FoundFootFootage78

  • 3 Posts
  • 211 Comments
Joined 8 months ago
cake
Cake day: April 30th, 2025

help-circle




  • I did some research and I see what you mean. Apparently using the Flatpak of a browser disables the sandboxing between browser tabs. It doesn’t necessarily make my device less secure but it would make my browser less secure. Firefox officially supports it’s Flatpak so it would be good if I could find some sources more reliable than various forum posts but all-well.

    I’m iffy on having to manually configure my security but if I’m using Firefox on a distro that does not support it then there’s not much I can do to avoid that.

    Thanks for your tips.



  • In terms of gripes theres:

    1. It’s prompting me to upgrade to the unstable Ubuntu 25.10.
    2. It failed to upgrade me when I accidentally pressed the button.
    3. Widespread consensus that Ubuntu doesn’t take security as seriously as Fedora/OpenSUSE.
    4. That whole Xubuntu malware situation.

    I’m pretty sure there was another big issue I had. But it’s not coming to mind immediately. I’ve heard a lot of complaints about Ubuntu and I think I ran into something like that but it wasn’t that important to me personally so it slipped my mind.







  • That seems to be the case. Since I can’t find my original source. I remembered them saying something along the lines of “KDE doesn’t have a thumbnailer sandbox, GNOME has one albeit weak, so you should use GNOME” but I can’t find that source anywhere so maybe I imagined the entire thing.

    Either way I’ll disable the thumbnails on everything but images just because I don’t really need them and if anything having PDF’s generate thumbnails like images do just makes my downloads folder more confusing to navigate.




  • Please ignore the entire cybersecurity hype news cycle about images being used to spread malware.

    I’ve heard of thumbnails being used to deliver malware. Specifically the idea that “thumbnailers” are javascript code included in the file that will run in order to generate a thumbnail and they have the potential to deliver malware. After an arduous search I found this article https://thehackernews.com/2017/07/linux-gnome-vulnerability.html suggesting a vulnerability in the thumbnail generator for windows executables on GNOME allowed it to be used to deliver malware because the file name contained code that was executed by the thumbnailer. I’m still entirely unclear about what a thumbnailer even is (whether it’s local or remote code) or what my original source was. For now I’ll just turn off thumbnails for all but images and hope that counts as adequate security.



  • The idea of disabling sudo was that malware would try to use sudo and fail (plus Secureblue’s endorsement). But now that I think about it malware probably wouldn’t keylog my password and use systemd anyway, but instead use something less tedious and less distro-dependent like a privilege escalation attack. I’m wondering though, are you saying that you think run0 is more vulnerable, or that it shares a massive attack surface with sudo?

    I guess the value of browser escape vulnerabilities explains why I’ve never gotten any malware despite my risky web browsing. Though browser extensions still pose a risk and being a Firefox users I suspect that such value is low enough to use for run-of-the-mill malware (though probably just for Windows). I’ve heard a fair few times about thumbnailer attacks, but no real detail from KDE about what if any mitigations they have in place.