this post was submitted on 02 Mar 2025
866 points (97.2% liked)
memes
12236 readers
2526 users here now
Community rules
1. Be civil
No trolling, bigotry or other insulting / annoying behaviour
2. No politics
This is non-politics community. For political memes please go to !politicalmemes@lemmy.world
3. No recent reposts
Check for reposts when posting a meme, you can only repost after 1 month
4. No bots
No bots without the express approval of the mods or the admins
5. No Spam/Ads
No advertisements or spam. This is an instance rule and the only way to live.
A collection of some classic Lemmy memes for your enjoyment
Sister communities
- !tenforward@lemmy.world : Star Trek memes, chat and shitposts
- !lemmyshitpost@lemmy.world : Lemmy Shitposts, anything and everything goes.
- !linuxmemes@lemmy.world : Linux themed memes
- !comicstrips@lemmy.world : for those who love comic stories.
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
This is FUD. It definitely is not a "critical" security feature. Firefox flatpak can't currently do its own internal sandboxing of subprocesses via namespaces, but it does do seccomp bpf filtering. That's in addition to the standard sandboxing of flatpak itself, which is implemented using namespaces anyways.
If you are extra paranoid, you can tweak the flatpak's permissions to harden the sandboxing via your distro's flatpak settings app.