• 2 Posts
  • 41 Comments
Joined 1 year ago
cake
Cake day: June 2nd, 2023

help-circle






  • Uses the heavily deprecated XOrg display manager. XOrg has no isolation of windows from each other, meaning any app can record your screen without notice. All XOrg apps can also log keyboard presses arbitrarily. Since all apps share the same display server, they can easy correlate keypresses (text) with what app it is entered in, kinda like Windows Recall. Cinnamon, Mate, and XFCE all use XOrg. Cinnamon still doesnt default to Wayland.









  • Lemongrab@lemmy.onetoSelfhosted@lemmy.worldOS recommendations
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    1
    ·
    4 months ago

    Generally, I think it is better to use a general server OS like Debian or Fedora instead of something specialized like Proxmox or Unraid. That way you can always choose the way you want to use your server instead of being channeled into running it a specific way (especially if you ever change your mind).



  • Lemongrab@lemmy.onetoSelfhosted@lemmy.worldSecurity and docker
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    4 months ago

    It is not speculation, it is reducing attack surface. Security is preemptive. Docker/Podman are not strong isolation solutions. Rare does not mean we shouldn’t protect against the chance of kernel vulnerabilities. The linux kernel around 30 million lines of code long and written in a memory unsafe language. Code isn’t safe just because we dont know the vulnerabilities, this is basic cybersec reasoning.


  • Lemongrab@lemmy.onetoSelfhosted@lemmy.worldSecurity and docker
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    edit-2
    4 months ago

    Docker/Podman and LXC linux containers share the same kernel with the host machine. Root in the container is root period (in the case of rootfull containers). Even without root, much of the data on your machine is readable from any user. With a exploit to escape the container (which are common) the malicious program has root on the machine. This is a known attack vector against linux containers. VMs are much better for isolating untrusted software from the host OS.