As far as I know, the only possible way to escape the sandbox is to use flatpak-spawn --host
and add --talk-name=org.freedesktop.Flatpak
but I only ever seen that on apps like vscode.
Imo, the point of flatpak’s sandbox is to give an extra layer of protection in case of security vulnerabilities. Permissions exist so apps can still work as they’re supposed to. It’s not a virtual machine isolated from the rest of the system where you can or should install malware.
Besides, the manifest is public and needs to be approved to be on the default repository.
You’re correct, but just like you said, many applications need that.
If I install LibreOffice on Windows or Android, it’ll also have access to all my files. I really don’t see how that makes Linux more insecure.
Sure, ideally it would use portals, I just don’t like the attitude of the blog post.
Addressing concerns or areas for improvement, and suggesting users solutions like installing Flatseal, would be far more constructive. Even better would be submitting pull requests to enhance security themselves, since they seem to know so much about it. Instead, they’re just spreading FUD and complaining about small problems or nonsensical arguments like Windows adopting rust. Since when Rust is more used on Windows than Linux?
For instance, the blog post mentions Xorg’s security concerns but overlooks mentioning Xorg’s alternative Wayland, the default in most distributions when using KDE Plasma or Gnome, which are also the most used.
If security is so important, there are distros like Qubes OS, but most users don’t need that level of paranoia, specially if it ruins workflow, performance and productivity