federico3

joined 4 years ago
[–] federico3@lemmy.ml 1 points 5 months ago (1 children)

You can use firejail or other sandoxes with any application packaged in any distribution.

[–] federico3@lemmy.ml 2 points 5 months ago

I am well aware of it. It is an example of the traditional distribution workflow preventing a backdoor from landing into Debian Stable and other security-focused distributions. Of course the backdoor could have been spotted sooner, but also much later, given its sophistication.

In the specific case of xz, "Jia Tan" had to spend years of efforts in gaining trust and then to very carefully conceal the backdoor (and still failed to reach Debian Stable and other distributions). Why so much effort? Because many simpler backdoors or vulnerabilities have been spotted sooner. Also many less popular FOSS projects from unknown or untrusted upstream authors are simply not packaged.

Contrast that with distributing large "blobs", be it containers from docker hub or flatpak, snap etc, or statically linked binaries or pulling dependencies straight from upstream repositories (e.g. npm install): any vulnerability or backdoor can reach end users quickly and potentially stay unnoticed for years, as it happened many times.

There has been various various reports and papers published around the topic, for example https://www.securityweek.com/analysis-4-million-docker-images-shows-half-have-critical-vulnerabilities/

They have to watch hundreds to thousands of packages so having them do security checks for each package is simply not feasible.

That is what we do and yes, it takes effort, but it is still working better than the alternatives. Making attacks difficult and time consuming is good security.

If there is anything to learn from the xz attack is that both package maintainers and end users should be less lenient in accepting blobs of any kind.

[–] federico3@lemmy.ml 4 points 5 months ago* (last edited 5 months ago) (2 children)

They do now have a verified tick in Flathub to show if a Flatpak is official

Jia Tan liked your comment

Without the traditional distribution workflow what prevents flatpaks to be full of security issues? Unfortunately sandboxing cannot protect the data you put in the application.

[–] federico3@lemmy.ml 4 points 5 months ago

A speech-to-text / dictation system geared towards writing documentation.

[–] federico3@lemmy.ml 5 points 5 months ago

I would love a text based ActivityPub client focused on meaningful discussions: threaded view, ability to follow threads or branches, highlight posts based on keywords.

[–] federico3@lemmy.ml 2 points 5 months ago (2 children)

How does it compare with Paperwork? https://www.openpaper.work/en/

[–] federico3@lemmy.ml 6 points 7 months ago (2 children)

alerting people to their presence

Is many legal systems the driver is responsible for not running people over.

[–] federico3@lemmy.ml 1 points 7 months ago (1 children)

You are better off with an encrypted password store and a 2FA on a phone. You can back up both, easily, and they are both protected with fingerprints and/or global passwords.

[–] federico3@lemmy.ml 6 points 8 months ago (2 children)

Radicle has plenty of red flags, see https://lemmy.ml/comment/8982169

[–] federico3@lemmy.ml 4 points 8 months ago* (last edited 8 months ago)

People panic about face scan while the ongoing massive privacy breaches exist around online services and electronic devices. The amount of personal data that people pour into smartphones is enormous compared to using that vending machine. We need more GDPR.

[–] federico3@lemmy.ml 3 points 8 months ago

I would come along a question that I was well educated on, and the top voted responses were all very clearly wrong, but sounded correct to someone who didn’t know better.

This can be said to https://news.ycombinator.com/ as well. I wonder how much of this is due to sock puppets and bots.

view more: next ›