On 2/28/2013 1:17 PM, Dave Wade wrote:
I haven't heard of any. It's a modern linux
and most tasks run as non-root.
In addition on its a non-standard chip set so standard buffer over runs
don't work. Most folks run normal Linux with no AV why should the PI be
different?
On Feb 28, 2013 9:08 PM, "Fred Cisin" <cisin at xenosoft.com> wrote:
> On Thu, 28 Feb 2013, Jim Stephens wrote:
>> And unless you go out of your way to run windows or macos emulations on
>> the rpi, the virus is pretty much astronomically useless to discuss.
>> The chances of any targeted virus to an arm at this point is pretty
>> remote, though I'm sure there are linux exploits that may be applies.
> The rpi is so popular that there presumably ARE targeted exoploits in
> development.
I have another reply to the AV thread, but worth saying it here
because
that reply will be moderated and will be a while coming.
The lack of exploits does not mean there will be none. There are still
vulnerabilities which could work on a linux machine as well as any of
the PC or Macos ones as well as any.
Unless you have a custom build with a tool which specifically defends
against binary exploits there will always be ways to get into a machine
as long as people keep coding and leaving buffer overflow and other
attack vectors.
the question is whether it is worth the time of someone who is creating
exploits to create something and hope it mates up with a host that is
vulnerable. I will run AV on linux when there are more chances of
someone hitting my specific machine, but so far there are not enough to
bother.
The fact that if 1 windows machine has a problem millions do makes them
the target. And the fact that microsoft seems to be pretty good at not
fixing the problems as a root cause. That is another discussion.