That is what I was thinking, thank you.You might as well, if you're not using it for anything else. At least you'll have a modern OS running on it; you can keep updating Linux until the device physically can't run it anymore (unlike the the planned obsolescence of MacOS or Windows).
You already have Unix running on your Mac, so what is it that you want to do with the box that it cannot do? I think answering that will help you make your decision.I have an old 2009 Mac Pro think it is a 4 point something version desktop sitting here doing nothing and have
been wandering if it is worth installing a version of Linux on it ? Was thinking about Linux mint.
I don't trust Linux from security standpoint, at all. At least on the desktop.I have an old 2009 Mac Pro think it is a 4 point something version desktop sitting here doing nothing and have
been wandering if it is worth installing a version of Linux on it ? Was thinking about Linux mint.
I don't get the reasoning behind this. At least in Linux I can easily see what's going on inside of my system and its networking. You shouldn't have to worry about doing banking on it??I don't trust Linux from security standpoint, at all. At least on the desktop.
(A server running in a well protected and monitored environment with a bare minimum OS install is a different animal).
But as long as you don't do banking or access sensitive information on it, why not.
I have a i7 2012 mini as well and it's currently running Linux very well I must say. A lot lighter on the system compared to any modern version of macOS, no waiting around for most software to load. I imagine OP's MP wouldn't be slow either.Why not, but what are you planning to do with it anyway?
I too have an old i7 quad core 2012 mini laying unused.
I could install Linux on it, but I figured I just don’t need another (slower) computer to maintain for no reason whatsoever.
Linux is a mess of hundreds of millions lines of code submitted by tens of thousands of coders, many of them anonymous. Nobody sufficiently qualified really checks most of that code for vulnerabilities or especially deliberate inserted malicious code. Linus himself has a rather dismissive attitude towards security.I don't get the reasoning behind this. At least in Linux I can easily see what's going on inside of my system and its networking. You shouldn't have to worry about doing banking on it??
I have a i7 2012 mini as well and it's currently running Linux very well I must say. A lot lighter on the system compared to any modern version of macOS, no waiting around for most software to load. I imagine OP's MP wouldn't be slow either.
This makes sense to me but really what is stopping this same action from being employed at Apple or Microsoft and quadrupling the target platform? Are you saying that as a for profit Private enterprise, background checks would catch these would be thieves so are more secure by default or the profit motive drives dollars to prevention or the argument of open source vs closed? I mean, if private enterprise and closed source stopped this outright, we'd have no need for security software or security IT folks (who are amazing when you consider the scale of the threat out there). Surely in the same way, fake employment records can be created, so the threat is in reality quite similar I think and the stakes would be pretty high to make those records realistic and HR verifiable to get in on some tasty international espionage. I agree that the HR hiring process is one more layer of scrutiny but certainly Enterprise infrastructure and the private systems they run and are accessed (MS/Windows) on is a likelier and more valuable target than Linux? Im not saying you're not right but the argument you pose seems like it can be applied across multiple purely for profit OS with bigger rewards.Linux is a mess of hundreds of millions lines of code submitted by tens of thousands of coders, many of them anonymous. Nobody sufficiently qualified really checks most of that code for vulnerabilities or especially deliberate inserted malicious code. Linus himself has a rather dismissive attitude towards security.
Here’s what Graphene OS developer has to say about Linux security (read more towards the middle of page)
If I was in charge of a government espionage agency, I’d plant a group of highly qualified hackers behind an .edu address at some well regarded college, have them submit high quality code to the Linux foundation or various other open source components like drivers for a few years until they develop a good trust based relationship with maintainers, then inject a carefully hidden malicious code. And if I can think of this - definitely the right people in the US, Russia, China or North Korea aren’t any dumber than me. Surely this could happen on Windows and MacOS too, but the free-for-all nature of Linux code contribution makes this a whole lot easier. As the fairly recent UMN scandal very nicely illustrated, the entire ecosystem largely runs on trust. And the spy agencies have been caught abusing this.
The anatomy of suspected top-tier hidden NSA backdoor
Bvp47 of yore said to have used BPF to conceal comms in network trafficwww.theregister.com
Now, you may say “well spy agencies aren’t after my data, I’m not a big enough target for them”. But North Korea, Russia, Iran and other sanctioned regimes are employing large groups of hackers to steal money anywhere they can - including private accounts - because these funds can’t be traced back to them and thus make it easier to subvert the sanctions.
North Korean hackers use newly discovered Linux malware to raid ATMs
Once, FASTCash ran only on Unix. Then came Windows. Now it can target Linux, too.arstechnica.com
And of course it’s not only the spies, it’s could also be criminals or even some malicious person with patience and good enough coding skills. Linux makes it much easier to inject your own code than either Windows or Mac.
There’s no such thing as 100% security.This makes sense to me but really what is stopping this same action from being employed at Apple or Microsoft and quadrupling the target platform? Are you saying that as a for profit Private enterprise, background checks would catch these would be thieves so are more secure by default or the profit motive drives dollars to prevention or the argument of open source vs closed? I mean, if private enterprise and closed source stopped this outright, we'd have no need for security software or security IT folks (who are amazing when you consider the scale of the threat out there). Surely in the same way, fake employment records can be created, so the threat is in reality quite similar I think and the stakes would be pretty high to make those records realistic and HR verifiable to get in on some tasty international espionage. I agree that the HR hiring process is one more layer of scrutiny but certainly Enterprise infrastructure and the private systems they run and are accessed (MS/Windows) on is a likelier and more valuable target than Linux? Im not saying you're not right but the argument you pose seems like it can be applied across multiple purely for profit OS with bigger rewards.
Linux has represented less than 3% of desktop OS share, and just recently grew to over 4%. There hasn’t been as much scrutiny.One aspect to Linux that I like is the repositoried nature of the apps and updates. Where .exe files are hosted in a decentralized fashion across countless sites, the curated repository, seems like a great way for a community to monitor app quality and locate & remove malicious content and when you consider Ubuntus parent company Canonical, they reported 175m in revenue in 2021 and 253m in 2023 with a market push towards enterprise solutions, so they have a vested financial *for profit* interest/motive in preventing what you describe in a similar ways purely private enterprise does.
I have yet to run into any malicious code/apps from Canonical repos anyhow. It seems to me like this threat is everywhere lol, not just Linux distros, so with similar risks requires similar security.
This makes sense to me. Undoubtedly a walled garden approach that limits access to source code naturally limits creation of malicious code because not everyone has access to it. Conversely it also limits & delays finding that malicious code or a security gap and patching it. The strategy of Linux and the Debian repos that Ubuntu uses for example is that you have a community of millions of users (210m which is 4% of world usage as of 2024) looking at identifying concerns and then others in that 210m population quickly patching them, hence fast identification and patching providing consistent weekly updates (more eyeballs on it yanno?). Compare this to Windows sometimes taking years to find and fix security gaps simply because it is the same small group of people looking at it or Apple for that matter and early stumbles with iOS. So as non intuitive as this approach may be, it has worked well for Linux to date. Still to your point, no OS is 100% secure, so education and quick fixes are key security. Im not trying to convince anyone of anything but I found Linus's strategy to be interesting and definitely not an intuitive one (at least to me it wasn't) At the end of the day though we choose the brand or brands we trust and the expert teams that support those brands and we hope/trust they will serve our needs best.There’s no such thing as 100% security.
Windows and Mac absolutely can be - and are being - targeted. However they have better control over access to the code, they can afford to hire top security talent and pay them to check the code full time, and they are taking security extremely seriously (which for Microsoft took some embarrassing failures to do).
To me, Windows and Mac are like a house with a bolted front door, security alarm and private security on the grounds. This setup doesn’t prevent break-ins but it does make them harder and less frequent.
Linux is like a house where the door is rarely locked and when it is, the key is left under the door mat. A neighbor may check in on the house every now and then, but generally it’s expected that the guests are nice people and will behave.
Linux has represented less than 3% of desktop OS share, and just recently grew to over 4%. There hasn’t been as much scrutiny.
I’ve used Windows since the 90s and only got hit with a virus once - around ‘99 or so.
I've heard this so many times. The two questions I always ask are:This makes sense to me. Undoubtedly a walled garden approach that limits access to source code naturally limits creation of malicious code because not everyone has access to it. Conversely it also limits & delays finding that malicious code or a security gap and patching it.
The strategy of Linux and the Debian repos that Ubuntu uses for example is that you have a community of millions of users (210m which is 4% of world usage as of 2024) looking at identifying concerns and then others in that 210m population quickly patching them, hence fast identification and patching providing consistent weekly updates (more eyeballs on it yanno?).
Windows definitely has had and still has its share of issues. However, there were Linux vulnerabilities found after 15 (!) years in the open.Compare this to Windows sometimes taking years to find and fix security gaps simply because it is the same small group of people looking at it or Apple for that matter and early stumbles with iOS. So as non intuitive as this approach may be, it has worked well for Linux to date. Still to your point, no OS is 100% secure, so education and quick fixes are key security. Im not trying to convince anyone of anything but I found Linus's strategy to be interesting and definitely not an intuitive one (at least to me it wasn't) At the end of the day though we choose the brand or brands we trust and the expert teams that support those brands and we hope/trust they will serve our needs best.
Likewise.I too have been using Windows since 95 really (well 98se in earnest with the discovery of Quake and other FPSs of the time) and ran into malware a few times over the early years as I learned proper internet hygiene & habits. Of the OSs I daily, if I had to *trust* one, Id say I leverage my MBP running sequoia for sensitive transactional needs but in the context of information security, I am quickly aligning to Linux and the Ubuntu/Lubuntu derivatives I daily on some of my older macs as theire track record for not harvesting my data and usage patterns is pretty excellent.
Anyhow, thanks for the thoughtful responses. Always good to read where everyone is coming from.