BUSTING some packaging format MYTHS! App verification, sandbox, package maintainers...

Head to to save 10% off your first purchase of a website or domain using code thelinuxexperiment Grab a brand new laptop or desktop running Linux: # šŸ‘ SUPPORT THE CHANNEL: Get access to: - a Daily Linux News show - a weekly patroncast for more personal thoughts - polls on the next topics I cover, - your name in the credits YouTube: @thelinuxexp/join Patreon: Or, you can donate whatever you want: Liberapay: šŸ‘• GET TLE MERCH Support the channel AND get cool new gear: šŸŽ™ļø LINUX AND OPEN SOURCE NEWS PODCAST: Listen to the latest Linux and open source news, with more in depth coverage, and ad-free! šŸ† FOLLOW ME ELSEWHERE: Website: Mastodon: @thelinuxEXP Pixelfed: PeerTube: Discord: Timecodes: 0:00 Intro 0:41 Sponsor: SquareSpace 01:45 App Verification and security 04:36 Distro packages arenā€™t really safer 06:46 Sandboxing: no silver bullet 09:07 Distro dependencies are better? 13:07 Itā€™s your responsibility to check 14:50 Sponsor: Tuxedo Computers 15:43 Support the channel Verified apps are an implicit guarantee that this thing is as the developer intended. What app verification isnā€™t, is a guarantee that the package youā€™re downloading is safe, or has no security problems. If the repo has been hacked, if one of the maintainers for the app is malicious, then the official package will also contain that code. The security argument will often be used to push people towards distro packages instead of flatpaks and snaps, but this is also not really how things work. The general view of distro packages is that they can be safer, because thereā€™s a trusted maintainer that will create the package, and thus can detect any unwanted change, backdoor, or problem, and prevent you from getting the infected or buggy version of the package. This is not really the case though. Log4J, the recent SSH vulnerability, the XZ backdoor, and basically every CVE ever discovered points to the fact that maintainers DO NOT do security reviews on most packages they build. Thatā€™s not what is expected of them either. A lot of maintainers arenā€™t developers and couldnā€™t conduct these audits in the first place. Another big misconception is around the sandbox for Flatpaks and snaps. A sandbox basically just means that the app youā€™re running has a system of permissions that limits what the app can do, and how it can interact with the system. It CAN be more secure than not having a sandbox, but it doesnā€™t mean it IS always more secure. Another example of the sandbox not doing anything to protect the user is with the recent scam crypto apps on the snap store: these WERE sandboxed, because they scammed you through a web view, a website basically. Another common misconception around packages is how dependencies work. Youā€™ll often read that distro packages use the system dependencies, and thus use less disk space, and are more secure, because you know that the library the app relies upon is updated by your distro, compared to a flatpak, snap or AppImage, where the dev might have bundled a dependency on their own, and never bothered to update it. First, you CAN check which versions of dependencies the package comes with. A flatpak is open, you can see how itā€™s built. Second, distro packages arenā€™t always up to date either: just because itā€™s a shared library doesnā€™t mean it has all the latest security fixes. This example will be clearer: MariaDB got a security update in 2021 in November. While Arch and Artix updated things the same day, Debian took 3 months to apply it, and Alpine took 4. Same goes for fixed linux kernel versions: when your distro is locked to a specific kernel version, itā€™s been factually proven that this version becomes more and more buggy and vulnerable over time, as maintainers simply donā€™t apply every fix, and donā€™t backport everything. For example, the current RHEL 8.8 kernel had more then 4500 bugs open that have fixes in later kernel releases.
Back to Top