• Possibly linuxOP
    link
    fedilink
    English
    arrow-up
    20
    arrow-down
    1
    ·
    8 months ago

    A “antivirus” tends to be a proprietary black box. Such “antivirus” programs could not of detected the XZ backdoor

        • EmperorHenry@discuss.tchncs.de
          link
          fedilink
          arrow-up
          2
          arrow-down
          3
          ·
          8 months ago

          Prevention and detection

          Most of the time, detection also means prevention, but with a whitelisting antivirus, prevention often means that the threat isn’t detected, it was just prevented from running.

          A whitelisting application has a list of what it knows it bad AND what it knows in advance to be good.

          Anything it can’t identify on the spot is treated as unknown and not allowed to run, not deleted, not quarantined, just blocked from running until the user can upload it to things like virustotal and other services like it to figure out if its safe.

          upload it to virustotal, if it wasn’t already known, do a re-scan a few hours later to see if it’s malicious, if it was already known, do a re-scan to see if anything has figured out if its malicious.

          which is why I think it’s borderline criminal that most antivirus programs don’t work that way.

            • EmperorHenry@discuss.tchncs.de
              link
              fedilink
              arrow-up
              1
              arrow-down
              4
              ·
              8 months ago

              who was it trusted by? There’s whitelisting applications that indiscriminately block everything that isn’t already installed too.

              • Possibly linuxOP
                link
                fedilink
                English
                arrow-up
                8
                ·
                edit-2
                8 months ago

                The developer of XZ. What your describing is package verification which already happens

          • Portable4775
            link
            fedilink
            arrow-up
            2
            ·
            8 months ago

            A whitelisting application has a list of what it knows it bad AND what it knows in advance to be good.

            How would it know this? Is this defined by a person/people? If so, that wouldn’t have mattered. liblzma was known in advance to be good, then the malicious update was added, and people still presumed that it was good.

            This wasn’t a case of some random package/program wreaking havoc. It was trusted malicious code.

            Also, you’re asking for an antivirus that uploads and uses a sandbox to analyze ALL packages. Good luck with that. (AVs would probably have a hard time detecting malicious build actions, anyways).

            • EmperorHenry@discuss.tchncs.de
              link
              fedilink
              arrow-up
              2
              arrow-down
              1
              ·
              8 months ago

              Also, you’re asking for an antivirus that uploads and uses a sandbox to analyze ALL packages. Good luck with that. (AVs would probably have a hard time detecting malicious build actions, anyways).

              three different antivirus programs already do that. Comodo for example has a built in sandbox to do that.

              • Portable4775
                link
                fedilink
                arrow-up
                2
                ·
                8 months ago

                It places unknown/new software in a sandbox. You want an AV that tests all pre-existing packages in a sandbox.