Things Windows can do that your average Linux distribution can't do without significant tinkering and/or dropping down into the command line:
* decent font rendering * have drivers for new hardware and certain brands known to be problematic, such as BroadCom * support signed drivers to prevent tampering * support signed chain from UEFI to the kernel (UEFI SecureBoot) * support signed application binaries * run .NET applications (inb4 Mono, to which I say: WPF support) * run UWP applications from the Store * use hybrid boot for faster booting * install automatic and invisible security patching in the background * provide group policies for easy management of what computers can and cannot do * integrate with an Active Directory to provision group policies across all Windows boxes in a network * painless three-click setup of hard drive encryption through BitLocker
So, tell me, why are Linuxlets still refusing to use Windows on their desktop?
>Oh and btw secureboot was confirmed insecure last year since the master key got leaked arstechnica.co.uk/security/2016/08/microsoft-secure-boot-firmware-snafu-leaks-golden-key/ >The company said: "The jailbreak technique described in the researchers’ report on August 10 does not apply to desktop or enterprise PC systems. It requires physical access and administrator rights to ARM and RT devices and does not compromise encryption protections." news.ycombinator.com/item?id=12260454 >TL;DR: Microsoft's Secure Boot bootloader is vulnerable to an attack where you use a (Microsoft-signed) supplemental boot policy instead of a regular boot policy, effectively removing the Secure Boot lock and allowing to run unsigned code. >This affects locked devices (Windows RT, Phone, ...) and might be used for jailbreaking devices as well as to attack their security.
>Windows works great with its own features Let's completely ignore font rendering, hardware support, signed binaries in UEFI, the kernel and userspace, faster booting, unsupervised automatic security patch installation, group policy (which you can maybe try to replicate with SELinux policies) and hard drive encryption. It's like I didn't list anything at all, right? Is this the level of denial you have to live with?
Nolan Jackson
>font rendering not an argument >hardware support nouveau drivers for Nvidia babies Packman for audio/video Packman for Broadcom issues >signed binaries stop right there, UEFI is shit and binaries themselves can never be trusted regardless of signing >kernel and userspace what about them? >faster booting Libreboot is infinitely faster than your preinstalled binary BIOS, and if you want to look at just how locked down BIOSes are right now, compare yours to the options that used to be Phoenix BIOS. You can't even change your CPU frequency from your locked down shit anymore >unsupervized automatic security patch installation you literally just described Windows >group policy SELinux is an NSA botnet too, and AppArmor is friendlier to use. Just because there isn't a monolithic application for it doesn't mean that it doesn't exist as a feature >encryption dm-crypt+LUKS
Hunter Gray
Video games. >b-b-b-but... no one spends $600+ on a gaming machine only to cuck themselves out of 90% of the available library because of a lack of support and Wine being trash.
Liam Gray
>* decent font rendering Somebody has not used FreeType 2.7.
>* have drivers for new hardware and certain brands known to be problematic, such as BroadCom Most of the time there is drivers for problematic hardware, you just have to install it.
>* support signed drivers to prevent tampering Tampering from who? You?
>* support signed chain from UEFI to the kernel (UEFI SecureBoot) SecureBoot does not have a realistic threat model; it only exists to lock you out from reprogramming your own device.
>* support signed application binaries See above.
>* run .NET applications (inb4 Mono, to which I say: WPF support) I have never used anything written in .NET, but can't you just run anything that won't work with Mono using WINE?
>* run UWP applications from the Store This may be true, but WINE would support it if anyone cared.
>* use hybrid boot for faster booting It's called hibernation and Linux had this way before Windows did.
>* install automatic and invisible security patching in the background dnf install dnf-automatic apt install unattended-upgrades
>* provide group policies for easy management of what computers can and cannot do So you can take away users freedom?
>* integrate with an Active Directory to provision group policies across all Windows boxes in a network Isn't this just LDAP? Just use Samba and Kerberos.
>* painless three-click setup of hard drive encryption through BitLocker gnome-disk-utility (AKA GNOME Disks) to set up LUKS.
Wyatt White
>Have working drivers for my soundcard >can play games linux btfo
Bentley Williams
KVM+QEMU >muh 5fps overhead :^((((( get a better computer nigger
Liam Martinez
>please buy more expensive hardware to account for our autistic software that does nothing better I've fallen for many Sup Forums memes, but not this one.
Carson Perry
>* have drivers for new hardware and certain brands known to be problematic, such as Broadcom right, it's Linux fault that vendors don't write drivers
>* support signed application binaries every distro which uses repositories support checking signature of repository since time immemorial
>* run UWP applications from the Store considering fact that uwp is cancerous piece of shit not being able to run those apps is feature - look at all those developers who want to write them!
>* install automatic and invisible security patching in the background invisible? you mean "we'll reboot automatically when it'll be most inconvenient for you"? most distros have automatic update checker which work is more invisible than Windows "reboot" 10 "times every update"
>* painless three-click setup of hard drive encryption through BitLocker yes, install bitlocker, also send us password/key to your disk so it'll be more secure
encrypting disk in Linux is also painless, it's one option during partitioning in most instalators
Tyler King
>>font rendering >not an argument "I am fine with an inferior reading experience." >>hardware support >nouveau drivers for Nvidia babies >Packman for audio/video >Packman for Broadcom issues help.ubuntu.com/community/WifiDocs/Driver/bcm43xx Yeah, that looks easy and painless. >>signed binaries >stop right there, UEFI is shit and binaries themselves can never be trusted regardless of signing No argument made. >>kernel and userspace >what about them? You have no guarantee check that the author of the program actually wrote the code that's running right now. Scary prospect to me. >>faster booting >Libreboot is infinitely faster than your preinstalled binary BIOS, and if you want to look at just how locked down BIOSes are right now, compare yours to the options that used to be Phoenix BIOS. You can't even change your CPU frequency from your locked down shit anymore Please leave the goalpost where it was, the OS half of booting. >>unsupervized automatic security patch installation >you literally just described Windows I also described wiki.debian.org/UnattendedUpgrades which should just be enabled out of the box. Users cannot be trusted to do the right thing and apply security patches in a timely manner. Not even you. >>group policy >SELinux is an NSA botnet too, and AppArmor is friendlier to use. Just because there isn't a monolithic application for it doesn't mean that it doesn't exist as a feature You seem to love to say "botnet", but your claims are not backed by any evidence. If your opponent is the NSA, you probably ought to stop using computers in the first place. >>encryption >dm-crypt+LUKS OP says: "without significant tinkering and/or dropping down into the command line" The only distribution I've seen do this right is Fedora (and subsequently RHEL).
Benjamin Clark
>Please leave the goalpost where it was Epic denial in overall.
Anthony Gonzalez
>right, it's Linux fault that vendors don't write drivers It isn't, but that doesn't make it any more convenient.
>every distro which uses repositories support checking signature of repository since time immemorial ToCToU. It's not checked when the application is loaded into memory, meaning an attacker can social engineer a custom binary copied into a privileged path. No signature verification to stop it.
>Isn't this just LDAP? Just use Samba and Kerberos. Nobody actually has publicly documented how the group policy storage in LDAP actually works.
Hudson Wilson
>* decent font rendering freetype2 looks great >* have drivers for new hardware and certain brands known to be problematic, such as BroadCom third party issue, it's not linux's fault broadcom provides poor linux support >* support signed drivers to prevent tampering >* support signed application binaries false, packages can be signed >* run .NET applications (inb4 Mono, to which I say: WPF support) >* run UWP applications from the Store you can't be serious >* use hybrid boot for faster booting >* install automatic and invisible security patching in the background false
Thomas Morgan
>So you can take away users freedom? you need group policy to enable passphrases in bitlocker, for example
Julian Davis
>Installing updates, please wait... >faster than GNU/Linux t. retard
Julian Taylor
>So, tell me, why are Linuxlets still refusing to use Windows on their desktop?
Poverty and mental illness.
Noah Lewis
>Things Windows can do >* decent font rendering Sup Forums, why are you bullying a blind person itt? Do you feel no shame?
>>>signed binaries >>stop right there, UEFI is shit and binaries themselves can never be trusted regardless of signing >No argument made. what the user wanted to say is: Even signed binaries can do things that you don't know and maybe don't want (like telemetry). The only programs that are trustworthy are the ones you compiled yourself (and read the source (but since nobody does that, the arguments for-and-against/about signed binaries are all bullshit anyways in either way))
Kevin Nelson
What about it?
Isaac Gonzalez
Did you post the wrong link?
Isaiah Richardson
>encrypting disk in Linux is also painless, it's one option during partitioning in most instalators Only if you have a single drive, try to do something like encrypt more than one while sharing a password and oh boy time to waste time on the terminal again.
Lucas Moore
> Windows > decent font rendering > everything gets fucking blurred are you blind? windows font rendering is the worst in existence
Adam James
Windows is a Spyware
Caleb Sanchez
Why do you even care? Are you retarded? Use Windows and shut the fuck up. No one cares about your operating system.
Jacob Davis
I was a Linux user for most of my life until I'd seen the light. I am compelled to spread it.
Liam Lewis
You do know when it comes to hardware linux wins right? Try using an s3 card or a voodoo card and expect it to work on windows 10. Pretty much anything you plug will work no problem when it comes to controller without using shit like x360ce. I am also pretty sure windows 10 does not support a million different architectures. Also ntfs is trash. How am i supposed to keep my hentai collection intact when it gets corrupted and chkdsk fucks up everything else. And why the fuck does it not have a package manager with trusted repos and good programs and not mobile malware trash
Justin Lee
>terminal >waste of time
All about that learning curve young padawan, terminals aren't wasting time if you know what you're doing.
It's either navigating to the right option through Control Panel or finding the right command to pass or file to modify, pick your poison.
Mason Brooks
Why? You seen the light, great. Keep it for yourself and don't share it, just like Windows does.
Elijah Nelson
Then use ReFS?
Jason Carter
>* decent font rendering Last I checked they can't even into hi DPI >* have drivers for new hardware and certain brands known to be problematic, such as BroadCom just get a fucking LB LINK. broadcom chips are backdoored 24/7 and has no physical killswitch compared to a USB wifi >* support signed drivers to prevent tampering Installing android recovery? lol. it just werks on linux, no need to do this shit. >* support signed chain from UEFI to the kernel (UEFI SecureBoot) Secureboot only blocks you from USB booting and may hard brick your whole thing (not even recovery cd works and have to use the trashy recovery partition that is worth 14GB. Drive failure means it goes into trash) >* support signed application binaries ?? anyone can spoof that shit and even bypass the UAC and implant spoofed services labeled as microsoft (c) >* run .NET applications (inb4 Mono, to which I say: WPF support) Qt > .NET dotnet is backdoored, anything compiled with it comes with telemetry and also the reason why most viruses ever compiled are traced back from its origins >* run UWP applications from the Store Is this even relevant? >* use hybrid boot for faster booting Hybrid boot more like non-volatile RAM that is dead insecure, allows LEA to extract the previous data in RAM and drive thanks to your fake shutdown >* install automatic and invisible security patching in the background Security patches that contain even more security holes courtesy of NSA (tm) >* provide group policies for easy management of what computers can and cannot do Protip: You can't modify NT/System Policy which contains all the telemetry and metadata and even webcam pictures of you (kek) >* integrate with an Active Directory to provision group policies across all Windows boxes in a network Active directory suck. Unix systems are the network standard. Doubt windows got any decent NFS >* painless three-click setup of hard drive encryption through BitLocker Painless one-liner to decrypt
Carson Reyes
I'll still keep the huge microsoft buttplug of metro, phones ,botnet, windows update,svhost.exe,no drivers for my old controller that whose company is dead, software bottlenecked vulkan/opengl.
Install the os and get updates via a lightweight package manager(or gui store which works the same way) and install/use the programs and games i like.
You install the OS(assuming windows likes your motherboard and doesn't show you msoobe.exe errors), go on a driver hunt, wait for your heavy AF windows update to finish, Hope windows update did not downgrade your driver, use the shitty bloated program your company wants you to use to update your drivers, use the browser to go get your programs, all of this and you still can't install them all at the same time and have to keep paying attention for every program that gets installed.
And don't even get me started on those idiots that thought not budling xna and the latest version of msvc and .net was a good idea. How the fuck is this supposed to be user-friendly. Instead you get ads and a 3d builder and some free2play mobile games.
Luis Butler
Windows Server and 10 user here, ReFS performs terribly and is missing features from NTFS. The integrity protection is potentially there but the cost is too high when compared to other filesystems. I haven't found anything that beats ZFS yet.
Connor Moore
And that's okay because you can only reasonably use ZFS on a select few systems (BSDs, OpenIndiana)
Benjamin Hernandez
OpenZFS has stable ports to Linux, OS X, and maybe more systems.
Cooper Morris
>* decent font rendering Gnu/Linux has better don't rendering. I don't know what you are talking about. >* have drivers for new hardware and certain brands known to be problematic, such as BroadCom Most things work though. Windows on the other hand doesn't come with any drivers. >* use hybrid boot for faster booting Why though? The majority of the time you spend on a cold boot is on the bios/UEFI stuff. The gnu/Linux system boots in 1-3 seconds. Boot times are not a thing to bitch about these days. We are now at a place where laptops are 15 times faster at booting. Because everything from the bios to the monitor is faster. >* install automatic and invisible security patching in the background Windows can do that now? This has worked for 15 years with gnu/Linux. >* provide group policies for easy management of what computers can and cannot do I don't see why having this as a cli application is a bad thing. >* integrate with an Active Directory to provision group policies across all Windows boxes in a network It wouldn't be all windows boxes if they ran gnu/Linux >* painless three-click setup of hard drive encryption through BitLocker Not through bitlocker, no. But there is free replacements so who cares?
Nicholas James
I hear it's black now
Jaxson Evans
>buys MS surface laptop for 1000$ >can only install apps from store >have to pay another 60$ to "upgrade" my system so I can install 3rd party software
Jeremiah Sanchez
>That looks easy and painless Yeah man typing a command to identify a component then another command to install the appropriate driver for said component sure is hard.
Isaiah Brown
Who is this semen demon ?
Parker Anderson
This is a guy, dude.
Hunter Morales
Close enough.
Kevin Flores
>* decent font rendering Modern font rendering is really good, Oh boy i'm in for babies first shitpost aren't I
>* have drivers for new hardware and certain brands known to be problematic, such as BroadCom Broadcom actually supports linux pretty well. This is a bullshit cherry pick bullet point, there are devices that don't support Windows either. Hardware/Driver support is good.
>* support signed drivers to prevent tampering Don't need this if I have access to the source code, I can compile my own shit. You can also compare metadata for compiled binaries so this is retarded,
* support signed chain from UEFI to the kernel (UEFI SecureBoot) Fedora, Ubuntu, maybe others,
>* support signed application binaries This is actively being worked on, I would not be surprised if some enterprise crap has this.
>* run .NET applications (inb4 Mono, to which I say: WPF support) Wine, or Mono.
>* run UWP applications from the Store There are plenty of secure software repos for Linux
>* use hybrid boot for faster booting Linux bootloader doesn't need this stupid shit. It already boots plenty fast.
>* install automatic and invisible security patching in the background Linux can absolutely do this
>* provide group policies ... can and cannot do Linux can absolutely do this as well
>* integrate with an Active Directory ... in a network Linux can do this too.
>* painless ... BitLocker There are distros that have painless encrypted partition setup.
Cameron Smith
>* painless three-click setup of hard drive encryption through BitLocker >* painless three-click setup of hard drive encryption through BitLocker >* painless three-click setup of hard drive encryption through BitLocker Fuck you, faggot. If i don't have a TPM YOU GONNA HAVE A LOT OF PROBLEMS DO ENCRYPT YOUR HD.
Parker Myers
>* decent font rendering OK? >* have drivers for new hardware and certain brands known to be problematic, such as BroadCom Ndiswrapper, or you could just not buy retarded hardware. >* support signed drivers to prevent tampering Fair enough >* support signed chain from UEFI to the kernel (UEFI SecureBoot) Useless feature, but okay. >* support signed application binaries Fair point. >* run .NET applications (inb4 Mono, to which I say: WPF support) Hardly a feature, but I guess so. >* run UWP applications from the Store Once again, this is hardly a feature >* use hybrid boot for faster booting Agreed >* install automatic and invisible security patching in the background Linux can do this 1000 different ways on every distro >* provide group policies for easy management of what computers can and cannot do This is one of the core features of Linux >* integrate with an Active Directory to provision group policies across all Windows boxes in a network See above >* painless three-click setup of hard drive encryption through BitLocker "lol es eezierrr"
Jose Clark
>decent font rendering wew lad this bait was way too obvious
Nolan Smith
>signed drivers Botnet, they should be free software >SecureBoot Botnet >signed application binaries Botnet >.NET Botnet
Nathan Perez
Sure, I'll bite.
>* decent font rendering
Most people don't give a shit about their font experience.
>* have drivers for new hardware and certain brands known to be problematic, such as BroadCom
There almost always exists an alternative to problematic manufacturers. In cases where you can't accept a substitute, you're probably doing something so specialized you're already not running Linux.
>* support signed drivers to prevent tampering
Driver signing is slowly getting more and more irrelevant. Certificate authorities and the companies signing drivers don't have the chops to secure their certificates.
The malware has both user-mode and kernel-mode rootkit capability under Windows, and its device drivers have been digitally signed with the private keys of two certificates that were stolen from separate well-known companies, JMicron and Realtek, both located at Hsinchu Science Park in Taiwan. The driver signing helped it install kernel-mode rootkit drivers successfully without users being notified, and therefore it remained undetected for a relatively long period of time.
The worm, like Stuxnet, has a valid, but abused digital signature, and collects information to prepare for future attacks... According to McAfee, one of Duqu's actions is to steal digital certificates (and corresponding private keys, as used in public-key cryptography) from attacked computers to help future viruses appear as secure software.
>* support signed chain from UEFI to the kernel (UEFI SecureBoot)
Secureboot is a solution to an extremely niche set of attacks that are generally not worth the trouble even against targets that don't use secureboot. The only reason it's pushed so hard is because it enables MSFT and OEMs to increase the difficulty of installing alternative operating systems (MSFT keeps market share, OEM doesn't have to deal with customers trying to use unsupported OSes.)
1/?
Ethan Nguyen
>decent font rendering Stopped reading right there. Windows fonts always looks like shit.
Colton Lopez
You have clearly not used a Linux based operating system for longer than a week.
>windows works great with its own proprietary implementations no shit
Cameron Taylor
>* support signed application binaries
Apart from attacks against certificates, which I mentioned under "signed drivers", an attacker can get a hot fresh signing certificate that will tone down or eliminate warning messages for about 500 USD.
>* run .NET applications (inb4 Mono, to which I say: WPF support)
>* provide group policies for easy management of what computers can and cannot do >* integrate with an Active Directory to provision group policies across all Windows boxes in a network
OpenLDAP + Samba/AFS +Spacewalk/Saltstack/Puppet/Chef/Zentyal; or just use whatever Canonical and Red Hat are offering this week for system management. No shit group policy works on Windows, it's special LDAP designed for Windows.
>* painless three-click setup of hard drive encryption through BitLocker
Make sure you write down your super secret special recovery key, because if you change anything about your BIOS/UEFI config, or your hardware, Windows will refuse to boot without it.