| ▲ | altern8 4 days ago | |||||||
Can't this aspect be improved, vs. switching to something else? | ||||||||
| ▲ | sprash 4 days ago | parent | next [-] | |||||||
It is already possible today. There are access control hooks provided via XACE. Nobody uses them because the attack scenario is basically non-existent. If you run untrusted malicious apps having full access to your home directory you have big problems anyways. Not giving them access to e.g. the screen coordinates of their windows won't help you much then. | ||||||||
| ||||||||
| ▲ | exceptione 3 days ago | parent | prev | next [-] | |||||||
I fear it is an unsalvageable part of the Xorg design. The software is really old, including its assumptions about security. The original developers judged Xorg is really not saveable. Any extra effort on X11 might help to buy more time, but will in the end be for nothing. And in this time of supply-chain attacks, vs-code plugins, npm packages, agents and what-not, X11 is just too dangerous. | ||||||||
| ||||||||
| ▲ | ElectroBuffoon 3 days ago | parent | prev [-] | |||||||
QubesOS and Xpra+Firejail demostrate security can be improved including the X11 side. Solaris had Trusted Extensions. X11Libre has a proposal for using different magic cookies to isolate clients and give dummy data to the untrusted. Keith Packard also proposed something in 2018. | ||||||||