I understand that to have a reasonably private life, we need to use a private operating system. Linux offers a private experience. It doesn’t share your data to other parties without your consent, nor does it encourage or trick you to do so. Linux is designed for privacy.
Linux is also robust and designed to protect you from malware infiltration. We have world-class teams and all the eyes around the world finding flaws and patching them. And many desktop distros implement security in depth by sandboxing with Flatpak and some degree of Mandatory Access Control with AppArmor/SELinux.
Linux is, therefore, both secure and private.
And it’s safe to say that malware is a risk to user privacy. If a malicious actor can breach into your system and exfiltrate your information, it can use your operating system to act against your privacy. It follows that malware can convert your private operating system into a non-private one. Your level of privacy is, therefore, linked to your security from malware.
But Linux is, understandably, not absolutely secure. A system can be compromised through a vulnerability or user error. For example, in 2021, a Minecraft RCE exploit ran rampant. In 2023, CS:GO had a remote code execution vulnerability. In 2024, a malicious BeamNG mod breached a top Disney executive’s computer. Even VSCode has malicious extensions popping up every now and then. This is a real risk of everyday computing. Even the most well secured military perimeter is vulnerable to an officer unwittingly inviting an enemy inside. This “officer” can be the either user or an application. I accept that total impenetrability is impossible, and this isn’t because Linux is flawed or because people are stupid; it’s just a natural consequence of daily computer use.
It follows that, to accept that an impenetrable system is unrealistic, then infiltration is always realistic. And if infiltration is realistic, then we should have some manner of post-infiltration response. This is where, in my opinion, desktop Linux falls short, because desktop Linux environments have no automated post-infiltration response. What measures do we have to identify if a compromise has occurred? How is the average user supposed to know they have been pwned so they can wipe their system? We don’t have any accessible means of identification, as far as I know.
Entertain the previous example: imagine if a user had played CS:GO in 2023 and had their system compromised by a malicious server. From their perspective, nothing in their computing would have changed despite the compromise. They would continue using their computer for years, allowing the breacher to gather and act against their privacy until they ceased use of that system.
Windows addresses this in their security model. Microsoft Defender periodically scans files and also each file before it’s executed. It also actively scans processes running in the background for suspicious patterns. And if it finds something suspicious, it tells the user and it lets the user act on that information. How come Linux distros don’t offer these solutions as part of standard security practice? If privacy depends on security from malware, why are we not addressing this?