Comment: The articles you've linked to

(See in situ)


The articles you've linked to

The articles you've linked to are outdated. A lot has changed since 2009. Microsoft has made a lot of changes to make it harder to run arbitrary code once you control the flow of execution in a process. They do more than Linux and OS X.

Code that allows the attacker to run code in an interpreter or VM isn't as well protected by process hardening. That would include stuff like Javascript and Flash. This is true on any OS.

Of course, Microsoft can still give you malicious updates. But so can Canonical or Redhat. Assuming you're not outright backdoored by the OS itself, a Linux desktop (gnome or kde as well as stuff like Firefox and OpenOffice) is far easier to exploit than a Windows one. If you actually look at the code for X and these modern Linux desktop environments, as I'm sure no one who downvoted me has done, you will see a lot of half ass measures to secure the system... like dropping privileges while leaving the process with open read/write file handles to sensitive files. Or just look at dbus. Building Windows-like functionality/complexity brings all the security issues.

Sorry to say, just running Linux doesn't save us.