• Examples of unverified apps:

    … these would be hidden by default. Is any of these applications dangerous or a security risk to the system / user?

    Linux Mint:

    Unverified Flatpaks represent a huge security risk.

    I personally don’t like this. This is not really true and in worse case even misleading and giving a false sense of security. If an app represents a huge security risk, why in the first place is it allowed in the repository? Unverified does not mean its a security risk, this is their interpretation of it. Unverified simply means, it is not verified by the original author.

    Create a fork of an app and verify your website with the fork in Flatpak. The system is already broken. Another point is, that lot of unverified apps are just normal apps, as this is the way applications are handled in Linux. We have the right to create alternative versions of the programs and the verification badge will show that. There is no point in hiding alternatives. By doing so, it undermines a reason why we use GPL and Open Source. And what about apps where the original author does not care, but was brought to Flatpak by a community member?

    Flathub:

    It’s similar failure to what Flathub does on their site too, but for another thing.

    Potentially unsafe: Full file system read/write access; Can access some specific files

    Even though LibreOffice is verified, it is marked as potentially unsafe application on Flathub.

    • I think it is a stupid change myself, but as far as I (recent Linux convert) can tell, mint is considered the go to distro for people coming freshly over from windows, and decidedly caters to beginners. A default setting for maximum user protection makes sense for that.

    • The Flathub security rating is useful but too cautious (so many “false alarms” that people ignore it). It is completely independent from the verification though.

      Mixing these up makes no sense.

      But for sure, officially supported Libreoffice may be more secure than distro-packaged Libreoffice.

      Is any of these applications dangerous or a security risk to the system / user?

      Likely not more than Distro packages. They pull in dependencies, and code, just like any other app.

      Flatpaks are too pain tolerant regarding EOL runtimes. These may have security risks, and many badly maintained apps are using them, and at least KDE Discover doesnt show a warning here.

      Create a fork of an app and verify your website with the fork in Flatpak. The system is already broken

      True

      By doing so, it undermines a reason why we use GPL and Open Source.

      Very good points. It is a good security practice to stay close to a trusted upstream though. Browsers for example may have delayed security patches.

      And what about apps where the original author does not care, but was brought to Flatpak by a community member?

      Same here, if the upstream tests the Flatpak BEFORE shipping the release, it will work and be fast. If they dont, they ship the update, the flatpak is updated some time after that, it may have an issue, the packagers may need to patch something, solve the issue upstream etc.

      The thing is that packagers should join upstream, as only integrated packaging gives this inherent stability and speed.

      This is not relevant in many scenarios though. Flatpaks allow to securely sandbox random apps, so they are very often more secure.

      • The Flathub security rating is useful but too cautious (so many “false alarms” that people ignore it). It is completely independent from the verification though.

        Mixing these up makes no sense.

        That’s right, but I had a point there. My point is, that even verified applications can be marked as insecure on Flathub. That means, unverified applications can be secure based on the standards the Flathub sets. This was my point that its independent and why the verification of source has nothing to do with security. If Linux Mint does hide unverified apps, because it thinks these are unsecure, then it should hide all the applications that are marked as a potential unsecure app; just like the unverified apps are potentially unsecure (just like any other verified app).

        Hopefully this was not too confusing to read.

    • It’s similar failure to what Flathub does on their site too

      My understanding is that Mint is just following Flathub’s classification, so it would be identical…?

      And (would need to verify when this version is released) some of those apps are available without Flatpacks anyway… (ie VLC for example), so I’d expect those to still be available

      I don’t see this as a big issue…

      • This assumes that distro packages would be more secure. Which are not “verified” most of the time, by design. And which are installed to the system, can do whatever they want.

        A system package can edit /etc, autostart itself, write to all your devices and /home.

        Flatpaks MAY do that, but these will have an “insecure” rating on Flathub. And they can still not write a lot of areas, for example other Flatpaks internal storage, even if they have home permission.

        • A system package can edit /etc, autostart itself, write to all your devices and /home.

          Distro packages are not inherently more secure, but they are all controlled and packaged by the team who manages your operating system. So you trust them fully. Which you cant for arbitrary packages from Flatpak, similar to arbitrary packages from Google playstore on Android. That’s why those “unmanaged” Flatpaks need such a rights system. I’m not saying one is better than the other, just that you can’t limit the security value by just what the app is allowed to do (in my opinion).

          • Linux mint and Ubuntu both add the “universe” repo by default. That repo is basically community grade, and even used for official flavors which tells a lot about their reliability.

            Same with Fedora. Everything outside of Workstation or the KDE Spin needs to be checked for maintenance carefully. There is lots of abandonware.

            With Flatpak on the other hand too, and you can still use it as it can just use EOL runtimes even on a rolling distro…

      • But that’s a personal decision. It’s not like Steam Flatpak would be a huge security risk, as the Mint devs say. Just because its not officially verified. Even Valve themselves recommended to use the Flatpak version of Steam, as an alternative to Snap package. You think such a package would be good enough if Valve itself sanction it. I would like to provide a link for this, but cannot find it right now.

  • It’s the GUI software manager, I think the LM developers should get a pass at curating selections for users who wouldn’t know any better.

    I personally think they can make it a total non-issue if they put in “some unverified results hidden, see settings to change”.

  •  Eugenia   ( @eugenia@lemmy.ml ) 
    link
    fedilink
    English
    4125 days ago

    I actually agree with Linux Mint’s decision. You can not trust any random upload. Either it’s an official/verified upload, or it shouldn’t be there at all (or it should be a separate app for those who want it). That’s why in my system, I only install from the official debian repos and not the community ones. I just don’t trust random anonymous uploaders.

  • This is the first time I ever find myself kind of disagreeing with the Mint team. As others have said, some of the most popular packages on Flathub are unverified so popular programs like Inkscape are not going to show up as Flatpaks?

    I think just a warning, like what Flathub does, and maybe a dialog before installing, warning the app is packaged by an unverified packager, would have been enough.

  •  NaN   ( @Bitrot@lemmy.sdf.org ) 
    link
    fedilink
    English
    1625 days ago

    I appreciate the clear marking that something is unverified, but don’t think disabling by default is the right move. As others have mentioned, most of the software in the distribution is also unverified.

  • This is a great start, but tbh, I’m not fully sold on “verified” flathub apps. Verification requires a token to be placed into a source repo or a website, but there appears to be nothing on actually verifying that the source/site are the original creators. So, for example, if someone packaged a malicious version of librefox and established it under io.github.librewolf-community instead of the canonical io.gitlab.librewolf-community, I’m concerned it’ll still show as verified (though quickly removed). The process can be read about here.

  • Have a look at my flatpak repo list with instructions on that

    The question is, do they change the remote or just hide the apps?

    I currently use 2 flathub remotes, the verified (named flathub-v) and the unfiltered one. When installing from CLI I can see if it is verified (2 possible remotes show up). I hope COSMIC store and KDE Discover will show the verification check soon.

    I use nearly only verified Flatpaks (a list of recommended ones is here, will soon update)

    But a few popular ones are not, like VLC (developers dont know Flatpak, should get an introduction by the current maintainer), Inkscape, Spotify, Steam, Bitwarden, Signal, Torbrowser launcher, Blender, Calibre, and more (excluding Chromium Browsers, use the native versions for security reasons) are all missing.

    Important things to consider:

    • distro packages are nearly always unverified i.e. maintained by distro packagers instead of upstream
    • spotify flatpak is not verified, but the flatpak is securely packaged. Mint has a deb repo, and that proprietary piece of malware could do whatever they like with your entire system
    • flatpaks are very often more secure, at least they have some security mechanism that can be easily manually hardened. Unlike firejail or bubblejail, which are very complex.