From: FromTheRafters on
"ASCII" <me2(a)privacy.net> wrote in message
news:4badc952.882265(a)EDCBIC...
> FromTheRafters wrote:
>>It is possible
>>for viruses to invade without either exploited software
>>vulnerabilities
>>or lapse in strict adherence to policy.
>
> I don't believe you!

I know that, we've been down this road before. Believe or not - your
choice. I may be wrong, but if I am, at least I'm in good company
considering the authors of the references I've posted are leading
scientists in the field (and are the ones responsible for coining the
term "virus" in the first place).


From: FromTheRafters on

"ASCII" <me2(a)privacy.net> wrote in message
news:4baec33f.784765(a)EDCBIC...
> FromTheRafters wrote:
>>"ASCII" <me2(a)privacy.net> wrote in message
>>news:4badc952.882265(a)EDCBIC...
>>> FromTheRafters wrote:
>>>>It is possible
>>>>for viruses to invade without either exploited software
>>>>vulnerabilities
>>>>or lapse in strict adherence to policy.
>>>
>>> I don't believe you!
>>
>>I know that, we've been down this road before. Believe or not - your
>>choice. I may be wrong, but if I am, at least I'm in good company
>>considering the authors of the references I've posted are leading
>>scientists in the field (and are the ones responsible for coining the
>>term "virus" in the first place).
>>
>
> OK I'll cut some slack,
> when you said "strict adherence to policy" I had assumed that to be a
> safe-hex...

I try to avoid the term "safe-hex" because I am not thoroughly versed in
its particulars. If it says anything about not opening attachments from
strangers - I'd have to speak up in support of removing that item
because it is a dangerous halfway measure IMO. I usually (though I may
occasionally slip-up) use the term "best practices" in its place (I may
not be thoroughly versed in that either) . By policy I meant such things
as *only* getting new programs from places where there is accountability
(contactable, reputable, etc...). This all but cuts off completely the
"trojan horse" vector (the main exception being the virus which, from a
trusted source, presents itself to the user in a way indistinguishable
from a trojan).

> policy but in reality there could be gaping vulnerabilities that even
> if
> strictly adhered to might result in running an infectious application.

Even if you completely discount the exploitation of software and of the
user, the virus can still have its *own* vector by running within the
trusted software channel. Even if you elect to hide away all program
files (including source code files, scripts, etc...), you can't control
what the previous environment for that stored program allowed to happen.
You trust the program because you trust the place that you got it from -
transitive trust - the previous keeper (the author?) may be trusting his
webmaster who in turn trusts his personal version of safe-hex.

> Of course it wouldn't be exactly safe-hex but you did leave that slot
> open.

Even so, I suspect that you *still* disagree with me. :o)

Anyway, the way your system makes virus propagation difficult is
irrelevant. It is the path your trusted programs travel to get to you
that makes them possibly not trustworthy. If a virus runs on Linux but
is not fully able to replicate on an individual's Linux machine, it may
just decide to "do stuff" instead of replicate - just because it can't
"virus" doesn't mean it can't bomb. The Linux user would still have a
reason to want the ability to detect a virus in a program from a trusted
source.

....and I said "program" instead of "executable" for a reason. :oD


From: RayLopez99 on
On Mar 29, 1:20 am, "FromTheRafters" <erra...(a)nomail.afraid.org>
wrote:
>
> Anyway, the way your system makes virus propagation difficult is
> irrelevant. It is the path your trusted programs travel to get to you
> that makes them possibly not trustworthy. If a virus runs on Linux but
> is not fully able to replicate on an individual's Linux machine, it may
> just decide to "do stuff" instead of replicate - just because it can't
> "virus" doesn't mean it can't bomb. The Linux user would still have a
> reason to want the ability to detect a virus in a program from a trusted
> source.

Here's what I understand about Linux so far:

With the exception of a handful of programs--and Mozilla's version of
Linux being one of them, perhaps OpenOffice and Thunderbird being
others (close enough for most people to Microsoft Office as to not
really matter if not 100% compatible with Office):

ALL OF LINUX PROGRAMS ARE DE FACTO VIRUSES BECAUSE THEY *bomb*! ;-)

RL
From: FromTheRafters on
"RayLopez99" <raylopez88(a)gmail.com> wrote in message
news:f5226342-100e-4571-aa66-518e67abf1e8(a)30g2000yqi.googlegroups.com...
On Mar 29, 1:20 am, "FromTheRafters" <erra...(a)nomail.afraid.org>
wrote:
>
> Anyway, the way your system makes virus propagation difficult is
> irrelevant. It is the path your trusted programs travel to get to you
> that makes them possibly not trustworthy. If a virus runs on Linux but
> is not fully able to replicate on an individual's Linux machine, it
> may
> just decide to "do stuff" instead of replicate - just because it can't
> "virus" doesn't mean it can't bomb. The Linux user would still have a
> reason to want the ability to detect a virus in a program from a
> trusted
> source.

Here's what I understand about Linux so far:

With the exception of a handful of programs--and Mozilla's version of
Linux being one of them, perhaps OpenOffice and Thunderbird being
others (close enough for most people to Microsoft Office as to not
really matter if not 100% compatible with Office):

ALL OF LINUX PROGRAMS ARE DE FACTO VIRUSES BECAUSE THEY *bomb*! ;-)

***
They're viruses only if they self-replicate and infect in order to do
so. Logic bombs are not viruses.
***