> Popular and lack-of-restrictions implies malware is made.
That's a more reasonable assertion (but isn't what your original post said, nor was popularity implied).
And while it is reasonable, I don't think there's really a way to draw a conclusion here; e.g. in the early 2000s, Apache had something like 6 times the market share of IIS and about 1/30 of the exploits; product design DOES make a difference here.
I don't know how easy it is to get someone to run an OSX executable, but a linux virus spreading by email would have to include instructions to the user along the lines of
save this file as really_innocent_file, drop into a shell, run
chmod a+x really_innocent_file && exec really_innocent_file
and you'll see a naked picture of $CELEBRITY.
My current favourite is the one that goes something like, "Hey, did you know you can use the terminal to make sounds? Linux has this hidden 'xxd' sound device! Try this, it's the Imperial March from Star Wars!"
That's a more reasonable assertion (but isn't what your original post said, nor was popularity implied).
And while it is reasonable, I don't think there's really a way to draw a conclusion here; e.g. in the early 2000s, Apache had something like 6 times the market share of IIS and about 1/30 of the exploits; product design DOES make a difference here.
I don't know how easy it is to get someone to run an OSX executable, but a linux virus spreading by email would have to include instructions to the user along the lines of