Snap and modern software (was: Remove /snap directory)
Keith
keith at caramail.com
Sat Dec 17 00:08:40 UTC 2022
On 12/16/22 12:05 PM, rikona wrote:
> On Thu, 15 Dec 2022 17:18:17 -0600
> Keith <keith at caramail.com> wrote:
>
>> On 12/15/22 1:40 PM, rikona wrote:
>>> On Wed, 14 Dec 2022 14:04:54 -0600
>>> Keith <keith at caramail.com> wrote:
>
> <BIIIG snip> :-)
Heh, I'll strive to more concise in this post. No guarantees, though!
>
>> And where to begin to do that? The kernel, obviously as the linked
>> articles above would mandate. Maybe that big ol' linux-firmware
>> package full of unauditable binary blobs that makes your hardware
>> devices work. I guess you trust hardware vendors from foreign
>> countries like China to provide non compromised firmware, right? Of
>> course, there's the cpu and chipset microcode to consider, especially
>> with Spectre and other exploits of mostly Intel cpu vulnerabilities
>> out there. Oh, and if you plugged in any usb devices into your
>> system, you'll probably want to check to see if they've
>> surreptitiously flashed the usb controller firmware, or hard drive
>> firmware, or whatever else is flashable on your system to load
>> undetectable spyware on bootup. Bad, bad USB.
>>
>> Trust is the key here. Who do you trust?
>
> Thanks for the interesting list. I know about many of those, but it's
> always nice to hear about a few more.
>
> I trust nobody 100%. Trust is not binary - I just try to get the
> highest number. :-) Some, like China, get low estimated trust levels,
> and don't get used at all if possible. Back a bit I had the firewall
> block calls to China - and some seemingly innocuous devices refused to
> work at all. And Comcast refuses to work unless I use their DNS
> servers. Problems everywhere. And there's also privacy, which is a bit
> different but still important.
>
> So, what do YOU do to keep 'secure', given all the problems? Or do you
> just accept that you're NOT secure?
>
Oh, I was responding to what you posted in your reply:
"In part, I tend to trust completely open source stuff that is popular,
with the idea that you code experts may spot something suspicious."
I guess took "trust completely" a little too literally. Whoops! :)
But yeah, you accept that perfect security is an illusion, and the best
you can do is mitigate your risks and get on with it. Kinda like driving
your car on a busy highway. You know in your mind that driving can be a
deadly activity, but if you thought about all the ways that you could
easily end up in a fatal car accident through no fault of your own, you
probably would take the train to commute anywhere. Best you can do is
make sure your car is in good working order, obey traffic laws, an be
alert to the other crazy drivers out on the highway. Although, taking a
defensive driving course wouldn't hurt, either.
That's what my outlandish riff in the last half of my post was about:
falling down a rabbit hole of security/safety paranoia. It just leads to
decision-making paralysis Educating yourself on *reasonable* risks and
mitigations will keep you from falling down that hole.
And when you reach the limits of your knowledge and ability to assess
and mitigate your risks, then that's where trust comes in. Trusting in
other individuals and people in communities who have more knowledge,
ability, and experience in assessing the risks and coming up with
solutions to mitigate them, or even eliminate them entirely. I run
Ubuntu, and therefore I have trust in Canonical, the Ubuntu community of
volunteers, and by extension Debian and its developers. Because snaps
are a technical initiative that is part of a list of services and
products that will benefit Ubuntu users and Canonical customers and
lead to increased revenues for the company, I trust that Canonical is
going to make the snap system more secure, easier to use, and increase
its performance. Why? Because its in their interest to make that happen.
Will they succeed? I hope so.
Hmm. Conciseness, it eludes me!
--
Keith
More information about the ubuntu-users
mailing list