▲ | charcircuit 3 days ago | ||||||||||||||||||||||
>zoom through UAC prompts without reading. UAC is not a security boundary, so it is not relevant when talking about security. >SELinux and AppArmor already provide transparent system isolation for decades If they are setup and most Linux distros only limit individual apps. So a brand new app can still run wild. >you can install an immutable distro. Even immutable distros let people download new software off the internet and run it. >Plus, these repositories are generally well-vetted and observed by their maintainers. This has been shown to be false in practice due to the xz backdoor. Maintainers do not actually vet anything other than that the code is coming from the developer. Which is also what app stores do. | |||||||||||||||||||||||
▲ | akimbostrawman 3 days ago | parent [-] | ||||||||||||||||||||||
>UAC is not a security boundary, so it is not relevant when talking about security. That is there excuses but you don't seem to realize that this makes it only worse because that means there is no boundary at all. >If they are setup and most Linux distros only limit individual apps. So a brand new app can still run wild. new apps will be either installed from a trusted repository (often with a MAC profile) or sandboxed by default from flatpak/snap store. You don't seem to understand that the entire install process is different. You don't get your software from random sites found on Google between malware ads on Linux. >This has been shown to be false in practice due to the xz backdoor XZ has nothing to to with a lack of vetting and even if it was it would be an argument for it because it got caught in testing. | |||||||||||||||||||||||
|