• EmperorHenry@discuss.tchncs.de
        link
        fedilink
        arrow-up
        2
        arrow-down
        3
        ·
        8 months ago

        Prevention and detection

        Most of the time, detection also means prevention, but with a whitelisting antivirus, prevention often means that the threat isn’t detected, it was just prevented from running.

        A whitelisting application has a list of what it knows it bad AND what it knows in advance to be good.

        Anything it can’t identify on the spot is treated as unknown and not allowed to run, not deleted, not quarantined, just blocked from running until the user can upload it to things like virustotal and other services like it to figure out if its safe.

        upload it to virustotal, if it wasn’t already known, do a re-scan a few hours later to see if it’s malicious, if it was already known, do a re-scan to see if anything has figured out if its malicious.

        which is why I think it’s borderline criminal that most antivirus programs don’t work that way.

          • EmperorHenry@discuss.tchncs.de
            link
            fedilink
            arrow-up
            1
            arrow-down
            4
            ·
            8 months ago

            who was it trusted by? There’s whitelisting applications that indiscriminately block everything that isn’t already installed too.

            • Possibly linuxOP
              link
              fedilink
              English
              arrow-up
              8
              ·
              edit-2
              8 months ago

              The developer of XZ. What your describing is package verification which already happens

        • Portable4775
          link
          fedilink
          arrow-up
          2
          ·
          8 months ago

          A whitelisting application has a list of what it knows it bad AND what it knows in advance to be good.

          How would it know this? Is this defined by a person/people? If so, that wouldn’t have mattered. liblzma was known in advance to be good, then the malicious update was added, and people still presumed that it was good.

          This wasn’t a case of some random package/program wreaking havoc. It was trusted malicious code.

          Also, you’re asking for an antivirus that uploads and uses a sandbox to analyze ALL packages. Good luck with that. (AVs would probably have a hard time detecting malicious build actions, anyways).

          • EmperorHenry@discuss.tchncs.de
            link
            fedilink
            arrow-up
            2
            arrow-down
            1
            ·
            8 months ago

            Also, you’re asking for an antivirus that uploads and uses a sandbox to analyze ALL packages. Good luck with that. (AVs would probably have a hard time detecting malicious build actions, anyways).

            three different antivirus programs already do that. Comodo for example has a built in sandbox to do that.

            • Portable4775
              link
              fedilink
              arrow-up
              2
              ·
              8 months ago

              It places unknown/new software in a sandbox. You want an AV that tests all pre-existing packages in a sandbox.