Scheduled Maintenance: We are aware of an issue with Google, AOL, and Yahoo services as email providers which are blocking new registrations. We are trying to fix the issue and we have several internal and external support tickets in process to resolve the issue. Please see: viewtopic.php?t=158230
Security in Debian.
-
- Posts: 18
- Joined: 2018-12-18 02:54
Security in Debian.
I'm a novice user of Linux. I'm presently on Fedora and I'm noticing suspicious behaviour since I started using. I haven't downloaded any suspicious software. All these symptoms seem to point to a malware infection.
I'm thinking of switching to Debian, is Debian more secure than most Linux distros like, Mint, SUSE, Fedora, Ubuntu, etc?
What precautions can I take while using Debian to protect it against malware infections?
Thanks
I'm thinking of switching to Debian, is Debian more secure than most Linux distros like, Mint, SUSE, Fedora, Ubuntu, etc?
What precautions can I take while using Debian to protect it against malware infections?
Thanks
- Hallvor
- Global Moderator
- Posts: 2043
- Joined: 2009-04-16 18:35
- Location: Kristiansand, Norway
- Has thanked: 151 times
- Been thanked: 212 times
Re: Security in Debian.
Are you sure you are infected? What symptoms?
[HowTo] Install and configure Debian bookworm
Debian 12 | KDE Plasma | ThinkPad T440s | 4 × Intel® Core™ i7-4600U CPU @ 2.10GHz | 12 GiB RAM | Mesa Intel® HD Graphics 4400 | 1 TB SSD
Debian 12 | KDE Plasma | ThinkPad T440s | 4 × Intel® Core™ i7-4600U CPU @ 2.10GHz | 12 GiB RAM | Mesa Intel® HD Graphics 4400 | 1 TB SSD
- None1975
- df -h | participant
- Posts: 1410
- Joined: 2015-11-29 18:23
- Location: Russia, Kaliningrad
- Has thanked: 46 times
- Been thanked: 70 times
Re: Security in Debian.
OS: Debian 12.4 Bookworm / DE: Enlightenment
Debian Wiki | DontBreakDebian, My config files on github
Debian Wiki | DontBreakDebian, My config files on github
-
- Posts: 18
- Joined: 2018-12-18 02:54
Re: Security in Debian.
Like allusions to what I typed in my off-line documents. Similar knowledge of activities on my computer, which were not related to internet or social media.Hallvor wrote:Are you sure you are infected? What symptoms?
- dilberts_left_nut
- Administrator
- Posts: 5347
- Joined: 2009-10-05 07:54
- Location: enzed
- Has thanked: 13 times
- Been thanked: 66 times
Re: Security in Debian.
“Security” is a process that has more to do with the user than the OS, so you’ll likely find Debian pretty similar to Fedora in that regard.
AdrianTM wrote:There's no hacker in my grandma...
-
- Posts: 18
- Joined: 2018-12-18 02:54
Re: Security in Debian.
I understand what you are saying. But as I explained in my OP, I haven't installed any suspicious software, all the software I have installed, either came with the installation or through official or RPM Fusion repositories.
Either someone has hacked my Fedora, or by default it is transmitting data to someone else.
Does Debian have any built-in backdoors, etc?
Either someone has hacked my Fedora, or by default it is transmitting data to someone else.
Does Debian have any built-in backdoors, etc?
- Hallvor
- Global Moderator
- Posts: 2043
- Joined: 2009-04-16 18:35
- Location: Kristiansand, Norway
- Has thanked: 151 times
- Been thanked: 212 times
Re: Security in Debian.
If you are sure your computer is being tapped, take it offline. Then check your system for intrusion with Tripwire or similar.
[HowTo] Install and configure Debian bookworm
Debian 12 | KDE Plasma | ThinkPad T440s | 4 × Intel® Core™ i7-4600U CPU @ 2.10GHz | 12 GiB RAM | Mesa Intel® HD Graphics 4400 | 1 TB SSD
Debian 12 | KDE Plasma | ThinkPad T440s | 4 × Intel® Core™ i7-4600U CPU @ 2.10GHz | 12 GiB RAM | Mesa Intel® HD Graphics 4400 | 1 TB SSD
-
- Posts: 18
- Joined: 2018-12-18 02:54
Re: Security in Debian.
As I have already noticed suspicious activity with my Fedora, it might have been compromised, would running Tripwire now be helpful? Because all the checksums would be for infected files.Hallvor wrote:If you are sure your computer is being tapped, take it offline. Then check your system for intrusion with Tripwire or similar.
Re: Security in Debian.
take a look at rkhunter maybe it will be more to your liking.
In memory of Ian Ashley Murdock (1973 - 2015) founder of the Debian project.
-
- Posts: 18
- Joined: 2018-12-18 02:54
Re: Security in Debian.
Everything came clean, you can check the summary presented below. That warning you see was for "Checking if SSH root access is allowed" which I set to no.llivv wrote:take a look at rkhunter maybe it will be more to your liking.
Code: Select all
System checks summary
=====================
File properties checks...
Files checked: 135
Suspect files: 0
Rootkit checks...
Rootkits checked : 503
Possible rootkits: 0
Applications checks...
All checks skipped
The system checks took: 2 minutes and 37 seconds
All results have been written to the log file: /var/log/rkhunter/rkhunter.log
One or more warnings have been found while checking the system.
Please check the log file (/var/log/rkhunter/rkhunter.log)
-
- Posts: 190
- Joined: 2018-05-05 22:30
Re: Security in Debian.
Any OS is going to have such. The only way to achieve a 100% secure system is to take it completely offline, remove all wireless devices and unplug the wired ones. But hacking into a Linux system is difficult, usually doesn't happen because it's too much work for each individual system to be hacked. Hack a Windows system and the vulnerability you found might apply to millions of machines, for Linux it might be tens. Another thought: it might not be your Fedora box that has been compromised, might be your router or modem or even your ISP (although that last is unlikely). Do you have other computers, phones, tablets or ??? hooked to the same network? Any of these documents you're talking about live anywhere else but that one computer? And if you want some particular item, document, photo, whatever to be confidential, do not upload it anywhere ever. Not to your cloud storage, not even to your NAS, don't e-mail it, nothing. Millions if not billions of Facebook users (are you one?) are just now finding this out the hard way. On a related note, many criminals that thought they got away with it have been caught because their relatives had their DNA analysed.noviceDebian wrote:Does Debian have any built-in backdoors, etc?
-
- Posts: 162
- Joined: 2016-01-10 16:58
Re: Security in Debian.
Won't do any good if they are using the little chip inside, even when the PC is turned off ,it still can be accessed.
Re: Security in Debian.
Postby Hallvor » 2018-12-19 03:59
If you are sure your computer is being tapped, take it offline. Then check your system for intrusion with Tripwire or similar.
It does not matter what OS one is using, even Debian can be accessed, and if they have "Intel inside", it is even easier, this is kind of old but the point is there are many ways your home PC can be accessed , even if you never download anything, etc.
https://itsfoss.com/fact-intel-minix-case/
=================
https://www.zdnet.com/article/minix-int ... ng-system/
=======================
https://www.blackhat.com/eu-17/briefing ... ngine-8668
" have a good night, and sleep tight, don't let the bed bugs bite "
=== edit ===
There you go, that is proof they have everything there is in your computer, and now they know everything, I don't see how installing Debian will change that. I am really sorry to hear this.Postby noviceDebian » 2018-12-18 21:34
Hallvor wrote:
Are you sure you are infected? What symptoms?
Like allusions to what I typed in my off-line documents. Similar knowledge of activities on my computer, which were not related to internet or social media.
-
- Posts: 18
- Joined: 2018-12-18 02:54
Re: Security in Debian.
But hacking router or modem will not allow them access to my Fedora, unless it is also compromised. I'm sure ISP is also either hacked or they are in on it. I don't have other computers but have phone, but I have never transferred those files to the smart phone. These documents are only on the computers. 'kevinthefixer wrote:Any OS is going to have such. The only way to achieve a 100% secure system is to take it completely offline, remove all wireless devices and unplug the wired ones. But hacking into a Linux system is difficult, usually doesn't happen because it's too much work for each individual system to be hacked. Hack a Windows system and the vulnerability you found might apply to millions of machines, for Linux it might be tens. Another thought: it might not be your Fedora box that has been compromised, might be your router or modem or even your ISP (although that last is unlikely). Do you have other computers, phones, tablets or ??? hooked to the same network? Any of these documents you're talking about live anywhere else but that one computer? And if you want some particular item, document, photo, whatever to be confidential, do not upload it anywhere ever. Not to your cloud storage, not even to your NAS, don't e-mail it, nothing. Millions if not billions of Facebook users (are you one?) are just now finding this out the hard way. On a related note, many criminals that thought they got away with it have been caught because their relatives had their DNA analysed.noviceDebian wrote:Does Debian have any built-in backdoors, etc?
When you mean DNA, do you mean biological thing or something else. What kind of cyber crimes could have been helped by DNA and how would relatives have the DNA?
-
- Posts: 18
- Joined: 2018-12-18 02:54
Re: Security in Debian.
I knew about the Intel ME, doesn't AMD also have something similar?jibberjabber wrote:Won't do any good if they are using the little chip inside, even when the PC is turned off ,it still can be accessed.
Re: Security in Debian.
Postby Hallvor » 2018-12-19 03:59
If you are sure your computer is being tapped, take it offline. Then check your system for intrusion with Tripwire or similar.
It does not matter what OS one is using, even Debian can be accessed, and if they have "Intel inside", it is even easier, this is kind of old but the point is there are many ways your home PC can be accessed , even if you never download anything, etc.
https://itsfoss.com/fact-intel-minix-case/
=================
https://www.zdnet.com/article/minix-int ... ng-system/
=======================
https://www.blackhat.com/eu-17/briefing ... ngine-8668
" have a good night, and sleep tight, don't let the bed bugs bite "
=== edit ===There you go, that is proof they have everything there is in your computer, and now they know everything, I don't see how installing Debian will change that. I am really sorry to hear this.Postby noviceDebian » 2018-12-18 21:34
Like allusions to what I typed in my off-line documents. Similar knowledge of activities on my computer, which were not related to internet or social media.Hallvor wrote:
Are you sure you are infected? What symptoms?
But that kind of hacking wouldn't be possible with everyone, even the most skilled hacker wouldn't be able to access Intel ME, only a malicious actor from state would know those things. I knew about Intel ME but knew that would be accessible to only malicious 3 letter agencies and evil eyes, but some of these suspicious things I noticed were coming from very common accounts. Redhat which maintains Fedora has recently been bought by IBM, they may introduce their custom back doors into it, so to avoid this I was considering other Linux distros.
Re: Security in Debian.
I didn't understand this. Someone alluded to something you typed into a document? They had knowledge of what activities? How did they make you aware of it?noviceDebian wrote:Like allusions to what I typed in my off-line documents. Similar knowledge of activities on my computer, which were not related to internet or social media.Hallvor wrote:Are you sure you are infected? What symptoms?
Sounds like a movie, I guess anything is possible, but the question would be, "why?" out of the zillions of people online, why would someone spend the time to find out what you do and then tell you about it?
resigned by AI ChatGPT
Re: Security in Debian.
Hey, I'm not sure I get all of novices' meaning regarding novices' present circumstances... After all out of the zillions of us (oh wait - did I overstate the number?) there are quite a few different sets of circles....
(If I'm pushing my ideals here - just skip over to the next issue, please)
It seems that novice has an issue that is not easily described as the majority of the zillions of us just figure out ways to ignore them - since we feel powerless to free ourselves from the higher powers...
I see it as a food chain issue that we all share all the way to the top.
(If I'm pushing my ideals here - just skip over to the next issue, please)
It seems that novice has an issue that is not easily described as the majority of the zillions of us just figure out ways to ignore them - since we feel powerless to free ourselves from the higher powers...
I see it as a food chain issue that we all share all the way to the top.
In memory of Ian Ashley Murdock (1973 - 2015) founder of the Debian project.
-
- Posts: 18
- Joined: 2018-12-18 02:54
Re: Security in Debian.
They let me know on social media, not on Facebook(I don't use it), but YouTube and Twitter.bw123 wrote:I didn't understand this. Someone alluded to something you typed into a document? They had knowledge of what activities? How did they make you aware of it?noviceDebian wrote:Like allusions to what I typed in my off-line documents. Similar knowledge of activities on my computer, which were not related to internet or social media.Hallvor wrote:Are you sure you are infected? What symptoms?
Sounds like a movie, I guess anything is possible, but the question would be, "why?" out of the zillions of people online, why would someone spend the time to find out what you do and then tell you about it?
Answering your question about "why":
1. Power Play
2. Make a caricature of me, so what I say can be discredited
I think the reason why they let me know that they know those things would be to exert their power over me, like they are all knowing and all powerful, and they are one step ahead of me, and they best me easily and I can't escape.
I wish I could tell you about what I write but doing so might let you connect dots to my other identity.
Last edited by noviceDebian on 2018-12-21 09:43, edited 1 time in total.
-
- Posts: 18
- Joined: 2018-12-18 02:54
Re: Security in Debian.
Thanks for your support.llivv wrote:Hey, I'm not sure I get all of novices' meaning regarding novices' present circumstances... After all out of the zillions of us (oh wait - did I overstate the number?) there are quite a few different sets of circles....
(If I'm pushing my ideals here - just skip over to the next issue, please)
It seems that novice has an issue that is not easily described as the majority of the zillions of us just figure out ways to ignore them - since we feel powerless to free ourselves from the higher powers...
I see it as a food chain issue that we all share all the way to the top.
-
- Posts: 18
- Joined: 2018-12-18 02:54
Re: Security in Debian.
To give another example, some months back, I was having problems with earphones I got, the sound out of left side was not as loud as it was in the right side, I informed this to the customer care of the earphone company, since then I found that my Fedora's audio balance was being skewed towards the left side, as if to compensate for some inherent low output from the left earphone, at that time I had GNOME and it had that option, now I'm on KDE Plasma and it doesn't have such left-right balance. When I had GNOME, I never messed with the audio balance.bw123 wrote:I didn't understand this. Someone alluded to something you typed into a document? They had knowledge of what activities? How did they make you aware of it?noviceDebian wrote:Like allusions to what I typed in my off-line documents. Similar knowledge of activities on my computer, which were not related to internet or social media.Hallvor wrote:Are you sure you are infected? What symptoms?
Sounds like a movie, I guess anything is possible, but the question would be, "why?" out of the zillions of people online, why would someone spend the time to find out what you do and then tell you about it?
Re: Security in Debian.
This is an interesting point of view. You seem to be saying that everybody is subject to having the balance on their audio set slightly left, but we ignore the problem because we are powerless to solve it? I'd answer that we need to see some evidence before assuming it is an intrusion.llivv wrote:Hey, I'm not sure I get all of novices' meaning regarding novices' present circumstances... After all out of the zillions of us (oh wait - did I overstate the number?) there are quite a few different sets of circles....
(If I'm pushing my ideals here - just skip over to the next issue, please)
It seems that novice has an issue that is not easily described as the majority of the zillions of us just figure out ways to ignore them - since we feel powerless to free ourselves from the higher powers...
I see it as a food chain issue that we all share all the way to the top.
I know that hacking goes on. Some people do it for fun. I used to watch people try to do it and laugh all day long at their stoopid attempts. I'd like to say every system is hack proof, but I sort of agree, nothing is. But saying we all ignore it because we are powerless to stop iit s a little extreme. Security isn't 100% but even an amateur like me can get reasonably comfortable about it. But I'm not a celebrity, and don't attract attention.
Interesting topic. Thanks for posting.
p.s. just for the record, anybody anywhere is welcome to take a stab at my system, for testing/fun only. I kiind of enjoy the challenge. Tell me one filename that contains the word "simultaneously" on my computer?
resigned by AI ChatGPT