[kwlug-disc] linux distro ... -> sandboxed runtimes
Doug Moen
doug at moens.org
Tue Oct 21 12:17:07 EDT 2025
On my Linux desktop systems, I use flatpak instead of snap.
The main difference, from my perspective, is that flatpak puts the user in control of their experience, and puts the developer in control of what they ship, while with snap, Canonical is in control.
I can add or remove sandbox permissions from a flatpak using "flatpak override ...".
My phone runs GrapheneOS. Graphene has a richer set of sandbox permissions than Android (eg, you can deny network access). As a user, I can add or remove permissions from my apps.
For me, flatpak and GrapheneOS are the best available solutions (for desktop and mobile) of the problem that Mikalai describes.
For desktop browsers, I have replaced Firefox with LibreWolf, and I have replaced Chrome and Chromium with Ungoogled Chromium. Both provide superior security, privacy and control. Of the two, I like LibreWolf better, but I like to have multiple browsers based on different engines. For me, LibreWolf takes the GrapheneOS attention to detail for security, privacy and user control, and applies those values to a desktop web browser.
https://librewolf.net/
Mikalai talks about curated and trusted app stores. The important thing is that you should have a choice, rather than the corporation that owns the platform having total control.
On Kinoite, the flatpak app store defaults to a selection of apps that are endorsed by the Fedora project. There is a button for adding Flathub as an additional source, and Flathub is more of a free-for-all. The flatpak ecosystem was designed to support multiple app stores, and I'm already subscribed to two of them on Kinoite.
On Android, I do not trust the Google Play Store and I won't use it. I get most of my apps from the F-Droid official repo, because I consider them to be the most trustworthy. The F-Droid client permits you to add additional repos curated by other people with different priorities, and I have added some additional repos for a handful of the apps I've installed.
Doug.
----- Original message -----
From: Mikalai Birukou via kwlug-disc <kwlug-disc at kwlug.org>
To: kwlug-disc at kwlug.org
Cc: Mikalai Birukou <mb at 3nsoft.com>
Subject: Re: [kwlug-disc] linux distro ... -> sandboxed runtimes
Date: Tuesday, October 21, 2025 2:08 PM
There is an important aspect with sandboxed runtimes. Sandbox doesn't
allow program to "do anything", requiring permissions, ... but who
should be passing a judgement call: "Big Store" or a "little user/me".
Context quote:
> My own personal experience with Snap as a developer is such that I won't allow Snap on any of my machines. When I was working on the Curv open source project, a contributor created a snap package for Curv. I tested it, and it didn't work on my machine due to a sandboxing problem. But Blender, another 3D modelling program, did work on my machine in snap form. The difference was in the sandboxing parameters. I asked the contributor to use the same sandboxing parameters for the Curv snap as was used by the Blender snap. The answer was: this is impossible, because Canonical would not accept the Curv snap with those parameters, and therefore it was impossible to distribute the snap. Only Canonical had the power to allow Curv to run correctly, and the Curv project did not have the same level of political power as the Blender project, so we were out of luck.
Let's replace: snap -> Android Google Play store, parameters for Curv ->
permission to use camera, -- and we would get a similar situation where
another "Big Store" makes decision on behalf of users, ... to protect,
of course, ... while removing any freedom from users, by removing
competition.
Argument would then go, "how could little user/me" know?
Let me come back to short discussion at our October meeting:
- many of these systems with sandboxed runtimes for apps have explicit
permissions parameters, in manifests.
- tools can be made to analyze relationships and give "little user"
actionable suggestions. Information is there, in every user's system.
- such tools where not observed, even by those who are tasked with
making information security judgements.
What if there is a meaningful help to "little user" for making
permissions? Then the "free world" stops being a synonym with "dangerous
world".
What if it is a "middle user", organization's admin? Then we can have
secure organization context without giving all controls to "Big Co's",
with their tendencies.
Note that browsers are also similar sandboxed runtimes, and many learn
phrase "User Agent" first in browser context. Hence, experience with
browsers is also relevant here.
_______________________________________________
kwlug-disc mailing list
To unsubscribe, send an email to kwlug-disc-leave at kwlug.org
with the subject "unsubscribe", or email
kwlug-disc-owner at kwlug.org to contact a human being.
More information about the kwlug-disc
mailing list