this post was submitted on 28 Feb 2025
1066 points (100.0% liked)

linuxmemes

23841 readers
467 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack users for any reason. This includes using blanket terms, like "every user of thing".
  • Don't get baited into back-and-forth insults. We are not animals.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn. Even if you watch it on a Linux machine.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, <loves/tolerates/hates> systemd, and wants to interject for a moment. You can stop now.
  • 5. πŸ‡¬πŸ‡§ Language/язык/Sprache
  • This is primarily an English-speaking community. πŸ‡¬πŸ‡§πŸ‡¦πŸ‡ΊπŸ‡ΊπŸ‡Έ
  • Comments written in other languages are allowed.
  • The substance of a post should be comprehensible for people who only speak English.
  • Titles and post bodies written in other languages will be allowed, but only as long as the above rule is observed.
  • 6. (NEW!) Regarding public figuresWe all have our opinions, and certain public figures can be divisive. Keep in mind that this is a community for memes and light-hearted fun, not for airing grievances or leveling accusations.
  • Keep discussions polite and free of disparagement.
  • We are never in possession of all of the facts. Defamatory comments will not be tolerated.
  • Discussions that get too heated will be locked and offending comments removed.
  •  

    Please report posts and comments that break these rules!


    Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't remove France.

    founded 2 years ago
    MODERATORS
     
    you are viewing a single comment's thread
    view the rest of the comments
    [–] Neptr@lemmy.blahaj.zone 6 points 3 weeks ago (4 children)

    Except websites can tell what base OS you run using browser fingerprinting. It os impossible to lie aboit your OS because of the differences in platforms.

    [–] WeLoveCastingSpellz@lemmy.dbzer0.com 30 points 3 weeks ago* (last edited 3 weeks ago) (1 children)

    You can lie about your fingerprint very much in fact it is the default on librewolf

    [–] Neptr@lemmy.blahaj.zone 7 points 3 weeks ago (1 children)

    You can lie, but that doesnt mean that a website cant still tell your base OS if they use JS platform fingerprinting. Arkenfox, the base config which Librewolf is based off of says the exact same thing. Go to CreepJS and see it get your platform regardless.

    [–] WeLoveCastingSpellz@lemmy.dbzer0.com 5 points 3 weeks ago (1 children)

    You sweet summer child I use noscript

    [–] Neptr@lemmy.blahaj.zone 5 points 3 weeks ago (2 children)

    Firstly there is no need to be condescending.

    Secondly, do you block all JS? NoScript is not a silver bullet and doesnt stop fingerprinting, it is itself identified by the CreepJS test site. It may in this case reduce the chance of OS fingerprinting, but pure CSS methods exist as well.

    Additionally, NoScript is laregly redundant with uBlock Origin since you can do everything that it offers, such as blocking 3rd party scripts/iframes/all, block fonts, block JS, and it is very granular.

    Bottom line, you are fingerpintable.

    [–] commander@lemmings.world 3 points 3 weeks ago

    It's my understanding that websites can identify your OS and there's nothing we can realistically do about it, but it has something to do with how fonts are rendered. I'm not an expert, but this is what I recall from trying to obscure my OS from websites.

    Here's a post on the matter: https://security.stackexchange.com/questions/173233/how-do-i-hide-the-os-i-am-using-from-internet-sites

    Javascript isn't that big of a deal.

    No script offers more than just is blocking you can block certain elements fonts what all that. It is NOT redundant. And creepjs doesn't even run without js which I don't allow on non trusted websites. Also yeah sorry I wasn't trying to be condescending.

    [–] bamboo@lemmy.blahaj.zone 6 points 3 weeks ago (1 children)

    Generally browser fingerprinting is used to identify individual browser sessions across IP addresses. This mostly takes into account reported features and capabilities of the browser and OS to the website. Fingerprinting isn't looking for specific info your browser reports, it's taking it all and hashing it to get a unique id specific to the browser. Because it's hashed, it can't be reversed to identify the OS from the hash.

    Sure a malicious website could Ignore the user agent and probe for some hardware capabilities that are specific to Linux, but that would be a lot of effort to probe various things which are set differently across all different browsers. I can't speak for bad actors, but I wouldn't spend the effort to check if the user agent is spoofed, if 95% of the time it's accurate to get the OS type.

    [–] Neptr@lemmy.blahaj.zone 1 points 3 weeks ago* (last edited 3 weeks ago) (1 children)

    It is trivial to identify OS platform because browser work differently on each platform. Wjat Librewolf does with useragent on Linux actually is makes users stand out more because it isn't what privacy.resistFingerprinting (RFP) reports on normally.

    Hackers (like the comment scenario i was responding to) are substantially more likely to employ platform fingerprint than trust a fale useragent. And loads general websites employ fingerprinting, meaning deviation from default RFP behaviour makes you stand out (more than you already do by using RFP since it is a small pool already).

    [–] bamboo@lemmy.blahaj.zone 2 points 3 weeks ago (1 children)

    Agreed, I'm not saying it's impossible to detect the OS, but it's even more trivial for an adversary to regex the User Agent and serve the malware for that OS. The average user doesn't even know what a User Agent is, and that's who the drive by malware websites are counting on to infect because they're easy targets.

    Just like a real fingerprint, that will only identify the fingerprint to a person, not tell you that the fingerprint is from someone who is European. Fingerprints are used to track you across different websites, and build a profile of you for advertising.

    [–] Neptr@lemmy.blahaj.zone 1 points 3 weeks ago

    Yeah okay.

    My logic was that it is much more likely that someone will spoof there useragent already if they are on Linux. If threat actor is targeting not just Windows but also Linux, they probably would understand the very real likelyhood of platform spoofing.

    [–] uid0gid0@lemmy.world 5 points 3 weeks ago (1 children)

    Twitch.TV will tell you that you need to use a supported browser if you connect with Linux in your user agent no matter what browser you use. Changing Linux to Windows in your agent with no other changes resolves this issue.

    [–] zea_64@lemmy.blahaj.zone 2 points 3 weeks ago

    Worked on my machine last I checked, and I don't have a useragent spoofer

    [–] LordKitsuna@lemmy.world 4 points 3 weeks ago (1 children)

    Sure, if they put in the effort. Most don't even when Distributing malware

    [–] Neptr@lemmy.blahaj.zone 1 points 3 weeks ago (2 children)

    That isnt a great defense against malware "imho". Security through assuming the threat actor is lazy is just not security. It doesnt take like any effort on their part to just use some off-the-shelf OS fingerprinting code. It isnt worth it either because it contributes to your overall fingerprint, since normal RFP users have a standardized useragent for Windows and Linux separately.

    [–] LordKitsuna@lemmy.world 2 points 3 weeks ago (1 children)

    Security is layers, i utilize apparmor and firejail personally. And in fact 90% of widespread malware specifically relies on lazy people. Often targets default passwords etc

    [–] Neptr@lemmy.blahaj.zone 1 points 3 weeks ago

    Firejail is a large SETUID binary which can (and has) aid in privilege escalation. It is recommended to avoid it for this reason.

    See: https://madaidans-insecurities.github.io/linux.html#firejail

    If you are relying on community sandboxing profiles and not making your own, i can understand why Firejail is interesting as a choice because of its large community.

    If you are making your own, consider checking out Bubblewrap (available on most Linux systems), Bubblejail), Crablock, and Sydbox, which all use unprivileged sandboxes.

    [–] null@slrpnk.net 1 points 3 weeks ago (1 children)

    That isnt a great defense against malware

    Nobody said it was a great defense.

    [–] Neptr@lemmy.blahaj.zone 1 points 3 weeks ago (1 children)

    It really isnt any defense. All a website can do is initiate a download, websites are sandboxed by default. You still have to run the executable, which doesnt really apply to Linux because the file will have no executable permission.

    [–] null@slrpnk.net 2 points 3 weeks ago

    Buddy, it's not that deep.