Imagine your friend that does not know anything about linux, don’t you think this would make them not install the firefox flatpak and potentially think that linux is unsafe?

I ask this because I believe we must be careful and make small changes to welcome new users in the future, we have to make them as much comfortable as possible when experimenting with a new O.S

I believe this warning could have a less alarming design, saying something like “This app can use elevated permissions. What does this mean?” with the “What does this mean?” text as a clickable URL that shows the user that this may cause security risks. I mean, is kind of a contradiction to have “verified” on the app and a red warning saying “Potentially unsafe”, the user will think “well, should I trust this or not??”

    • refalo@programming.dev
      link
      fedilink
      arrow-up
      0
      ·
      6 days ago

      Which is hilarious because desktop apps have always had the capability to spy on all other apps and steal all your data.

      • Actually, Windows has implemented quite a few tricks to make this very difficult without setting off antivirus engines at least. X11’s security model is absolute trash compared to Windows Vista and above. Linux is getting safer with Wayland, but Linux on the desktop hasn’t had the XP SP1 security humiliation that Windows had so almost all of it is opt-in.

        Solving the issues Windows has already solved with things like integrity levels will break compatibility with many applications (it also did on Windows, which is why Vista made you run everything as admin) but simply enabling the Flatpak sandbox can solve many problems already.

        I wonder if there’s a desktop distro out there that enforces sandboxed applications by default. It would make running Linux a lot less risky.

        • refalo@programming.dev
          link
          fedilink
          arrow-up
          0
          ·
          5 days ago

          Windows has implemented quite a few tricks to make this very difficult without setting off antivirus engines

          That’s funny because we have been shipping a commercial Windows app since XP that is keylogger-based using SetWindowsHookEx, and it has only tripped users’ antivirus maybe 1 or 2 times in 20 years.

          I wonder if there’s a desktop distro out there that enforces sandboxed applications by default.

          EasyOS is the first distro I’ve seen that at least runs every app as its own user by default, similar to Android.

        • pivot_root@lemmy.world
          link
          fedilink
          arrow-up
          0
          ·
          edit-2
          6 days ago

          You’re thinking of operating systems that give unrestricted access to all parts of a computer that aren’t memory or the camera. That would everything1, actually.

          1 There’s also Linux with properly-configured SELinux, but good luck with that on a distro that isn’t focused on opsec.

          • Para_lyzed@lemmy.world
            link
            fedilink
            arrow-up
            0
            ·
            5 days ago

            Fedora has pretty good SELinux configured out of the box, and isn’t focused on opsec. It’s just sane defaults and proper limitations to access. It also switched to Walyand-by-default this release, completely removing X11 from the default packages, which mitigates many of the “app spying on other app” scenarios that a previous user in the thread was talking about. That’s not to say that Fedora is the pinnacle of Linux security or anything, but it comes with pretty good defaults for the average user. You’d have to get into kernel hardening and deep into SELinux to do better as an end user, which is not something that most users are inclined to spend time or energy on.

            • pivot_root@lemmy.world
              link
              fedilink
              arrow-up
              0
              ·
              6 days ago

              If you’re willing to admit that you’re denigrating an operating system for having the same flaws as the one you prefer and are being a massive hypocrite in doing so, sure.

              • Bilb!@lem.monster
                link
                fedilink
                English
                arrow-up
                0
                ·
                6 days ago

                You’ve lost me on this one. No idea what you mean. But either way, I think you should take my comment just a bit less seriously.

    • federino@programming.devOP
      link
      fedilink
      arrow-up
      0
      ·
      edit-2
      6 days ago

      It’s not specific to browsers, but to every flatpak that is verified and has the potentially unsafe warning.

      • eveninghere@beehaw.org
        link
        fedilink
        arrow-up
        0
        ·
        6 days ago

        “Verified” doesn’t mean too much to privacy advocates. There have been incidents. I indeed want to check what my app is going to access before installing it.

        • federino@programming.devOP
          link
          fedilink
          arrow-up
          0
          ·
          6 days ago

          I think it’s okay to check what the app is going to access in your system. I’m just talking about the warning design, this comment suggests a different approach for a less alarming design.

          • eveninghere@beehaw.org
            link
            fedilink
            arrow-up
            0
            ·
            6 days ago

            Ah, very good point! If we all had the dedication for UX like you do, Linux would be so so so perfect.