On Wednesday, September 5, 2018, Kevin Chadwick <m8il1i...@gmail.com> wrote: > I meant that an OpenBSD user using Windows should not get a virus or > could handle them if downloading illegal software. I am yet to see a > truly clever system entry in the press. They always rely on user > idiocy or poor setup. Whether Viri with these properties are the only > ones caught is another question. > > Additionally I don't see the "think disk". If the partition is > intact then surely it is not difficult to fix and with some boot > loaders like GAG would likely be unaffected. It used to be the case > that the windows bootloader was needed for hibernate support but I > haven't seen that for a while. It is certainly true that the > bootloader/bios itself could be targeted. If something breaks > then at least you know.
You are overlooking some important issues: One has to do with the nature of the press — it’s primary audience has little to no technical background, and reporters have little training on machine design and implementation. They are not very capable of describing truly clever system entry. Also, common events tend to not be "news". [How often do you hear about any of the suffering from the leading causes of mortality? Instead you mostly hear about the rare events.] Another has to do with counter measures—any effective malware mechanism gets attention and *eventually* gets squashed. This is a statistical issue, but there are some other implications -- hold that thought. Another issue has to do with the nature of bug reporting systems: as the user population increases, they become overwhelmed. Approaches which worked well when the user population was mostly well educated college students don't work so well when the user population is mostly not. Yet another issue has to do with the nature of malware itself: it’s a mix of taking advantage of design defects (which are never in short supply) and social structures (which, ok, do partially adapt to the pressures but also tend to be more than a little imperfect). Anyways: 1) you don’t have adequate knowledge of what other people are going through—you can’t. 2) eventually someone with adequate, relevant knowledge is going to trip over a malware deployment. Put different: disk wipes are being limited by social issues more than by technical issues. Disk wipes with broad propagation probably gets lots of people really upset. And [this year, at least] there's no effective border control on malware vectors, so state actors aren't going to be using such things unless they feel they're backed into a corner where unleashing such problems seems to offer them a way forwards. (Because their own people will get hit, also - both by the malware itself and possibly by the reactions from other state actors.) But that only holds for large scale malware deployments. There's another possibility which involves being specifically targeted. It's difficult to think what the motivations would be for this, but that's not an actual obstacle. If this sort of thing happens, it would rely on social structures for concealment (in other words, its point might be to make you look stupid - so to defend against this kind of thing you would have to be comfortable with dealing with having people think you look stupid. For example.) But, hey, there's no such thing as bullies, right? On the positive side, this sort of thing is statistically unlikely, for most people. Anyways... generalities that are usually correct can't always be correct. And, when debugging, you sort of have to consider a lot of unlikely possibilities until you have the problem isolated and solved. So you are going to see discussion here about possibilities which are mostly irrelevant to you, but which still have some use in helping people reason about the problems they encounter. So: back to the disk-wipe malware (and most other malware). Good backups limit the impact that. And, you need a diversity of backup mechanisms to defend against the backups getting hit by malware. So your computer got wiped out - if you've got several of them each running different OSes, perhaps with some other partitioning, you just switch to a different one. (And software developers - especially low-level software developers - tend to crash their own systems a lot already, so in that sense it might not seem like such a big deal. If you are a developer, malware is really just a consequence of bad design.) Anyways, that's enough words from me to last you way way too long... Sorry about that. -- Raul