The title says it all. I would like to know what software you have in a flatpak. If you want to include your reasoning, go ahead.
I have pretty much everything in Flatpaks besides system apps. From browser to media players to games to libreoffice, etc
What’s the reasoning behind your question?
Every graphical app of course unless there’s an issue with packaging or any other problem.
I just wanted to know. For example: tumbleweed comes with firefox, do people uninstall it and reinstall it in a flatpak? The question comes from curiosity.
I have done that so yes
Yes. I removed Firefox and installed the flatpak version because it’s a little more secure.
EDIT: it might not actually be more secure, but it doesn’t appear to be less secure based on how I read the information in the replies.
This is not true. Also this is shepherding to a false definition of security.
You should probably read the included details if you haven’t and address those points directly. I’d love to know what is wrong about the problems they have described.
Did you think I was referring to your post? Because otherwise I don’t understand what you are aiming at.
How so?
Is that due to flatpak sandboxing?
Edit: it’s interesting, this repo is saying the opposite, https://github.com/trytomakeyouprivate/Recommended-Flatpak-Apps/blob/main/Apps/Browsers.md
The Flatpak Sandbox restricts the Browsers abilities to isolate the processes from another, and also valuable internal data like your history or passwords.
Edit 2: since folks are asking further details are linked in the article. Keep in mind I am not personally making these claims, I am in learn mode just like a lot of other folks.
From https://seirdy.one/notes/2022/06/12/flatpak-and-web-browsers/:
When distributing browsers through Flatpak, things get a bit…weird. Nesting sandboxes in Flatpak doesn’t really work, since Flatpak forbids access to user namespaces
I am not so sure this really establishes that Firefox in a Flatpak is less secure. From the linked bug:
You lose the namespace isolation, and by extension the chroot, but that’s it. It’s definitely nice to have, but to say it’s “most” of the sandboxing seems a misrepresentation. Note that some distros disable the kernel support for them by default, so that’s what they currently get regardless of Flatpak.
It might be more accurate to say that some per process isolation features don’t work because flatpak uses them to isolate Firefox from the rest of the system. This could make it easier to smuggle data between processes in Firefox. It reads like a trade off to me and the impact depends on your security model – whether you value interprocess isolation more than isolation between the app and the system.
Either way, interesting find! I didn’t know some of Firefox’s sandboxing is precluded by the Flatpak sandboxing. I edited my comment to dispell the claim that it’s more secure.
Yeah as they said it’s complicated, but in an unintuitive way more sandbox of apps can lead to apps being less effective at sandboxing themselves. Which, like you said, can be good bad or neutral depending on your threat model.
Personally I am leaning towards not using browser in Flatpaks since I trust the browser to sandbox itself. Not the position I started from initially where I would have assumed more sandboxing is a uniformly good thing.
Much respect for the discussion. I learned things.
Huh, that is very interesting
This resource makes a claim but presents nothing to back it up. I would like to learn more.
The details are in this link https://seirdy.one/notes/2022/06/12/flatpak-and-web-browsers/
proprietary software that I don’t trust, or programs that aren’t on zypper
I use flatpak for virtually everything because sandboxing your applications from each other and from your private data is a great idea to improve your system security. This helps prevent one compromised app from taking actions that affect the rest of your system.
For example, I have the VLC flatpak and used flatseal to revoke internet access because I only use it to play files. If a file tries to exploit VLC, it will not be able to upload any data or communicate with the attacker’s servers. I revoke any permissions my apps don’t actually need.
There are a few exceptions though. I run development and administrative tools directly because I do actually want unrestricted access to the system for these apps.
But what if someone attacks a development tool!
I like Bottles. Makes Wine less of a hassle.
https://github.com/trytomakeyouprivate/Recommended-Flatpak-Apps
Please add stuff if you have additions
I would say the comment for mullvad browser just to use librefox is dangerous and wrong, the no script from mullvad browser served me well by exporting it to other browsers even to mobile.
There is no Librefox, its Librewolf ;D
Noscript is an extension that can be installed on all Firefox Desktop Variants, Chromium Desktop, Brave Desktop (and many more Desktop Chromium browsers) as well as all versions of Firefox for Android. Possibly also Kiwix, which is some hacky Desktop Chromium for Android.
The one that causes dependency version conflicts when installed normally
Element(Matrix Chat Client) because it’s not in the repos.
DBeaver because it’s not in the repos or obs
“Core apps” are better on baremetal for seamless system integration.
Just use flatpaks for everything else.
Never use flatpaks for stuff available in your packet manager…
Why not aren’t flatpaks safer. I removed firefox on tumbleweed and installed the flatpak because its updated faster.
You’re right. Don’t listen to the dumbdumb.
deleted by creator