Help me understand Cloverleaf
Steve Pampling (1551) 8175 posts |
Short Answer: No I’d put more in terms of “what virus? never seen one of those” It does make me wonder how many of the minute range of RO viral instances actually work on modern systems. I recall Win 95 and WinNT being immune to the Conficker virus due to lack of support for the feature Conficker required. |
Stefan Fröhling (7826) 167 posts |
@Peter Howkins: What is the Icon virus? @Götz: Marketing. To make people interested in RISC OS. Even if it is not forever it might be valuable argument for many to switch (mentally driven) to RISC OS. “Easy to use” Is questionable if you are not used to RISC OS. Without a short introduction video most people might have trouble to use RISC OS if left alone. And this is a serious problem. Much more serious than a theoretical existant virus for RISC OS. “Fun” How you can make someone believe in that claim. You can say convenient but fun? |
Braillynn (8510) 51 posts |
In my opinion, false marketing does nothing for the reputation of the marketers and the product. Also, are you grasping at straws for things to find this late into the game if your goal is to do a Kickstarter campaign? This causes me great concern, especially when the message is already not clear exactly what you’re doing.
Yeah, fun is personal and subjective. I could see though bringing up the age of the OS and where it’s come from and where it is now could be very interesting to a certain group of people. It’s what drew me in, Micro Men is one of my favorite films honestly. |
Rick Murray (539) 13857 posts |
Never. The fact that 32 bit RISC OS is “virus free” is because most of the viruses written only work on 26 bit machines and there has been nobody malicious enough to target the platform since. Just don’t even go there. Apple is widely mocked for their early virus free stance, as are the fanboys that still believe it.
In theory, Icon should, being written in BASIC. The version that I have in an virus archive somewhere was so badly written it’s a surprise that it worked at all. But, then, being written in BASIC it’s likely fifty bored schoolchildren have attempted to “fix” it along the way… Many of the rest (like Extend) were modules or other nefarious ways of messing with executables, sometimes patching in their run code into the APCS header to do their thing just before the program decompression. All of this would have been 26 bit code which would either be rejected by the OS, or crash when it does something 26 bitty.
Perhaps because they were outdated by that time? It was aimed primarily at the contemporary NT kernel builds (2000, XP, Vista…).
A simple little virus that popped up random somewhat amusing messages, that rapidly became extremely annoying when you realise that the infection code was, actually, extremely effective and if you see Icon once, it’s likely already everywhere else.
Both terms are subjective. What you might find convenient might be a pain for somebody else. Likewise I find it fun to sit down with Zap and write code (I am not normal…), other people find it fun to shoot, murder, maim and kill in World of Warcraft and the like.
In my opinion, marketing is best used sparingly. In the past few decades, marketing had gotten so out of hand and told so many lies that you’re surely a sucker if you believe any of it. |
Steve Pampling (1551) 8175 posts |
I recall Win 95 and WinNT being immune to the Conficker virus due to lack of support for the feature Conficker required. Yup.
Something that runs rather than walks and offers near bare metal access? |
Braillynn (8510) 51 posts |
Exactly, Raspberry Pi OS is nowhere near as fluid on my Raspberry Pi 3b+ and that’s even taking into account RiscOS is not taking advantage of the multiple cores, 64 bit support or even faster storage mediums. RiscOS on the Pi 3b+ runs much better than any $200 to $300 Windows laptop you can buy and it’s much easier to attain if you already have a monitor, keyboard and mouse. Also we can offer not being Linux. I know that sounds weird, but you know there are people who use other desktop operating systems just to be different. We can offer a great inexpensive ARM experience that you just can’t get on competing platforms. Just like when RiscOS first came out. |
Steffen Huber (91) 1954 posts |
An alternative theory says that the malicious guys are actively avoiding RISC OS users because they don’t want to handle enquiries like “unfortunatley I cannot pay what you demanded because your website does not support NetSurf”. |
Steve Fryatt (216) 2106 posts |
But, as soon as an attempt is made to promote the system on this basis beyond the usual target audience, it will only take one malicious, bored individual to prove the claim wrong. And as others have said, whilst manipulating the contents of !RunImage files requires some detailed RISC OS knowledge, an Icon-like virus only needs a little BASIC plus the ability to manipulate the text in an Obey file to become really annoying (and extremely destructive, if the author felt so inclined) very quickly. There’s no protection on RISC OS against virus activity. In an era when software is made available on the internet as standard, and no-one is running any scanning tools because we don’t have any, anything which did emerge wouldn’t need to be clever to be very bad news. Do we still have anything like VProtect that we could wheel out and update if it became necessary? |
Stuart Swales (1481) 351 posts |
Even if we had nothing available at present on the client, we could at least grok the packages in the Packman and PlingStore repositories with a tool on Linux? |
Braillynn (8510) 51 posts |
That’s funny! I mean they know you could just do it on your smartphone, other computer, etc. Still though, quite funny. |
Rick Murray (539) 13857 posts |
[…]
The problem isn’t so much in what tool is used (whether scanned under Linux or RISC OS), but rather the time and effort required to determine what a virus/malware is, how to spot it, and how to neutralise it. As can be amply demonstrated by any app store, it’s very much a game of whack-a-mole, xxx x xxx xx xxxxx xxxxx xxxxx xxxxx xxxxx xxxxx xxxxx xxxxx xxxxx xxxxx xxxxx xxxxx xxxxx xxxxx. [edit: as if this makes any difference…] |
Paolo Fabio Zaino (28) 1882 posts |
@ Stefan Fröhling
Depends on what you mean: If you mean RISC OS it’s secure or anything like that, then think again: 1) RISC OS has no concept of privileged user/entity hence everything can interact with the filesystem, applications etc. 2) RISC OS has an extremely (security wise) dangerous way of dealing with Applications on the Filesystem: the so called !boot file in any “pling” application can be used to spread viruses through the filesystem itself and the network in a blink of an eye just by opening a Filer Window (yup it’s that bad) 3) RISC OS allows the use of unsigned Modules and Drivers from both File System and EEPROM on the old Podules, basically even a kid can write a fileless virus and have it running in a blink of an eye 4) RISC OS runs no services and has no open network ports, so that makes its network attack surface smaller, but it still has old code in the Network Stack, which also runs in Kernel mode and privileged user. Just an example for who is not practical: You can completely freeze a RISC OS system just by copying (yes only copying) certain byte sequences via Access protocol (basically if a file, even a data file, contains certain bytes sequences RISC OS 5.27/24/22 etc… will freeze and you need to restart the system) 5) RISC OS compressed files can be opened via tools like !SparkFS which are developed as File System extensions and so they will process the !boot file in an application directory as soon as the archive is opened, so basically by putting malware in an email attachment will infect everyone. 6) RISC OS has not mechanism to use ARM TrustZone extensions nor to provide Secured OS intercommunication services, apart from, obviously allow a user to code that himself and trigger the required exceptions to switch the CPU mode accordingly and use the monitor firmware to eventually talk with a secure OS executed in the secure mode to store secrets etc… Should I continue or is this enough? So, the only reason why RISC OS has no modern malware (it only has old viruses, surprisingly still going on I have recently found some on an A3020 HD I have received for refurbishing) is that the RISC OS community is so small that RISC OS “hacking value” is pretty much 0 (zero). But as soon as the community will grow the problem will arise and fast to the point of potentially breaking the future of the OS itself if not addressed quickly. Please do not take my response as aggressive, it’s not my intention whatsoever. If it sounds aggressive then my apologies. The reality is this: To use RISC OS as a main OS there are “few” (let’s call them) major things that needs to be addressed:
The above just to make it acceptable to be used as a main OS (so not competitive), unless you want to use it as a main ISOLATED OS on HW where it doesn’t even use all the offered features. The way I see this is: On the short term, the future of RISC OS is to actually point at a market where it would requires less changes possible in order to start receiving attentions by 3rd parties quickly, and eventually drive to investments that Cloverleaf and others are seeking in order to do all the required changes for a usable Desktop OS. These changes will have to be made in such a way to fulfil first the targeted market and then, as a secondary goal, the Desktop market. Let’s also not forget that all the computer companies who have relied on the home users market have long disappeared: read Commodore, Atari, many 80s British home computers manufacturers (too many to list them all). RISC OS could potentially get quickly in the IoT market where there are business (many) investing on it and then still being developed for the Desktop. This is an option, I am not saying this is the only way forward. Another idea could be to build a RISC OS for handled devices to run retro-gaiming emulators. This is a growing market at the moment and doesn’t requires the security of a desktop, nor multi-user or complex UIs. About the Open Source Licensing discussion: I always find fascinating such discussions and read of all the different licenses and how people perceive them etc. and then read all these source code (I am a professional software developer) and always find Copyright by x/y/z. |
Paolo Fabio Zaino (28) 1882 posts |
P.S. |
Stefan Fröhling (7826) 167 posts |
Well so no slogan “Virus free OS” and I will make clear that we have enough viruses already and don’t need more people to program more. ;-) Yes looks there is much work ahead concerning security with RISC OS. And sounds for me that it might involve more complex changes than turn RISCOS into 64 bit… |
Rick Murray (539) 13857 posts |
Not aggressive, just honest. RISC OS is “virus free” because there are no viruses for it, not because there cannot be viruses for it. If somebody tries, the system will yield. To put it into context, as a programmer, let me introduce you to my good friend OS_EnterOS. This SWI will elevate the caller to system level privilege so the code calling it (except BASIC which can only run in user mode) has complete unfettered access to the system. If the next call is an MSR to disable interrupts, then the calling code has complete unfettered uninterrupted access to the system and could quite easily perform switcheroos that the OS and it’s tasks wouldn’t even notice (an example of this in action could be the Wimp2/Tornado module that preemptively multitasked; think for a moment how that would actually work).
I’ve not seen the source to VProtect but I’d be willing to place a wager on it jacking into FindV and FileV to vet files as they were opened.
Driver signatures aren’t so important – a signature doesn’t guarantee safety: https://duo.com/decipher/attackers-are-signing-malware-with-valid-certificates What would be better is to have only important core modules (and I mean basically HAL, core kernel, and maybe FileCore and FPEmulator) running in SVC mode. Everything else (even the Wimp and all the kernel bits that do the endless OSByte rubbish) should run in SYS mode. By now we’ve pretty much completely broken the current API, so it’ll probably never happen… ;-)
Yes. In order to enforce copyright, somebody has to claim ownership of it. You can assign copyright (a lot of GNU assigns copyright to the FSF), but somebody somewhere needs to be considered the “owner”. The way the licences work is by using copyright against itself. You see, software without à licence will fall into one of two categories – public domain (in which case all bets are off) or in countries that are signatory to the Berne Convention, automatically copyrighted (in which case without a specific licence giving you the rights, using the software is technically copyright infringement). Some people/companies don’t care about old stuff, some don’t exist any more, and some will happily threaten to sue you into oblivion. Without the licence, technically you couldn’t use the software. |
Paolo Fabio Zaino (28) 1882 posts |
Just a quick note about your comment:
There is no 100% safe system in modern computing (unless you keep your computer off). Anyway, that again depends on the “hacking value” of an OS, when RISC OS will reach Windows diffusion I would agree with you, right now you are only looking too far ahead. Designing malware with valid signatures is definitely not a kids job, so not something as dangerous as RISC OS is now, I believe you agree on this. There is plenty of hope for RISC OS, as long as the things that need to be done are put into place. Otherwise it’s still a fun OS to mess with, that reminds me of my youth and when I started coding and I still can enjoy it for what it is (I use it and code on it since Arthur times). |
Bryan (8467) 468 posts |
Apparantly not. In Netsurf, this topic now needs a screen 10 feet wide to read each post. |
John Rickman (71) 646 posts |
Apparantly not. In Netsurf, this topic now needs a screen 10 feet wide to read each post. I think this is a side effect of a fixed width component in a post in the thread. |
Paolo Fabio Zaino (28) 1882 posts |
fixing it John, sorry! :) P.S. Apparently NetSurf is not processing the tag “pre” correctly and generating the autoscrolling bars, will try to remember that in the future. |
Stefan Fröhling (7826) 167 posts |
@Rick Murray |
Rick Murray (539) 13857 posts |
I take it that you don’t read The Register? Nothing I have said isn’t some basic stuff that couldn’t be figured out by literally any person with an interest in programming and a double digit age. What stops most people is not technical, but ethical. Messing up other people’s machines is a really crappy thing to do, and there are many more fulfilling things to do instead, to be a part of the community, not against it.
They always could. Burying heads in the sand isn’t a viable tactic, however I have redacted my earlier post accordingly. |
Steve Pampling (1551) 8175 posts |
I think it sits with most people like abusing a cute kitten or puppy – some “people” do it, but they don’t even respect themselves so why should anyone else? Subverting a protection system, be it a copyright/licence protection or anti-virus, is a challenge. RO currently presents no such challenge. |
Doug Webb (190) 1180 posts |
Well we can thank Jon Abbott for an update to that. Just pop over to the Stardot forums and grab an updated version that works on modern machines here Working ok on my ARMX6 for a few weeks now at boot up. There is a version of Killer there as well but only for older machines and it says good against 209 variants as long as you change teh date back to 13th October 1998. |
Steve Fryatt (216) 2106 posts |
As Rick says, security through obscurity isn’t security.
Exactly. Also, most RISC OS users, at least in the RISC OS 5 community, seem to have got past the “RISC OS is so superior to every other OS and is completely invulnerable to viruses” thing (although it surfaces in the newsgroups fairly regularly, usually from people who turn out to have never seen a reason to upgrade past their RiscPC running 4.02 and still subscribe to the whole “Windoze” thing). Actively promoting a Kickstarter beyond the community on the basis that RISC OS has no viruses – which appears to be what you, Stefan, plan to do – is very likely to attract some attention. All it needs is one person who notices to decide to prove your claim wrong, and you’ve just created a problem. For anyone who hacked around with the platform in the 80s or 90s but have since moved on, proving it wrong wouldn’t be hard to do (the biggest problem could be getting it out into the wild, I suspect). You’re never going to be able to promote RISC OS on the basis of “a daily driver OS that’s superior to the mainstream competition”. It isn’t, and very few of its remaining users kid themselves1. Try it, and any attempt will fail at the first hurdle, when your potential converts realise that the promotion was a big fib. RISC OS Direct seems to have got it correct: promote RISC OS as something fun and efficient to stick on your Pi instead of Linux, to do the things that you do on your Pi, then wait. You still won’t get everyone, but it’s far more likely to be a positive experience that gets some people looking deeper into what else they can do with the OS. 1 I should probably clarify that in the context of Michael’s request. I still use RISC OS because it’s fun to use, fun2 to develop for and still does some things well. I don’t use it for everything, and can’t see me doing so – at least in the near future. 2 It’s not efficient to develop for, but if you’re not constrained by having to do things by deadlines it can be more interesting and satisfying. |
Steve Fryatt (216) 2106 posts |
That’s interesting; thanks. It would really need to be maintained and part of the OS releases if there was an outbreak, however. :-) |