchncs.de
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          8 months ago

          Also, you’re asking for an antivirus that uploads and uses a sandbox to analyze ALL packages. Good luck with that. (AVs would probably have a hard time detecting malicious build actions, anyways).

          three different antivirus programs already do that. Comodo for example has a built in sandbox to do that.

          • Portable4775
            link
            fedilink
            arrow-up
            2
            ·
            8 months ago

            It places unknown/new software in a sandbox. You want an AV that tests all pre-existing packages in a sandbox.