Remix.run Logo
charcircuit 3 hours ago

At least in regards to the security model, it is decades out of date. For example any app can listen to your microphone and spy on you at anytime. Programs can act as ransomeware or destroy all of your files. Stealers can steal your login credentials and access tokens for all your sites including banking ones.

zorked 3 hours ago | parent | next [-]

I think people don't realize how inadequate the Unix security model is.

seba_dos1 2 hours ago | parent | prev | next [-]

...except in virtually any case where you'd run something untrusted there you'd use Flatpak or something similar where what you wrote doesn't apply.

tom_alexander 32 minutes ago | parent [-]

> untrusted

I think the important distinction is _everything_ should be considered untrusted because even trustworthy software can become malicious. For example, the XZ Utils backdoor[0].

On Android, everything I run is subject to the permission model and sandboxed. That is not the case on Linux.

[0] https://en.wikipedia.org/wiki/XZ_Utils_backdoor

seba_dos1 29 minutes ago | parent [-]

It's not the case on Android either and it could be subjected to a XZ-like backdoor just as anything else.

tom_alexander 11 minutes ago | parent [-]

Could you be more specific on how to circumvent the android permission model + sandbox? So far I have only thought of two ways an XZ-like backdoor could circumvent that:

1. By being baked into the OS itself, which is unavoidable since the OS is the thing providing the sandboxing + security model. It still massively reduces the attack surface.

2. By being run through the android debug bridge, which is far from normal and something users have to explicitly enable. Leaving you the option to shoot yourself in the foot in an opt-in manner 99.9% of users will never touch isn't the same as Linux where foot-shooting is the default.

j45 2 hours ago | parent | prev [-]

Meaning, it's a way to keep old hardware running linux instead of being a phone.