Quote from: George on July 10, 2024, 15:49:26Here's a concept for you - 3 letters - R, O & M.
"Read Only Memory"
If only the OS did not need constant & seemingly unending updates it could be burned to ROM and only elements held in RAM might be infected.
I do have in my possession an old 256MB thumb drive that has a unique feature - a physical WRITE DISABLE switch!!
Sure, a 'thin client' could be burned to a protectable storage medium and the rest could be 'cloud based' however why not go the extra steps and make the entire OS AND applications burned on protected storage and then leave only 'data' to be backed up and/or mirrored to the 'cloud'??
Since the OS and Applications are stored in unwriteable medium no 'infection' would survive a memory flush or boot cycle.
However then again NOBODY seems to want to create a secure operating system/environment to work in. :(
While the OS/apps being infected is certainly a concern, it's not generally the main one. It's the data that's important (notwithstanding keyloggers, etc), so even if the OS can't get infected/corrupted, malware can still be in RAM and act on the data, log your activity, etc, so all you've really accomplished is to make an OS that nobody wants to use, because it can't be modified,
including by the user, and only offers a slight security advantage in return.
There's a reason it's always a balance between usability and security. It's certainly possible to make a "completely" secure (ok, nothing is 100%, but the point is valid) computer, but it would be unusable for anything but very basic and specific tasks. For a computer/OS to be adaptable to each user and their needs, it has to be modifiable, which means "vulnerable" (again, the data is always going to be vulnerable).
*nux is, for the most part, heavily focused on security, arguably much more than Windows, which is more focused on presenting ads, snooping on the user, and otherwise being malware in and of itself. But even it needs to balance usability with that.
If you want a secure OS, just airgap it. But seriously, run anything and make sure it's updated and use an anti-exe software, and keep offline/offsite data backups, as well as a few other practices, and that's about as secure as you can get or need to be. You should also look into DARPA's project regarding this, as contrary to your last statement, they absolutely do want to create a secure OS, and they have done an incredibly impressive job so far. Not that it's likely to be available to the public, nor would it likely work well for that, since it would probably be too limited in use. Again, usability vs security.