Most active commenters
  • josephg(21)
  • extraisland(20)
  • lwhi(18)
  • fsflover(14)
  • GoblinSlayer(11)
  • safety1st(10)
  • wizzwizz4(9)
  • _heimdall(8)
  • mike_hearn(6)
  • lucideer(6)

←back to thread

2071 points K0nserv | 378 comments | | HN request time: 1.302s | source | bottom
1. zmmmmm ◴[] No.45088995[source]
> In this context this would mean having the ability and documentation to build or install alternative operating systems on this hardware

It doesn't work. Everything from banks to Netflix and others are slowly edging out anything where they can't fully verify the chain of control to an entity they can have a legal or contractual relationship with. To be clear, this is fundamental, not incidental. You can't run your own operating system because it's not in Netflix's financial interest for you to do so. Or your banks, or your government. They all benefit from you not having control, so you can't.

This is why it's so important to defend the real principles here not just the technical artefacts of them. Netflix shouldn't be able to insist on a particular type of DRM for me to receive their service. Governments shouldn't be able to prevent me from end to end encrypting things. I should be able to opt into all this if I want more security, but it can't be mandatory. However all of these things are not technical, they are principles and rights that we have to argue for.

replies(38): >>45089166 #>>45089202 #>>45089284 #>>45089333 #>>45089427 #>>45089429 #>>45089435 #>>45089489 #>>45089510 #>>45089540 #>>45089671 #>>45089713 #>>45089774 #>>45089807 #>>45089822 #>>45089863 #>>45089898 #>>45089923 #>>45089969 #>>45090089 #>>45090324 #>>45090433 #>>45090512 #>>45090536 #>>45090578 #>>45090671 #>>45090714 #>>45090902 #>>45090919 #>>45091186 #>>45091432 #>>45091515 #>>45091629 #>>45091710 #>>45092238 #>>45092325 #>>45092412 #>>45092773 #
2. ls612 ◴[] No.45089166[source]
I mean you’re right but it seems like the equilibrium we’re heading towards is one where the opposite is true and our internet and society looks more like China’s. Principles unfortunately mean little in the face of societal and technological change, the only thing that matters is the resulting incentives.
3. fastaguy88 ◴[] No.45089202[source]
Really not a libertarian, but why shouldn’t Netflix have the right to choose who they distribute content to? They negotiated conditions with the creators, why shouldn’t they be able to specify the DRM? No one is forcing you to subscribe to Netflix. Or even to buy an iPad.
replies(6): >>45089227 #>>45089303 #>>45089346 #>>45089360 #>>45089420 #>>45089426 #
4. ranyume ◴[] No.45089227[source]
>why shouldn’t Netflix have the right to choose who they distribute content to?

power asymmetry

replies(2): >>45089271 #>>45089281 #
5. cm2012 ◴[] No.45089271{3}[source]
There are dozens of sources of online streaming entertainment, and its not exactly a vital good.
replies(3): >>45089282 #>>45089296 #>>45089318 #
6. zeroCalories ◴[] No.45089281{3}[source]
TBH I don't care if Netflix wants to abuse such an asymmetry. I don't need Netflix in my life, so I'll just cancel my subscription(already have). I honestly don't want my lawmakers to spend even a second thinking about Netflix when we have so many large issues in the world right now. If we were talking about something like financial services where I have to engage I would be more sympathetic.
replies(1): >>45089301 #
7. Gud ◴[] No.45089282{4}[source]
Yeah, there are a lot of torrent sites! Netflix doens't want my business anymore, I don't really care.
8. JeremyNT ◴[] No.45089284[source]
This is the crux of the matter.

Maybe conceptually you will be able to run some kind of open operating system with your own code, but it will be unable to access software or services provided by corporate or governmental entities.

This has been obvious for some time, and as soon as passkeys started popping up the endgame became clear.

Pleading to the government definitely can't save us now though, because they want the control just as much as the corporations do.

replies(5): >>45089321 #>>45089323 #>>45089975 #>>45090561 #>>45090592 #
9. ranyume ◴[] No.45089296{4}[source]
There exist dozens of online services where you can store your photos, doesn't mean companies should be allowed to do whatever they want with your photos...
10. MangoToupe ◴[] No.45089301{4}[source]
Capital doesn't really care what you want, it will exert control regardless. So in this case Netflix will continue to be part of capital that normalizes the need for DRM to access videos, write IP law, and generally force you into either accepting the world they want or forcing you to become a hermit.

Edit: i mean to say this is true whether or not you've even heard of the company.

replies(1): >>45089442 #
11. pishpash ◴[] No.45089303[source]
It's sort of antitrust adjacent. They are big enough to set market rules on the manner of distribution, like DRM and hardware-software lock-in, which doesn't directly stifle competition in their field (only a little) but in another field, and the results are arguably anti-consumer. That sort of power should not be in the hands of a single company.
12. OmarAssadi ◴[] No.45089318{4}[source]
Sure, Netflix may not be as important as, say, housing, food, or whatever else, but I think there is something to be said about the cultural importance of [at the very least some] film and television.

There's a lot of media worth studying, analyzing, and preserving. And in that sense, between the constant churn of catalog items, exclusive content, and the egregious DRM, I think these sorts of streaming services are, unfortunately, kind of harmful.

replies(1): >>45089388 #
13. pishpash ◴[] No.45089321[source]
Should have made open-source components in some key nodes of the ecosystem popular and profitable. But that was a tall order.
replies(1): >>45089575 #
14. kibwen ◴[] No.45089323[source]
> Maybe conceptually you will be able to run some kind of open operating system with your own code

Why do you think they would even allow this? If you think that governments don't have the incentives or the means to criminalize running non-approved OSes, or the unauthorized use of non-approved hardware, you're insufficiently cynical.

replies(1): >>45089552 #
15. markus_zhang ◴[] No.45089333[source]
Arguing doesn’t work for principles.
16. chairmansteve ◴[] No.45089346[source]
A non libertarian might ask: Is it good for society?
17. bfdm ◴[] No.45089360[source]
Because it's bad for consumers to lose choices, even if they don't normally exercise those choices. The choice is the distributed power we have against the consolidated corporate power. We can choose not to let them restrict those choices, for example with interoperability regulations.
18. chongli ◴[] No.45089388{5}[source]
Doesn't your second paragraph run against the grain of your first? If streaming services like Netflix are harmful then we should avoid using them. Thus it should not be important for our freedom-preserving computers to be able to access Netflix.

Now, if you want to do an in-depth study of film and television material as a whole, you're actually better off avoiding Netflix and making use of archives such as public libraries, university libraries, and the Internet Archive.

replies(1): >>45089547 #
19. jonahx ◴[] No.45089420[source]
The issue is the means of enforcement requires taking away other rights they shouldn't be able to.

What if I want to require (for anti-piracy reasons) that to use my software you must also give me complete access to your computer, all the data on it, and all your communications. You might say, "Well, if anyone is stupid enough to make that deal, let them." But it's easy to sugar coat what you're doing, especially with less technical users. I think it's better to say, "That's just not something you are allowed to do. It's trampling on rights more important than your anti-piracy rights."

In the same way, you cannot murder someone even if they agree to be murdered (an actual case in Germany).

replies(2): >>45089544 #>>45089551 #
20. ekianjo ◴[] No.45089426[source]
For Netflix sure. I don't care. But when it comes to banking and you are forced to use between two OS or this means no access to your bank digitally, this is a massive problem and restriction to citizens' freedom. Everyone needs a bank to operate, and they need to maximize the options available to use them.
replies(3): >>45089662 #>>45089739 #>>45090253 #
21. BrenBarn ◴[] No.45089427[source]
I think you're right but I'd say it even more generally: we just can't let companies get so big that they can do these things without facing pushback and competition from other entities.
replies(1): >>45090878 #
22. nradov ◴[] No.45089429[source]
You could just not watch Netflix. Most of the content is kind of crap anyway, low effort filler. And the streaming services have trouble even licensing third-party content at all unless they have robust copy protection. That may be stupid because it drives more consumers to privacy but copyright holders are free to negotiate any licensing terms they want.
replies(3): >>45089782 #>>45089928 #>>45090538 #
23. zeroCalories ◴[] No.45089442{5}[source]
Well then I will get mad when that actually happens. Until then don't care.
replies(3): >>45089741 #>>45090023 #>>45093013 #
24. josephg ◴[] No.45089489[source]
My parents are getting old and they aren't tech savvy. The missing piece here is that I want my parents to have a computer they can safely do their banking on, without leaving them vulnerable to scams and viruses and the like. I like that they have iphones. Doing internet banking on their phone is safer than doing it on their desktop computer. Why is that?

The reason is that the desktop PC security model is deeply flawed. In modern desktop operating systems, we protect user A from user B. But any program running on my computer is - for some reason - completely trusted with my data. Any program I run is allowed to silently edit, delete or steal anything I own. Unless you install special software, you can't even tell if any of this is happening. This makes every transitive dependency of every program on your computer a potential attack vector.

I want computers to be hackable. But I don't also want my computer to be able to be hacked so easily. Right now, I have to choose between doing banking on my (maybe - hopefully - safe) computer. Or doing banking on my definitely safe iphone. What a horrible choice.

Personally I think we need to start making computers that provide the best of both worlds. I want much more control over what code can do on my computer. I also want programs to be able to run in a safe, sandboxed way. But I should be the one in charge of that sandbox. Not Google. Definitely not Apple. But there's currently no desktop environment that provides that ability.

I think the argument against locked down computers (like iphones and androids) would be a lot stronger if linux & friends provided a real alternative that was both safe and secure. If big companies are the only ones which provide a safe computing experience, we're asking for trouble.

replies(21): >>45089546 #>>45089576 #>>45089598 #>>45089602 #>>45089643 #>>45089690 #>>45089745 #>>45089884 #>>45090077 #>>45090112 #>>45090128 #>>45090605 #>>45090660 #>>45091074 #>>45091275 #>>45091454 #>>45091793 #>>45092007 #>>45092495 #>>45092746 #>>45114735 #
25. enos_feedler ◴[] No.45089510[source]
This is a sad reality. I see 2 paths forward 1) we somehow build the right layers into the internet that we can withstand open hardware. 2) open hardware running any software becomes an education use and hobbyist market only. I could see an edu slice to every corporate entity deploying open and free stuff just as onboarding to paid. Hackable hardware with kiddyflix.
26. protocolture ◴[] No.45089540[source]
>It doesn't work. Everything from banks to Netflix and others are slowly edging out anything where they can't fully verify the chain of control to an entity they can have a legal or contractual relationship with.

Theres nothing stopping a hardware vendor from being able to delete the system installed keys/certificates, breaking trust to allow you to install your own. Sure netflix might not like it but you still have the right to run your own code and netflix has the right not to trust your OS.

>Governments shouldn't be able to prevent me from end to end encrypting things.

Agreed.

27. vbezhenar ◴[] No.45089544{3}[source]
> What if I want to require (for anti-piracy reasons) that to use my software you must also give me complete access to your computer, all the data on it, and all your communications.

That's exactly what happens with anti-cheat kernel modules. As one might expect, ordinary people couldn't care less, as long as it works good enough.

replies(1): >>45090043 #
28. nuker ◴[] No.45089546[source]
> My parents are getting old and they aren't tech savvy. The missing piece here is that I want my parents to have a computer they can safely do their banking on, without leaving them vulnerable to scams and viruses and the like.

Purists always forget this point :) What is best for 99% of people.

And dumb Euro bureaucrats.

replies(2): >>45089578 #>>45089706 #
29. OmarAssadi ◴[] No.45089547{6}[source]
I mean, I agree that you should be able to avoid things like Netflix and make use of libraries and other archives, but that's sort of the point; there is a ton of media that never even gets a physical release anymore; once one of these platforms goes under, or something enters licensing hell, or whatever else and gets removed, all you can do is hope someone out there with both the know-how and access went out of their way to illegally download a copy, illegally decrypt it, and illegally upload it somewhere.

I say "know-how" and "access" because, while I'd still argue decrypting, say, Widevine L3 is not exactly super common knowledge, decrypting things like 4K Netflix content, among other things, generally requires you to have something like a Widevine L1 CDM from one of the Netflix-approved devices, which typically sits in those hardware trusted execution environments, so you need an active valuable exploit or insider leaks from someone at one of the manufacturers.

But also on top of all of that, you also need to hope other people kept the upload alive by the time you decide to access it, and then you also often need to have access to various semi-elitist private trackers to consistently be able to even find some of this stuff.

The legal issues with DRM here are hardly exclusive to Netflix and other streaming services, but at least in the case of things like Blu-rays or whatever — even if it is technically illegal in most countries to actually make use of virtually any backed-up disc due to AACS — you usually don't have the same time-pressure problem nor the significant technical expertise barrier.

>If streaming services like Netflix are harmful then we should avoid using them. Thus it should not be important for our freedom-preserving computers to be able to access Netflix.

I generally do avoid them whenever possible, though, yes. And I've explicitly disabled DRM support in Firefox on my computer. But I am just one person and I don't think my behavior reflects the average person, for better or for worse.

replies(1): >>45095938 #
30. bruce511 ◴[] No.45089551{3}[source]
Forgive me, but is Netflix asking for that?

As I understand it, Netflix wishes to authenticate the device, and DRM their content. I'm not aware of anything beyond that (but I'm also not paying attention. )

Now you may have used the example of what might happen, but then Netfix seems a strange example. Surely Apple and/or Google are more likely players in that example?

replies(1): >>45089968 #
31. nine_k ◴[] No.45089552{3}[source]
It's hard to enforce, and not dangerous enough. Accessing something serious from this unapproved code is the opposite, and is being locked down. Try running your own code on your phone's baseband processor, or boot your own OS with Secure Boot on.
32. nine_k ◴[] No.45089575{3}[source]
Open-source software permeates the Internet infrastructure. Netflix is one of the biggest contributors to FreeBSD code. Tons of TVs run OSS-based stack.

But once it touches the money-extraction path, like DRM, things expectedly lock up.

33. ozgrakkurt ◴[] No.45089576[source]
What are the stats here, this sounds like pure bs to be honest.

Main way people around me get scammed by far like 90% is social engineering

replies(2): >>45089718 #>>45094965 #
34. quaintdev ◴[] No.45089578{3}[source]
Why not give people the freedom to choose what they want
replies(1): >>45089586 #
35. nuker ◴[] No.45089586{4}[source]
It will be exploited. Key word above - not tech savvy.

The only reason we have convenient banking, gov and streaming apps today is because of guaranteed and enforced mobile security by big boys Apple and Google. (Google being Ad company is another matter, not relevant here).

replies(6): >>45089699 #>>45089714 #>>45089945 #>>45090006 #>>45090178 #>>45093541 #
36. spaqin ◴[] No.45089598[source]
Your parents are more likely to be a victim of a phone call scam than malware, even on PC. There is also no guarantee that malware will not slip through cracks of official stores or signatures.

You can also choose to do your banking at the physical branch.

We already had "best of both worlds", especially on mobile OSes - granular permissions per-app were quite good, and on Android until few years ago root was widely available if you needed it as well; these permissions could be locked or frozen if there is concern about users, just like work devices are provisioned with limitations. It all depends on your threat model.

replies(5): >>45089779 #>>45089876 #>>45089927 #>>45090044 #>>45090132 #
37. extraisland ◴[] No.45089602[source]
Everything in life is about trade-offs. Certain trade-offs people aren't going to make.

- If you want to run an alternative operating system, you got to learn how it works. That is a trade off not even many tech savvy people want to make.

- There is a trade-off with a desktop OS. I actually like the fact that it isn't super sand-boxed and locked down. I am willing to trade security & safety for control.

> Personally I think we need to start making computers that provide the best of both worlds. I want much more control over what code can do on my computer. I also want programs to be able to run in a safe, sandboxed way. But I should be the one in charge of that sandbox. Not Google. Definitely not Apple. But there's currently no desktop environment that provides that ability.

The market and demand for that is low.

BTW. This does exist with Qubes OS already. However there are a bunch of trade-offs that most people are unlikely to want to make.

https://www.qubes-os.org/

replies(5): >>45089940 #>>45090318 #>>45090562 #>>45090759 #>>45091309 #
38. sim7c00 ◴[] No.45089643[source]
most reason OSes are insecure is bexause they are designed badly regarding security. they are from a time it wasnt important and most ways of building them also from that same era. its hardly modernized -_-. sure its not the same OS as 20 years back,... it has a lot of layers of junk ontop.

again, no incentive to improve it. its either unpaid work or the OS vendor has a stake in it being insecure. (both exists)

39. tonyhart7 ◴[] No.45089662{3}[source]
well no one to force you to do banking from smartphones

You can do manually like the old days, EXPLICTLY ALLOWING NON GOOGLE/APPLE to do banking in their own mobile phone meaning THERE ARE MILLIONS OF USERS that can fall victim to scammer+cracker

how cant you see all of that???? ITS JUST NOT ABOUT YOU

edit: please educate first, y'all need to know differences between mobile banking and internet banking

You can downvote me all you want, but I don't want to hear lecture from non-security compliant engineer about what to do about security

replies(2): >>45089720 #>>45089772 #
40. matheusmoreira ◴[] No.45089671[source]
> Everything from banks to Netflix and others are slowly edging out anything where they can't fully verify the chain of control to an entity they can have a legal or contractual relationship with.

We need to make that illegal. Classify it as discrimination. They should be obligated to treat any client that tries to connect the same as they would treat their own software. Anything else is illegal discrimination against users, a crime comparable to racial discrimination.

Anything short of this means they've won. Everything the word "hacker" ever stood for will be destroyed. Throw all FOSS into the trash. None of it matters anymore. What's the point of free software that we can't run? That can't actually do anything useful because it fails remote attestation? Completely useless.

41. matheusmoreira ◴[] No.45089690[source]
> think of the elderly

This stuff is not just for the elderly and computer illiterate. It's for you as well. You think they're going to stop?

You're giving up freedom for safety. You will have neither.

replies(1): >>45089976 #
42. fr4nkr ◴[] No.45089699{5}[source]
No, we have convenient online services in spite of the endless security theater that permeates consumer tech. All it's done is gradually increase maintenance burden and technical complexity until useful features are slowly stripped out to create a more "streamlined" experience. The mobile app for my credit union has become so shitty that I'm not even sure if losing access to it is a deal-breaker for rooting my phone - I already prefer to do my online banking and shopping on my laptop.

There is no "just works" technical solution for a problem caused mainly by naivete and gullibility. Governments and the private sector know this, of course; as others have said, the real purpose is to control users, not to protect them.

replies(1): >>45089854 #
43. necovek ◴[] No.45089706{3}[source]
That's what can be achieved by encapsulation/containerization of apps: a la flatpak, snaps, docker or VMs...

I found my parents to install random crappy adware apps from official stores too. What protects their banking application is granular permissions, not root access.

44. altairprime ◴[] No.45089713[source]
There’s a scenario where this does work: you can install any operating system on the hardware you own, if you complete a “erase all content and settings” dire scary confirmation screen.

- If you want to run something other than iPadOS or Google TV, go for it. (Smart TVs are just tablets with a don’t-touch screen.)

- If you want to install spyware on someone’s phone, you can’t; the HSM keys held by their OS are lost when you try to install a patched version and restore from a backup, and their backup doesn’t restore properly because half of it depends on the HSM or the cloud and everything is tagged with the old OS’s signature.

- If you want to patch macOS and then deploy it to your fleet, you can; it won’t be Signed By Apple but you’re an enterprise and don’t care about the small losses of functionality from that.

- If you want to dual boot, go ahead; the issues with the HSMs not permitting you to host two OSes worth of partitioned keystones can be resolved by regulatory pressure.

This satisfies all the terms of “let me install whatever I want”, while allowing the OG App Store to continue operating in Safe Mode for everyday users in a way that can’t be entrapped without the scammer on the phone telling them to delete everything, which destroys the data the scammer wants.

My car already allows me to do this. My phone should too.

replies(2): >>45089865 #>>45090804 #
45. necovek ◴[] No.45089714{5}[source]
They all existed before mobile apps on systems you don't control became prevalent.

This was just useful for them.

46. DataDynamo ◴[] No.45089718{3}[source]
It will need just one more additional authentication factor and blocking side loading apps on Android - We promise, total security is close! /s
replies(2): >>45090058 #>>45091328 #
47. onion2k ◴[] No.45089720{4}[source]
Locking down a website to only be available to users on Apple and Windows doesn't make it safer. It just reduces the cost of building it because you don't have to bother testing it on any other platforms. Rather than tell users "Danger, we haven't tested your choice of OS" companies prefer to lock it down.

Users on Apple and Windows are not safer because a bank has chosen to block Linux.

replies(1): >>45089844 #
48. 2rsf ◴[] No.45089739{3}[source]
I mentioned that in another thread, but banks have a legal obligation to to assess and mitigate risks in the service they give to you- you, personally, might be tech savvy enough to understand what you are doing but most people are not and the bank is held accountable when something bad happens.

This is why they limit service to certain devices or OS versions, even when it comes at the expense of convenience.

replies(2): >>45089792 #>>45096703 #
49. makeitdouble ◴[] No.45089741{6}[source]
The whole notion of DRM and penalties if you circumvent it comes from the entertainment industry, and it's written into law/official treaties. This already affects everything from secure boot to HDMI standards.
50. 999900000999 ◴[] No.45089745[source]
As is Android has support for multi user more.

Get some real sandboxing, let me install whatever I want in my sandbox.

That's a bare minimum.

I also want "I am an adult" mode where I get to do what I want. If Google wants to flag secure net, fine. Not every thing is going to work.

replies(1): >>45092361 #
51. hdgvhicv ◴[] No.45089772{4}[source]
My bank lets me do everything just fine on Firefox/linux.
replies(2): >>45089829 #>>45090082 #
52. beeflet ◴[] No.45089774[source]
Maybe we must find individual solutions to each controlling application? Replace netflix with bittorrent, replace banks with bitcoin, etc?
53. Rohansi ◴[] No.45089779{3}[source]
Also the good old phishing emails/links. So many people are simply unaware when a website is pretending to look like an app/floating window. Even younger people who you'd hope know better are falling for it today. I work on a PC game and players (mostly young adults) are constantly getting their accounts compromised by the same phishing sites that pop up monthly.

AI voice and video cloning scams are also only going to increase. Why would scammers need to get people to install random APKs when they can just impersonate a family member and tell them what to give directly?

To me it seems very much like the classic "think of the children" type argument. It's not going to really fix anything in the end but it will benefit Google.

54. rblatz ◴[] No.45089782[source]
Netflix is right in its prime right now, K-Pop Demon Hunters is a smash hit and probably the biggest cultural thing going on right now, it has like 4 songs from it in the top 10. Wednesday is coming back this weekfor the end of season 2. Stranger Things is wrapping up in November,
replies(2): >>45089888 #>>45090255 #
55. beeflet ◴[] No.45089792{4}[source]
Perhaps the solution then is to invent a new bank that is more resistant to regulation and gives users more freedom to secure their own funds.
56. p0w3n3d ◴[] No.45089807[source]
I agree with your point. And meanwhile in Korea (according to article I've read) to use any bank's website you have to install a spy software in your PC. It looks like every major service vendor is organising a crawling subversion against their users and they really count we won't notice.

One of the articles: https://palant.info/2023/01/02/south-koreas-online-security-...

57. cryptonector ◴[] No.45089822[source]
There is also the possibility that without a [paid] curator (the vendor, like Google or Apple) we can't have security for how do we ascertain provenance? You might not buy that argument, but the vendor will make it, and it will resonate with the public and/or the politicians.

Establishing trust with hardware, firmware, and operating system software is currently an intractable problem. Besides the halting problem and the reflections on trusting trust problem (i.e., supply chain problems) the sheer size of these codebases and object code (since you'll need to confirm that the object code is not altered as in the reflections on trusting trust paper) is just too big for the public to be able to understand it. Sure, maybe we could use AI to review all of this, but... that's expensive if every person has to do it, and... that's got a bootstrapping problem.

Basically the walled garden is unlikely to go away anytime soon. It would be easier to change the rules politically to do things like reduce transaction fees, but truly allowing the wide public to run anything they want seems difficult not just politically but technically, because the technical problems will lead to political ones.

replies(2): >>45089995 #>>45090458 #
58. tonyhart7 ◴[] No.45089829{5}[source]
its not mobile banking if you use browser

its just browser/internet banking

also mobile banking has much more capabilites in forms of app than just "web page"

59. nuker ◴[] No.45089854{6}[source]
> No, we have convenient online services in spite of the endless security theater that permeates consumer tech.

Disagree. No banking app can resist root access owned by attacker.

replies(1): >>45090073 #
60. bee_rider ◴[] No.45089863[source]
I wouldn’t be totally opposed to having some sort of totally locked down device that I was just used for banking. The bank could even sell them or give them away with the account (doesn’t need high performance).

Another though; if we were actually able to pass laws that helped people, one that I’d like to see would be: for a totally locked down proprietary device, everything done with it should be the legal liability of the vendor. If your bank account gets broken into via the device, you can’t audit what happened, you couldn’t have have broken it, so it ought to be their responsibility.

replies(1): >>45090126 #
61. Rohansi ◴[] No.45089865[source]
> My car already allows me to do this. My phone should too.

If you're referring to CarPlay and/or Android Auto you should know that it's not actually running on your car. It's basically RDPing your phone onto your car screen. You can already install RDP apps on your phone and connect to systems that provide more freedom, of course.

replies(1): >>45094130 #
62. rahkiin ◴[] No.45089876{3}[source]
In the netherlands we do not have physical branches anymore. They died out. All banking started to go through browser. This was very sensitive to malware and viruses, so two-factor was added through phones. Then less and less people had PCs because phone provides enough. Now mobile apps for banking is the only way to do banking. Or it is required for MFA. Even if you’re calling with the bank it is used as MFA
replies(4): >>45090113 #>>45090136 #>>45090149 #>>45090407 #
63. realusername ◴[] No.45089884[source]
Well no, if your parents truly are tech illiterate, I would give them Ubuntu and not an iPhone.

With the iPhone they get the risk of answering to a scam call or scam sms and giving them the access of their bank account.

Ubuntu is almost bullet proof for beginners.

In fact, that's what I've done for my parents and I had to retire the computer and get another one because it's the hardware which became too old after 15 years of running Ubuntu without any problem.

Security for users isn't just about bootloader expoits.

replies(1): >>45089929 #
64. 000ooo000 ◴[] No.45089888{3}[source]
Odd to hear for me. Netflix Australia has been in steep decline for years now. The only shows I recognise by title or actors in the poster are 15+ years old, or are adorned with 'Leaving Soon'. Everything of value has been poached by a competitor.
replies(1): >>45089996 #
65. Silhouette ◴[] No.45089898[source]
This is ultimately a form of collusion and anti-competitive behaviour - practices that we prohibit in other scenarios because we consider them harmful to our society. It's obvious why some large organisations would like more control over our lives. It's not obvious why we should let them have it.

Unfortunately for now it seems our representatives are letting them have it so personally I'm rooting for a snake-eating-its-tail moment as a result of Windows 10 losing support. There will inevitably be erosion of security and support for applications on Windows 10 once Microsoft declares it yesterday's OS - as we've seen with past versions of Windows. This time there is the added complication that a lot of perfectly good hardware can't run Windows 11 - largely because of the TPM/verification issue we're discussing.

So probably a lot of people who haven't moved to 11 yet aren't going to unless their current computer breaks and they get 11 by default when they buy a replacement. If the charts are correct then 11 only recently overtook 10 in user numbers. After all this time and despite all the pressure from Microsoft and the imminent EOL of Windows 10 over 40% of Windows users are still running that version. (https://gs.statcounter.com/os-version-market-share/windows/d...) So how exactly do the big organisations that want to control the client plan to deal with that over the next few years?

Unfortunately unless there is also some sort of intervention to deal with the collusion and market manipulation by vested interests I doubt enough Windows 10 refugees will jump to open platforms when their current devices fail for those open platforms to reach a critical mass of users. If five years from now Windows 10 user levels are negligible and almost all of the former users are now on Windows 11+ by default then the controlled client side probably wins effectively forever. I think it would take something dramatic happening that increased the desktop market share of open alternatives like Linux to say 10+% to avoid this fate. The only likely source of that drama I can see is if Valve's support for gaming on Linux encourages significant numbers of home users to switch and then general public awareness that you don't have to run Windows or macOS increases.

66. ◴[] No.45089923[source]
67. Someone ◴[] No.45089927{3}[source]
> You can also choose to do your banking at the physical branch

The ones banks that do have physical presence are closing left and right? Also, I don’t think I can money transfers at the physical office of my bank.

replies(1): >>45092336 #
68. Silhouette ◴[] No.45089928[source]
You could just not watch Netflix.

The digital hermit argument is not going to resonate with 99.9% of users. People buy devices because they want to do stuff. Telling them they shouldn't do what they want to do is never going to convince anyone.

The real question is where are the representatives who are supposed to be acting in the interests of their people while all this is happening? We seem to have regulatory capture on a global scale now where there isn't really anyone in government even making the case that all these consumer-hostile practices should be disrupted. They apparently recognize the economic argument that big business makes big bucks but completely ignore the eroding value of technology to our quality of life.

69. charcircuit ◴[] No.45089929{3}[source]
Like the parent said Ubuntu has horrible security. It would be better to just not buy a phone line for the iphone if you don't want phone calls or texts.
replies(1): >>45089955 #
70. tonyhart7 ◴[] No.45089940{3}[source]
exactly, people want all the benefit without the consequences

like if there are OS utopia exist that has all the advantage without the downside then everybody would use that

but people complaining don't live in reality

replies(1): >>45090166 #
71. extraisland ◴[] No.45089945{5}[source]
All of these existed well before mobile phones and so called "enforced security". Almost all these apps are wrappers around web functionality.
72. realusername ◴[] No.45089955{4}[source]
It hasn't, security isn't just technical features but a social contract.

Even on an iPhone without a sim card, they can download one of the scam casino games from the appstore and give away a lot of money, on Ubuntu they can't do that.

There's more to security than just bytes.

The threats to your average user isn't a bootloader exploit built by some Israeli firm but privacy breaches, social engineering and scams.

replies(1): >>45090033 #
73. GeoAtreides ◴[] No.45089968{4}[source]
> Now you may have used the example of what might happen,

OP said "What if", it's clearly a hypothetical scenario and not something Netflix is doing or planning to do

74. safety1st ◴[] No.45089969[source]
I'm going to get wild-eyed now but you can blame Google for that as they're the ones who just announced they'll retroactively ban me from installing software on the computer I bought and own.

I don't think you can really solve this problem as long as there's an operating system monopoly, or even duopoly/triopoly. The lure of total control is just too great. Every operating system vendor, hell every intellectual property vendor will always dream of it. A company that becomes powerful enough to put chains on its users will do so.

From the British Raj to Standard Oil to IBM and Microsoft, monopolies are some of the most powerful forces in history. There is a case to be made that we were on a similar path with Microsoft until a combination of the Internet and a half-assed but not completely ineffective anti-trust campaign made them hit the brakes, for a while.

I think that the solution is to highlight the abuses perpetrated by the biggest tech giants specifically, and advocate for radical government action on multiple levels. #1 to break up these companies. #2, to shackle them and anyone who gets as large as them so that they can't do anything like this again. #3, publicly fund the development of competing, open operating systems.

If you are a US citizen then #1 and #2 are the more realistic paths and you should be watching the various anti-trust cases against Big Tech like a hawk, the celebrity du jour is really Amit Mehta who is scheduled to release his Google remedies any day now. You need to make it clear to your representatives that this is your top issue at the ballot box. We need a second American Progressive Era that's seasoned with digital rights and anti-megacorp sentiment and with "doomscroll" and "Luigi" having entered the vernacular I think we could be closer than many here believe.

If you are an EU or Chinese citizen you should support the development and adoption in those polities of alternative, Linux-based operating systems. In the way the South Korean government specifically encouraged the growth of Samsung into a company with a global footprint, you should do that for local companies which develop OSes that compete with Apple and Google's. These geographies fundamentally can't do much to influence the American legal system so they should instead lean into public sentiment around nationalism and sovereignty and tie these to software freedom because that is likely the only elemental, emotional force that will capture enough public attention and support. Use state-scale resources to create competition for the American tech giants and establish a balance of power, because they are assuredly your enemies at this point.

And lastly for the ten millionth time I'll say it - Stallman predicted this. He saw it all coming. He warned us. He told us what would happen and what we needed to do. It's time to listen and to think big.

replies(3): >>45090009 #>>45090373 #>>45093094 #
75. reddalo ◴[] No.45089975[source]
> as soon as passkeys started popping up the endgame became clear

That's why I'm 100% against passkeys. I'll never use them and I'll make sure nobody I know does.

They're just a lock-in mechanism.

replies(3): >>45090207 #>>45090270 #>>45090402 #
76. josephg ◴[] No.45089976{3}[source]
> It's for you as well. You think they're going to stop?

No! Which is why I don't want every npm package I install to have unfettered access to my internet connection and to access all my files. If this is being exploited now, I might not even know! How sloppy is that!

> You're giving up freedom for safety.

At the limit, sure, maybe there are tradeoffs between freedom and security. But there's lots of technical solutions that we could build right now that give a lot more safety without losing any freedom at all.

Like sandboxing applications by default. Applications should by default run on my computer with the same permissions as a browser tab. Occasionally applications need more access than that. But that should require explicit privilege escalation rather than being granted to all programs by default. (Why do I need to trust that spotify and davinci resolve won't install keyloggers on my computer? Our computers are so insecure!)

Personally I'd like to see all access to the OS happen through a capability model. This would require changes in the OS and in programming languages. But the upside is it would mean we could fearlessly install software. And if you do it right, even `npm install` could be entirely safe. Here's how we do it: First, all syscalls need to pass unforgable capability tokens. (Eg SeL4). No more "stringy" syscalls. For safe 3rd party dependencies, inside processes we first make an "application capability" that is passed to main(). 3rd party libraries don't get access to any OS objects at all by default. But - if you want to use a 3rd party library to do something (like talk to redis), your program crafts a capability token with access to that specific thing and then passes it to the library as an argument.

Bad:

    // Stringy API. Redis client can do anything.
    redisClient.connect("127.0.0.1", 6379)
Good:

    redisConnCap = systemCap.narrow(TCPConnect, "127.0.0.1", 6379)
    redisClient.connect(redisConnCap)
This way, the redis library can only make outgoing connections on the specified TCP port. Everything else - including the filesystem - is off limits to this library.

This would require some PL level changes too. Like, it wouldn't be secure if libraries can access arbitrary memory within your process. In a language like rust we'd need to limit unsafe code. (And maybe other stuff?). In GC languages like C# and javascript its easier - though we might need to tweak the standard libraries. And ban (or sandbox) native modules like napi and cgo.

replies(3): >>45090115 #>>45090658 #>>45118021 #
77. estebarb ◴[] No.45089995[source]
Not really. Many countries emit digital signatures that could be used to prove that someone signed something. We would just need to convince countries to use that same infra for companies. So it may be possible to require everything to be properly signed, without requiring everyone to be bound to certain company wishes.
78. reddalo ◴[] No.45089996{4}[source]
It's the same situation in Italy. Netflix doesn't have any interesting content anymore, only their own originals.
79. beeflet ◴[] No.45090006{5}[source]
Really? They couldn't just use a website?
80. edg5000 ◴[] No.45090009[source]
Well said!
81. MangoToupe ◴[] No.45090023{6}[source]
Which part of what I said do you think hasn't already happened and metastasized?
replies(1): >>45100128 #
82. josephg ◴[] No.45090033{5}[source]
Sure; but technical features can certainly make security better.

Like, iOS makes most unsafe actions incredibly clear. Apple pay always requires the user to double tap the power button. The OS makes it impossible for an application to charge you money through apple pay without an explicit user action.

Phone apps also can't take control of my entire device, or steal my cookies or cryptolocker my hard drive. Any program you download and run from the internet on a desktop computer can do all of this stuff and more. We shouldn't allow that stuff by default on desktop computers either.

Phones have the right idea. I just don't want Apple and Google to be the only ones who can modify the system at the OS level.

replies(2): >>45090087 #>>45157061 #
83. estebarb ◴[] No.45090043{4}[source]
Except that... we have history of them not working well. For instance, the Sony rootkit https://en.m.wikipedia.org/wiki/Sony_BMG_copy_protection_roo...

We cannot expect those rootkits to be properly supported long term for any security issues they may cause. I would think that the solution is simple: nobody forces them to make their IP available in non hacked computers...

If they want a hardened computer to deliver their IP, then they should sell their own hardware. But forcing their blocking into the whole stack is not acceptable.

For instance: I cannot see any udemy or netflix content from my computer, because their IP protection blocks the lenovo docking station I use to connect my monitors to my MBP... each part is standard! And somehow nobody tested that scenario. So, no, that tech is barely tested, it must not be forced into any computer.

84. itake ◴[] No.45090044{3}[source]
Phone scams have you install malware. Banks don’t know if you’re on the phone with the scammer, but they would like to detect if you’re using a screen sharing app on the password or transfer screens.
85. josephg ◴[] No.45090058{4}[source]
I don't think we'll ever have total security. But we still put locks on our doors and send our internet traffic through TLS.

All or nothing thinking is counterproductive.

86. trinix912 ◴[] No.45090066{6}[source]
Until they decide to force you to use the mobile app as a 2FA for the website. My bank did that, I literally had to buy a new phone because the old one couldn't update their stupid app. It locks you in to the latest N versions of Android/iOS.

Before you ask, no, other banks aren't any better where I live. They all stopped using physical 2FA keys years ago. And no, they won't let you come in physically for things that can be done online.

replies(1): >>45091923 #
87. donkeybeer ◴[] No.45090073{7}[source]
Why is the banking server trusting the client? Thats criminally incompetent security. If your website gets hacked because a client had "root" whose fault is it?
replies(1): >>45090876 #
88. lentil_soup ◴[] No.45090077[source]
But you can choose, your parents can have a phone with the "lockdown" setting turned on and I can have it off if I want. How we expose and handle that setting is a UX problem we can solve.

What's wrong with that?

replies(1): >>45092187 #
89. trinix912 ◴[] No.45090082{5}[source]
For now, until they come up with some stupid 2FA solution that requires installing and updating their Android/iOS app. Banks where I live already have and there's literally no way around it (they don't use physical 2FA keys anymore).
90. realusername ◴[] No.45090087{6}[source]
Double taping to pay is actually making things worse for tech illiterate users. There's a lot of scam games on the appstore and it's way to easy to fall into it if they aren't too careful.

And then no, it's not clear for me (even as a developer!) how data transfer between apps work, how the advertising id works and how much data Apple and Google really have that they shouldn't. If it's not clear to me as a software engineer, it certainly isn't for your average user.

The browser is just a much easier mental model, especially that I can install an ad blocker on it to make them safer, which I can't on mobile apps.

> Phone apps also can't take control of my entire device, or steal my cookies or cryptolocker my hard drive.

It never happened once with my parents in 15 years of running Ubuntu. Even if that stuff somehow existed, I don't think they would have the tech knowledge to mark the downloaded virus as executable anyways.

replies(1): >>45090169 #
91. cess11 ◴[] No.45090089[source]
Right, so "defend" does a lot of lifting in there.

What are you prepared to do to reverse the contemporary tide of tyranny? What have you done to make those in power afraid to move forward with policy founded in loathing of humanity?

92. vrighter ◴[] No.45090112[source]
All this will do is ensure that if malware does get through the official channels (which it can and regularly does) it will be more widely distributed
replies(1): >>45090151 #
93. AndyMcConachie ◴[] No.45090113{4}[source]
I still do banking through a random reader at ABN AMRO. I really hope they never get rid of it because I trust that little dumb plastic device 1000% more than my phone.
replies(2): >>45090476 #>>45091212 #
94. extraisland ◴[] No.45090115{4}[source]
> At the limit, sure, maybe there are tradeoffs between freedom and security. But there's lots of technical solutions that we could build right now that give a lot more safety without losing any freedom at all.

Everything you have suggested in this post takes away freedom. There is no solution that doesn't take away freedom / your control. There is always a trade off.

> Like sandboxing applications by default. Applications should by default run on my computer with the same permissions as a browser tab. Occasionally applications need more access than that. But that should require explicit privilege escalation rather than being granted to all programs by default. (Why do I need to trust that spotify and davinci resolve won't install keyloggers on my computer? Our computers are so insecure!)

This already exists on Linux.

I run Discord/Slack in Flatpak. Out of the box the folders and clipboard permissions are restricted. Only the ~/Downloads folder on my PC is accessible to Discord/Slack. You can't drag and drop things into these apps. Which makes sharing content a PITA.

If you don't want to worry about things like keyloggers, you should run an open source OS and use open source programs where you can verify that there are no key loggers. You should also make sure you find out what firmware your keyboard is using (many keyboards themselves have complex micro controllers on them that can be programmed).

replies(1): >>45090196 #
95. akvadrako ◴[] No.45090126[source]
That's basically how it used to work. Before the app my bank required the use of a card and QR reader with a screen that could authorize transactions
96. AndyMcConachie ◴[] No.45090128[source]
The answer to this is a physical switch on the machine that enables/disables hackability.
97. josephg ◴[] No.45090132{3}[source]
> Your parents are more likely to be a victim of a phone call scam than malware, even on PC. There is also no guarantee that malware will not slip through cracks of official stores or signatures.

So what? The lack of perfect security is a terrible argument against better security.

For example, lockpicks exist. Is that a reason to stop locking your house? Our TLS ciphers might eventually be broken. Should we throw away TLS and go back to unencrypted HTTP?

I'm not expecting anything to 100% stop all scams. But modern computer security is a joke. We could do an awful lot better than we are today at keeping people safe from this stuff.

> We already had "best of both worlds", especially on mobile OSes - granular permissions per-app were quite good, and on Android until few years ago root was widely available if you needed it as well

Yes. I want something like this on desktop too - but I want to own the signing keys, of course. It seems strange that this is so controversial.

replies(3): >>45091790 #>>45091815 #>>45093464 #
98. ACS_Solver ◴[] No.45090136{4}[source]
Same in Sweden, physical bank branches are rare and even they will often require an appointment. All banking is through bank apps or websites, and you use 2FA extensively. Sweden's digital ID system is called BankID because it was made by banks and, initially, for banking, though now BankID is used extensively for all kinds of government and private services.

That doesn't stop scammers. They also keep getting more sophisticated, often using a combination of social engineering and technical skill, and they keep tricking people into giving them money. So unfortunately, while malware is pretty much a non-factor, scammers still thrive.

replies(1): >>45092316 #
99. bbarnett ◴[] No.45090149{4}[source]
So far in Canada... I must reiterate this, so far, this can and has been fought by one thing. Rural life, and nationalism.

There are plenty of places where mobile phones don't work, especially in the summer when there are leaves on the trees. This means SMS won't really work. So for this path, SMS, the bank has an alternative -- call a number on your account with a voice reading the 2FA code. Thus, landlines or VOIP work here.

When it comes to an app, forcing Canadians to use a phone OS controlled by US companies, still has pushback. An example being, the concept of "A Canadian having to use software from a US company, to identify themselves to a Canadian company" is still a hotspot. Especially with the US wanting to annex us.

So this lock in has not yet occurred.

Really, the phone call to a phone number on your account, not using SMS is as solid a protection, as an app running on a phone controlled by a foreign country's company. It's an alternate path. And it solves the whole 'rural person' access.

Many people living in rural areas don't even bother with a phone type device. Some have Kindles. But by buy a phone, if it doesn't work where you live?

This logic, combined with them closing rural banks, means they have to be quite sensitive here. EG, closing rural banks, then making it difficult to do online banking is political poison for our banks.

100. josephg ◴[] No.45090151{3}[source]
Security doesn't need to be 100% effective to add value. The more hoops we make scammers jump through, the fewer people will end up getting scammed.

I know angle grinders exist. I still lock up my bike.

replies(1): >>45090496 #
101. extraisland ◴[] No.45090166{4}[source]
A lot of it already exists in one form or another and the trade-off for sand-boxing is usability a lot of the time.

It isn't even a freedom vs security. It is usability vs security.

replies(1): >>45090233 #
102. josephg ◴[] No.45090169{7}[source]
> The browser is just a much easier mental model, especially that I can install an ad blocker on it to make them safer, which I can't on mobile apps.

I'd like that security model to be the default for desktop apps on my computer as well. Its weird that davinci resolve and spotify and all the rest have full access to look through all my files.

> It never happened once with my parents in 15 years of running Ubuntu.

Probably just because so few regular people use ubuntu, scammers & malware authors don't bother targeting it. Still good for your parents though!

replies(1): >>45090628 #
103. _Algernon_ ◴[] No.45090178{5}[source]
We've literally had convenient online banking for two decades at this point without any DRM.

Don't rewrite history.

104. josephg ◴[] No.45090196{5}[source]
> Everything you have suggested in this post takes away freedom. There is no solution that doesn't take away freedom / your control. There is always a trade off.

Huh? In what way does application sandboxing take away my freedom? What can I do today that I can't do with a sandbox-everything-by-default model?

In my mind, it gives me (the user) more freedom because I can run any program I want without fear.

> I run Discord/Slack in Flatpak. Out of the box the folders and clipboard permissions are restricted. Only the ~/Downloads folder on my PC is accessible to Discord/Slack. You can't drag and drop things into these apps. Which makes sharing content a PITA.

Cool! Yeah this is the sort of thing I want to see more of. The drag & drop problem is technically solvable - it just sounds like they haven't solved it yet. (Capabilities would be a great solution for this.. just sayin!)

replies(1): >>45090296 #
105. kleiba ◴[] No.45090207{3}[source]
For someone who hasn't spent any time thinking about that matter, could you please elaborate your point?
replies(2): >>45090297 #>>45090312 #
106. josephg ◴[] No.45090233{5}[source]
> It is usability vs security.

I think a lot of it is "nobody has bothered building it yet" vs security.

Eg Qubes runs everything in Xen isolates - which is a wildly complex, performance limiting way to do sandboxing on modern computers. There are much better ways to implement sandboxing that don't limit performance or communication between applications. For example SeL4's OS level capability model. SeL4 still allows arbitrary IPC / shared memory between processes. Or Solaris / Illumos's Zones. But that route would unfortunately require rewriting / changing most modern software.

replies(1): >>45090359 #
107. ◴[] No.45090253{3}[source]
108. gardenhedge ◴[] No.45090255{3}[source]
Any other examples? None of those scream prime to me - however I haven't heard of kpop demon hunters
replies(2): >>45090519 #>>45110661 #
109. lucideer ◴[] No.45090270{3}[source]
"Passkeys" is a new brand name slapped on an older open, interoperable technology, so it's difficult for me to be "against passkeys" as they haven't fundamentally changed anything.

Before the branding they were known as FIDO2 "discoverable credentials" or "resident keys".

Two things have changed with the rebrand:

1. A lot of platforms are adopting support for FIDO2 resident keys. This is good actually.

2. A lot of large companies have set themselves up as providers of FIDO2 resident keys without export or migration mechanisms. This is the vendor lock-in part (no export feature), but it's not a feature of the underlying tech itself.

Fwiw FIDO are actively working on some standard for exporting/importing keys so that's something.

If you want to use passkeys without lockin, just use Bitwarden or KeepPassXC - they all have full support. Or you can also store a limited number of passkeys on your FIDO2-compatible hardware key like Yubikey or the open-source Nitrokeys.

replies(3): >>45090466 #>>45090951 #>>45091194 #
110. extraisland ◴[] No.45090296{6}[source]
> Huh? In what way does application sandboxing take away my freedom? What can I do today that I can't do with a sandbox-everything-by-default model?

I've just explained that sand-boxing causes issues with file access, clipboard sharing etc.

Every hoop you add in makes it more difficult for the user to gain back control, even if that is modifying permissions yourself. Most people will just remove permissions out of annoyance.

If you remove control, you remove people's freedom.

> In my mind, it gives me (the user) more freedom because I can run any program I want without fear.

Any security mechanism has a weakness or it will be bypassed by other means. So all this will give you a false sense of security.

The moment you think you are safe. Is when you are most unsafe.

> Cool! Yeah this is the sort of thing I want to see more of. The drag & drop problem is technically solvable - it just sounds like they haven't solved it yet. (Capabilities would be a great solution for this.. just sayin!)

I don't. It is a PITA. Eventually people just turn it off. I did.

The reality is that if you want ultimate security you have to make a trade offs. Pretending you can make some theoretical system where those trade off don't exists just isn't realistic.

replies(3): >>45090463 #>>45090506 #>>45092673 #
111. progval ◴[] No.45090297{4}[source]
"Passkeys are incompatible with open-source software" https://www.smokingonabike.com/2025/01/04/passkey-marketing-...
replies(1): >>45090365 #
112. dingaling ◴[] No.45090312{4}[source]
Imagine using ssh-keygen, but it locks the private key in a vendor-managed secure enclave. You can't copy it, export it, rename it or do anything wth it.
replies(1): >>45090507 #
113. socalgal2 ◴[] No.45090318{3}[source]
AFAICT the only trade off is there's no support and few apps for Qubes OS. If it was as popular as MacOS or Windows what would the trade off be?
replies(1): >>45092352 #
114. euLh7SM5HDFY ◴[] No.45090324[source]
> Everything from banks to Netflix and others

I have unlocked bootloader. That's it, I don't even have enabled root account. One app refuses to work anyway: McDonald’s. I actually can't decide if it is more funny or scary.

replies(1): >>45103036 #
115. extraisland ◴[] No.45090359{6}[source]
> I think a lot of it is "nobody has bothered building it yet" vs security.

All of this takes considerable time, money to build and after that you need to get people to buy into it anyway. Large billion dollar software companies have difficulty doing this. If you think it is so easy, go away and build a proof of concept.

BTW They have implementing sand-boxing in most desktop operating system. It is often a PITA. Phone like permissions model already exist in Windows, Linux and I suspect MacOS in various guises.

For development there are various solutions that already exist.

e.g.

https://code.visualstudio.com/docs/devcontainers/containers

So these things already exist and often people don't use them. The reason for that is that there is usually reduces usability by introducing annoyances.

> Eg Qubes runs everything in Xen isolates - which is a wildly complex, performance limiting way to do sandboxing on modern computers.

It exists though today. If I care about security enough, I am willing to sacrifice performance. That is a trade off that some people are willing to make.

> There are much better ways to implement sandboxing that don't limit performance or communication between applications. For example SeL4's OS level capability model. SeL4 still allows arbitrary IPC / shared memory between processes. Or Solaris / Illumos's Zones. But that route would unfortunately require rewriting / changing most modern software.

If you solution starts with "rewriting most modern software". Then it isn't really a solution.

BTW what you are suggesting is a trade off. You have to trade resources (time and money typically) to build the thing and then you will need to spend more resources to get people to buy into using your tech.

116. fragmede ◴[] No.45090365{5}[source]
Then how come KeePassXC has them?
replies(1): >>45090480 #
117. pjmlp ◴[] No.45090373[source]
Meanwhile FOSDEM and similar conferences are full of people carrying Apple devices, and most folks keep picking non-copyleft licenses instead of dual licensing.

The Stallman generation is slowly leaving this realm, the opportunity has been lost already.

replies(1): >>45098402 #
118. fragmede ◴[] No.45090402{3}[source]
Do you recommend a password manager to everyone you know? What's the adoption rate?
replies(3): >>45090751 #>>45090780 #>>45090786 #
119. CalRobert ◴[] No.45090407{4}[source]
I wouldn't be surprised if it becomes impossible to even use cash in the Netherlands soon enough. The first year I was here I don't think I did even once. I've been using cash a lot more lately just out of principle and it's annoying - lots of pin-only check out lines, etc.
replies(1): >>45091192 #
120. wolvesechoes ◴[] No.45090433[source]
> However all of these things are not technical

You understand it, but even in this thread you have people proposing solutions like switching from traditional banking to bitcoin, stoping using Netflix and starting torrenting again etc.

Tech crowd always tries to solve non-technical problems through technical means, and this is why I don't have much hope.

replies(2): >>45090647 #>>45091049 #
121. StopDisinfo910 ◴[] No.45090458[source]
The digital sovereignty angle will end up quilling the platform lockdown.

There is no way countries agree to have American companies getting so much control on key infrastructures especially in the current context.

122. dvdkon ◴[] No.45090463{7}[source]
You seem to be arguing that adding complexity reduces freedom, but I don't think that's true in a reasonable interpretation of the word.

Your argument would suggest that virtual memory takes away user freedom, because it's now much harder to access hardware or share data between programs, but that sounds ridiculous from a modern perspective. I think it's better to keep freedom and complexity separate, and speak about loss of freedom only when something becomes practically impossible, not just a bit more complex.

replies(1): >>45090607 #
123. breakingcups ◴[] No.45090466{4}[source]
Except the FIDO Alliance is trying to pressure KeepassXC to remove exporting passkeys in an open format: https://github.com/keepassxreboot/keepassxc/issues/10407
replies(3): >>45090617 #>>45090649 #>>45090815 #
124. ted_dunning ◴[] No.45090476{5}[source]
What is a "random reader at ABN AMRO"?
replies(1): >>45090894 #
125. indigo945 ◴[] No.45090480{6}[source]
The linked blog post explains it. The spec can be implemented by open source software, but the upcoming (or now current?) update to the spec enables attestation, that is, it allows the auth provider to cryptographically verify which implementation the client is using. Under this scheme, auth providers can simply choose to no longer support open source implementations like KeePassXC, and since the spec authors have already claimed that KeePassXC is "non-compliant" because it doesn't ask for a PIN on every auth request, it seems likely that that would happen.
replies(2): >>45090540 #>>45090669 #
126. vrighter ◴[] No.45090496{4}[source]
Scams have absolutely nothing to do with anything relevant. Scams happen regardless of whether software is installed in the first place. Social engineering is what most scams are based on. Refusing me banking access because I want to use my phone as a computer brings extra security to nobody.
127. josephg ◴[] No.45090506{7}[source]
> I've just explained that sand-boxing causes issues with file access, clipboard sharing etc.

You've explained that flatpak has issues with file access and clipboard sharing. My iphone does sandboxing too, but the clipboard works just fine on my phone.

I don't think "failing clipboards" is a problem specific to sandboxing. I think its a problem specific to flatpak. (And maybe X11 and so on.)

> If you remove control, you remove people's freedom.

Sandboxing gives users more control. Not less. Even if they use that control to turn off sandboxing, they still have more freedom because they get to decide if sandboxing is enabled or disabled.

Maybe you're trying to say that security often comes with the tradeoff of accessibility? I think thats true! Security often makes things less convenient - for example, password prompts, confirmation dialogue boxes, and so on. But I think the sweet spot for inconvenience is somewhere around the iphone. On the desktop, I want to get asked the first time a program tries to mess with the data of another program. Most programs shouldn't be allowed to do that by default.

> Pretending you can make some theoretical system where those trade off don't exists just isn't realistic.

I think you might be arguing with a strawman. I totally agree with you. I don't think a perfect system exists either. Of course there are tradeoffs - especially at the limit.

But there's still often ways to make things better than they are today. For example, before rust existed, lots of people said you had to make a tradeoff between memory safety and performance. Well, rust showed that by making a really complex language & compiler, you could have memory safety and great performance at the same time. SeL4 shows you can have a high performance microkernel based OS. V8 shows you can have decent performance in a dynamically typed language like JS.

Those are the improvements I'm interested in. Give me capabilities and sandboxing. A lot more security in exchange for maybe a little inconvenience? I'd take that deal.

replies(1): >>45090733 #
128. tadfisher ◴[] No.45090507{5}[source]
I don't just imagine it, I do it, by using gpg-agent as my ssh-agent and using the private key generated by a Yubikey. Another way is to use tpm2-tools so only your laptop running your own signed boot chain can use the key. It is desirable to lock private key material in a physical thing that is hard to steal.

You can choose not to do this, and that's fine. Hardware attestation is dead because Apple refuses to implement it, so no one can force you to.

replies(1): >>45092306 #
129. winter_blue ◴[] No.45090512[source]
We need legislation mandating that all hardware[a] have at least one fully-functional[b] open source driver for any operating system[c]. And that any device with a microprocessor with writable memory permit custom software to be run on it.

[a] whether that's a single device like a fingerprint scanner, or a device like a phone or tablet

[b] no crippled or low-performance open source driver

[c] any OS, including Windows, Mac, Linux, BSD, or some obscure minor OS as long as such OS is readily available for free or for a reasonable price

130. CalRobert ◴[] No.45090519{4}[source]
Maybe it's the marketing? It's on the main home page every time I open it.
131. benrutter ◴[] No.45090536[source]
Joining all the other comments agreeing completely with this take.

I think it's worth adding that this is fundamental enough to not just be a tech issue. There's a strong legal framework in almost all developed companies for regulating companies where acting in their self interest harms the consumer interest. Without which, lots of things we take for granted (electrical safety certification, usb c, splits between serviceand investment banking).

I think the key thing that's missing at the moment is that the types of restrictions OP is mentioning (DRM, blocking encryption) harm both consumer rights and economic development.

That's an argument that needs to come from people knowledgable about both the indistry, and the technology. Like a lot of the people reading this post.

replies(1): >>45090788 #
132. thrance ◴[] No.45090538[source]
You could also not bother with any of it and return to a dumb phone. That's not a solution though.
replies(1): >>45093101 #
133. fragmede ◴[] No.45090540{7}[source]
Yes but it seems like KeyPassXC could just ask for PIN on every auth request to satisfy that requirement, without having to close their source.
replies(1): >>45090756 #
134. acac10 ◴[] No.45090561[source]
> passkeys started popping up the endgame became clear.

This logical leap puzzles me, as it is completely unrelated to HW lock-in and a rather generic medium.

This is more of a case of OP diverting a topic to shove in his pet peeve on technology they don’t like or understand.

135. einpoklum ◴[] No.45090562{3}[source]
> If you want to run an alternative operating system, you got to learn how it works.

The typical user doesn't know how Windows works, and they can run that. These days, users can run a friendly GNU/Linux distribution not knowing how it works. So, disagree with you here.

replies(1): >>45091340 #
136. kdmtctl ◴[] No.45090578[source]
They do not benefit from having control, they risk if they don't. This is fundamental.

I do love freedom but such freedom will come with a disclaimer. You do want to use a bank app unsigned and you do not want the bank to check your latest SIM card replacement. You understand and assess the risk and will not discriminate the bank for any loss occurred. Same with Netflix and piracy.

This is fair.

137. tadfisher ◴[] No.45090592[source]
Ironically, if everyone adopted passkeys (the real deal tied to secure enclaves or TPMs), then Android malware could not steal your credentials through any kind of social engineering.
138. KoolKat23 ◴[] No.45090605[source]
This is where Linux and Apple's centralized repository method shines.

Social engineering is really where the threat is at these days.

139. extraisland ◴[] No.45090607{8}[source]
> You seem to be arguing that adding complexity reduces freedom, but I don't think that's true in a reasonable interpretation of the word

No I am not arguing that at all.

replies(1): >>45091014 #
140. aw1621107 ◴[] No.45090617{5}[source]
> trying to pressure KeepassXC to remove exporting passkeys in an open format

I'm not sure that's an entirely accurate representation of the request? At least from a quick skim the claimed issue is being able to export keys in plaintext. For example, from the issue author:

> I strongly recommend you temporarily disable this feature or at a minimum require file protection/encryption.

And later:

> > Besides, determined advanced users could just write code to decrypt the kdbx file and extract the passkeys anyway.

> That's fine. Let determined people do that, but don't make it easy for a user to be tricked into handing over all of their credentials in clear text.

> I don't quite understand why requiring file protection/encryption can't be a temporary minimum bar here.

To me that doesn't sound like they're requiring a proprietary format. Something like AES encrypted JSON sounds like it'd work as well, and that sounds pretty "open" to me?

replies(1): >>45092301 #
141. realusername ◴[] No.45090628{8}[source]
> I'd like that security model to be the default for desktop apps on my computer as well. Its weird that davinci resolve and spotify and all the rest have full access to look through all my files.

That's how it works on Ubuntu, proprietary apps are usually distributed through snaps which are sandboxed. And unlike on mobile, the OS doesn't have an advertising ID or built-in ad networks.

Normal apps don't need that though because there's a chain of trust which doesn't exist on mobile.

> Probably just because so few regular people use ubuntu, scammers & malware authors don't bother targeting it. Still good for your parents though!

No, it's because the bar on publishing on Ubuntu is much much higher than on an iPhone. Nobody would ever accept those scam casino games on Ubuntu.

replies(2): >>45090794 #>>45090834 #
142. staplers ◴[] No.45090647[source]
Technical solutions and alternatives can provide enough leverage for the common citizen to force the hand of those in power. It might not fully "solve" the issue, but making it easier to route around will always force those in power to bend somewhat.
replies(2): >>45090702 #>>45090713 #
143. tadfisher ◴[] No.45090649{5}[source]
That threat has no teeth; anyone requiring attestation these days will cut out Apple users, because Apple will not implement it (for consumer use cases). If they don't block Apple passkeys, then KeePass can send Apple's AAGUID and the game is over.

I've complained about this GH exchange in the past and have come to understand that Apple is also part of the alliance, and the entire concept of blocking software-only password managers is just dead outside of enterprise situations where they mandate the hardware/software anyway. Mr. Cappalli might disagree, but he and his employer do not have the power to change this without breaking the standard and throwing away over a decade of work.

144. Earw0rm ◴[] No.45090658{4}[source]
IMO what's needed is less per-app sandboxing, and more per-context.

Think user accounts but for task classes.

If I'm doing development work, I want to be able to chain together a Frankenstein of apps, toolchain, API services and so on, with full access to everything else in that specific context.

But that doesn't need visibility of my email, my banking and accounting software should have visibility to/from neither, and random shareware apps, games and movies should run, like you say, with a browser tab level of permission.

Making this work in practice while keeping performance maximised is harder than it sounds, preventing leaks via buffers or timing attacks of one sort or another (if apps can take screenshots, game over).. for now I use user accounts, but this is becoming less convenient as the major desktop OS and browser vendors try to force tying user accounts to a specific online identity.

replies(1): >>45090811 #
145. mike_hearn ◴[] No.45090660[source]
> Any program I run is allowed to silently edit, delete or steal anything I own ... there's currently no desktop environment that provides that ability

Putting aside the philosophical issues, that statement isn't true for a few years now. It's not well known, even in very technical circles like HN, but macOS actually sandboxes every app:

• All apps from outside the app store are always sandboxed to a lesser degree, even if they are old and don't opt-in.

• All apps from outside the app store may opt in to stricter sandboxing for security hardening purposes.

• All apps from the app store are forced to opt-in, must declare their permissions in a fine grained way, and Apple reviews them to make sure they make sense.

To see this is true try downloading a terminal emulator you haven't used before, and then use it to navigate into your Downloads, Photos, Documents etc folders and run "ls". You'll get a permission prompt from the OS telling you the app is requesting access to that folder. If you click deny, ls will return a permission error.

Now try using vim to edit the Info.plist file of something in /Applications. ls will tell you that you have UNIX write permissions, but you'll find you can't actually edit the file. The kernel blocks apps from tampering with each other's files.

Finally, go into the settings and privacy/security area. You can now enable full disk access for the terminal emulator, or a finer grained permission like managing apps. Restart the terminal and permissions work like you'd expect for UNIX again.

Note that you won't see any permission popup in a GUI app if you open the file via the file picker dialog box. That's because the dialog box is a "powerbox" controlled by the OS, so the act of picking the file grants the app permission implicitly. Same for drag and drop, opening via the finder, etc. The permission prompt only appears when an app directly uses syscalls to open a file without some OS-controlled GUI interaction taking place.

So, if you want a desktop OS with a strong sandbox that you actually control, and which has good usability, and a high level of security too, then you should be using macOS. It's the only OS that has managed this transition to all-sandboxed-all-the-time.

replies(2): >>45097589 #>>45105105 #
146. tadfisher ◴[] No.45090669{7}[source]
Attestation is dead outside of corporate environments. Apple will not implement it except through MDM.
replies(2): >>45090738 #>>45091137 #
147. wvh ◴[] No.45090671[source]
What I like about your comment is that it points out that all technical work-arounds are moot if people as a whole are not willing to stand up with pitchforks and torches to defend their freedoms. It will always come down to that. A handful of tech-savvy users with rooted devices and open-source software will not make a difference to the giant crushing machine that is the system.

And I'm afraid most of us are part of the system, rage-clicking away most of our days, distracted, jaded perhaps, like it historically has always been.

replies(7): >>45090706 #>>45090940 #>>45091786 #>>45091971 #>>45092364 #>>45092409 #>>45092419 #
148. franga2000 ◴[] No.45090702{3}[source]
In practice the opposite happens - when new technical workarounds are popularized, more technical solutions are found to prevent them and legislation is proposed to mandate them.

Look at Chat Control in the EU: they started with mandating server-side scanning. Nobody liked that so everyone implemented E2EE. Now there's a new law that adds mandatory client-side scanning.

Most of my tech-brained friends are saying "whatever, we'll just compile from source or use alternative means of distribution. But is that becomes popular, what's the next step? I'm fully expecting the EU's to then try to mandate the service providers need to ensure their apps aren't tampered with, which can only be done by locking devices down to official means of distribution and implementing end-to-end cryptographic attestation. Then we truly are out of options.

replies(1): >>45090868 #
149. safety1st ◴[] No.45090706[source]
Only competition can provide a solution. We have lost sight of this principle even though all Western democracies are built on the idea of separation of powers, and making it hard for any one faction of elites to gain full control and ruin things for everyone else. Make them fight with each other, let them get a piece of the pie, but never all of it. That's why we have multiple branches of government, multiple parties etc. That's why we have markets with many firms instead of monopolies.

There has never been a utopian past and there will never be a utopian future. The past was riddled with despotism and many things that the average man or woman today would consider horrific. The basic principle of democratic society is to prevent those things from recurring by pitting elite factions against each other. Similarly business elites who wield high technology to gain their wealth must also compete and if there is any sign of them cooperating too closely for too long, we need to break them up or shut them down.

When Apple and Google agree, cooperate, and adopt the same policies - we are all doomed. It must never happen and we must furthermore break them up if they try, which they are now doing.

replies(5): >>45090981 #>>45090989 #>>45091089 #>>45091196 #>>45091721 #
150. the_other ◴[] No.45090713{3}[source]
I'm unconvinced. Look at the current wave of attacks on privacy-focused chat + file sharing. The niche tools and workarounds are getting vilified and used as _reasons_ for more elite control.
151. raxxorraxor ◴[] No.45090714[source]
It is of high financial interest of Netflix. I killed my subscription because they couldn't support my sensibly configured browser.

I often recommend people to kill their subscription as well because of this fact. Netflix just isn't oriented to improve their service for their users and it shows.

It won't hit any of their KPI or metrics, but their shitty behavior has a real effect. That said, most other alternatives suck as well. Killed Paramount almost immediately, can't remember why I left Disney. I think there were similar issues.

152. extraisland ◴[] No.45090733{8}[source]
> You've explained that flatpak has issues with file access and clipboard sharing. My iphone does sandboxing too, but the clipboard works just fine on my phone.

> I don't think "failing clipboards" is a problem specific to sandboxing. I think its a problem specific to flatpak. (And maybe X11 and so on.)

There are other examples.

e.g. There are other things that become a PITA on the phone. Want to share pictures between apps without them having full access to the everything. You need to manually share each picture between apps.

The point being made is that it causes usability issues. What those usability issues are will vary depending on platform. However they will exist.

> Sandboxing gives users more control. Not less. Even if they use that control to turn off sandboxing, they still have more freedom because they get to decide if sandboxing is enabled or disabled.

Anything that gets in my way is something that taken control away from me. Unfortunately giving me full control comes with dangers. That is a trade off.

> Maybe you're trying to say that security often comes with the tradeoff of accessibility? I think thats true! Security often makes things less convenient - for example, password prompts, confirmation dialogue boxes, and so on. But I think the sweet spot for inconvenience is somewhere around the iphone.

No usability and control.

BTW, Your sweet spot is a platform which is the most locked down.

> On the desktop, I want to get asked the first time a program tries to mess with the data of another program. Most programs shouldn't be allowed to do that by default.

Well I don't want to be asked. I find it annoying. I assume that this is the case when I install the program. So I don't install software in the first place that I think might be risky. If I need to install something that I might think is iffy then I find a way to mitigate it.

> But there's still often ways to make things better than they are today. For example, before rust existed, lots of people said you had to make a tradeoff between memory safety and performance. Well, rust showed that by making a really complex language & compiler, you could have memory safety and great performance at the same time.

You aren't selling it to me. I got so annoyed by Rust that I didn't complete the tutorial book. Other than the strange decisions. One thing I hate doing is fighting with the compiler. That has a cost associated with it.

I spend a lot of time fighting with the TypeScript compiler (JS ecosystem is a mess) as a result to have some things work with TypeScript you need to faff with tsconfig and transpilers. Then once you are past that you have to keep the compiler happy. Frequently you are forced to write stupid code to keep the compiler happy. That again has a *cost*.

> V8 shows you can have decent performance in a dynamically typed language like JS.

I work with JavaScript a lot. While performance is better, it isn't actually that good.

There was also two secondary effects.

- Websites ballooned up in size. Also application development moved to the browser. This meant you can lock people in your SaaS offering. Which reduces control/freedom.

- There is a lot of software that is now written in JavaScript that really shouldn't be. Discord / Slack are two of the slowest and memory hogging programs on my computer. Both using Electron.

> Those are the improvements I'm interested in. Give me capabilities and sandboxing. A lot more security in exchange for maybe a little inconvenience? I'd take that deal.

Again. It is a trade-off that you are willing to take. I am willing to make the opposite trade-off.

153. freedomben ◴[] No.45090738{8}[source]
Isn't PAT apple implementing attestation for everyone?
154. reddalo ◴[] No.45090751{4}[source]
I honestly suggest using Mozilla Firefox built-in password manager, it's enough for most people.
155. reddalo ◴[] No.45090756{8}[source]
What if I don't want KeyPassXC to ask me for a PIN every time? I can modify its source code and nobody can stop me.
replies(1): >>45091712 #
156. alexvitkov ◴[] No.45090759{3}[source]
No, not everything is a trade-off. Some things are just good and some are just bad.

A working permission system would be objectively good. By that I mean one where a program called "image-editor" can only access "~/.config/image-editor", and files that you "File > Open". And if you want to bypass that and give it full permissions, it can be as simple as `$ yolo image-editor` or `# echo /usr/bin/image-editor >> /etc/yololist`.

A permission system that protects /usr/bin and /root, while /home/alex, where all my stuff is is a free-for-all, is bad. I know about chroot and Linux namespaces, and SELinux, and QEMU. None of these are an acceptable way to to day-to-day computing, if you actually want to get work done.

replies(2): >>45090992 #>>45091274 #
157. pmontra ◴[] No.45090780{4}[source]
As a data point: when non technical friends of mine complain against password I tell them to use a password manager. The adoption rate is zero, probably because they don't even know what a password manager is, except the remember password / fill in password feature of their browser. The best I saw, from a not entirely non technical person is passwords on sheets of paper.
158. walthamstow ◴[] No.45090786{4}[source]
I have tried repeatedly to get my wife to use the family 1Password account for things we will both need, with minimal success. She is reasonably technical, she writes SQL, but she just won't do it.
replies(1): >>45092138 #
159. mike_hearn ◴[] No.45090788[source]
Most politicians would find that argument confusing and not agree with you. I don't think the outcomes of running to government would be what you expect. It could easily backfire.

Politics is a spectrum. Some claim that model is oversimplified but it's not. Here you're making a left wing argument that individual bad actors must be regulated for the good of the collective. However, left politicians would look at the situation and see the opposite. They prioritize an authoritarian safety-first victim-first mindset, in which individual freedoms are sacrificed to help the weakest. But companies like Google and Apple are already doing that. And whilst you're trying to hammer this situation into a left wing framing, the number of individuals who care about the freedom to install apps from anonymous developers is very small. Trivial, on the scale of a country. They do not represent the "consumer interest" in any meaningful way.

So if you lobbied politicians this way, Google/Apple would lobby back and they'd say, we are exactly what you always demand! We're acting proactively to protect the victims by limiting the freedoms of bad guys for the greater good. And the left would be not only highly receptive to that message, but having suddenly become aware of what is technically possible would likely demand they go much further! We already see this with left wing governments banning VPNs and DNS resolutions so they can better control the internet in order to keep this or that group safe.

Which sort of politicians care about the rights of freedom-loving minorities over the safety of the collective? Libertarian politicians do. But they are themselves in a minority, and would not be receptive to an argument framed as "we must regulate the big evil corporations for the greater good", because regulation is always about removing freedoms: in this case, the freedom to design a computing device as you see fit. They probably would be receptive to an argument of the form "it is important to be able to distribute code and communicate anonymously", but prioritizing something so few people care about is exactly why they don't tend to win elections.

So there's no direct solution in politics, but the closest approximation is to support politicians who are more libertarian than average. They won't solve the problem but they will at least not make it worse, and might be open to very targeted regulations that can be framed as protecting market competition e.g. requiring unlockable bootloaders can be framed as protecting competition in the operating systems market. Meanwhile you can try and increase the popularity of platforms that prioritize freedom over safety. In practice that means demonstrating some sort of use case that the big vendors disallow, which is valuable, morally positive and requires anonymous app distribution.

replies(2): >>45090881 #>>45091613 #
160. charcircuit ◴[] No.45090794{9}[source]
>which are sandboxed

Not always. The app can claim to need filesystem access and it will get it without the user knowing.

161. mike_hearn ◴[] No.45090804[source]
Your phone can allow that. Many Android devices allow exactly that. Google Pixel devices do, for instance, exactly because Google's Android team has always agreed with you.
replies(1): >>45094886 #
162. josephg ◴[] No.45090811{5}[source]
> IMO what's needed is less per-app sandboxing, and more per-context.

I think you could do this with capabilities!

The current model makes of security implicit, where an application can make any syscall it wants and its up to the OS to (somehow) figure out if the request is valid or not. Capabilities - on the other hand - restrict access of a resource to the bearer of a certain token. The OS knows that by invoking capability X, the bearer can make requests to a certain resource / account / file / whatever. (Think of it like unix file descriptors. You just call write(1, ...) and the OS knows what file you're writing to, and what your access to that file is.)

There's lots of ways to use capabilities to build the sort of frankenstein app you're talking about using caps. Eg, you could have a supervisor task (maybe the desktop or a script or something) that has a capability for everything the user cares about. It can create sub-capabilities which just have access to specific network ports / files / accounts / whatever. It launches subprocesses and hands the right capabilities to the right sub processes. The sub processes don't even need to know what the capability they were given connects to. They just need to know - for example - that reading from the capability gives it the data it expects to receive. Then you can do all the routing & configuration from the supervisor task.

Because all the sub processes only have the specific capabilities that were passed to them, the security surface area is automatically minimised.

SeL4 shows that you can do this without losing much performance. (In SeL4, the IPC overhead is tiny.) But as I said upthread, I'm sure there's also ways to design our programming languages to allow within-process isolation. So, for example, you can call the leftpad package without giving it capabilities held by other parts of the same program.

Capabilities can also make it easy to virtualise filesystems, the network, and so on. Or to do interdiction - and snoop on the messages being sent. Its easy because you can just make virtual network / filesystem / whatever capabilities and pass those to subprocesses.

163. lucideer ◴[] No.45090815{5}[source]
FIDO can't force any app developers to do anything but fwiw I think "pressuring" people to encrypt secrets at rest rather than storing them in plaintext is ok.

---

There's levels to appropriate paranoia around these things of course. SSH private keys are stored in plaintext for millions of engineers around the world - sometimes probably even passed around through unsecured emails or whatnot I would guess. They're still largely more secure than user:pass on aggregate, despite that rather major peril.

So ultimately, plaintext creds are not necessarily catastrophic. But still - imo - something worth concerted effort to dissuade at least at early stages of standards' implementation.

---

Edit: also, looks like the outcome of that thread was ultimately that KeepassXC have opted to implement the spec as per[0]. Good outcome to a good request.

[0] https://github.com/keepassxreboot/keepassxc/issues/11363

164. josephg ◴[] No.45090834{9}[source]
> No, it's because the bar on publishing on Ubuntu is much much higher than on an iPhone. Nobody would ever accept those scam casino games on Ubuntu.

Uhhh are you claiming ubuntu has a stricter app review process than apple has with the iphone app store?

replies(2): >>45090932 #>>45091206 #
165. krige ◴[] No.45090868{4}[source]
> whatever, we'll just compile from source or use alternative means of distribution.

google is clamping on this already so yeah

166. jamespo ◴[] No.45090876{8}[source]
Because the unknowing user has entered their auth credentials?
replies(1): >>45090955 #
167. redviperpt ◴[] No.45090878[source]
You'll find that a lot of 'normal', for lack of better word, support this.
168. sunderw ◴[] No.45090881{3}[source]
I think the framing that "individual bad actors must be regulated for the good of the collective" is wrong here. In my opinion, what GP is saying is more along the line of "powerful actors must be regulated for the good of the collective powerless people".

When you look at it like that, then what Google and Apple is doing does not fit this point of view. They are (extremely) powerful entities imposing themselves on the whole world.

replies(1): >>45090915 #
169. anonzzzies ◴[] No.45090894{6}[source]
Physical OTP generator. Stick your bank pass in the plastic decice and type your pin in the calculator like front and it will give you an OTP for online use.
170. deadbabe ◴[] No.45090902[source]
Let’s say we do all that. How do you explain to a common layperson exactly what has been achieved? What is the ultimate benefit?
171. mike_hearn ◴[] No.45090915{4}[source]
Those are exactly the same framing and the most likely outcome is left politicians saying, "why do you allow this 'sideloading' at all Google? I have a constitutent who got scammed, why did you allow it? Are you one of those awful libertarians? You should be more like Apple and review all software, otherwise you clearly aren't caring about consumer protection as much as Tim Cook does, up your standards or else we'll regulate you".
172. anonzzzies ◴[] No.45090919[source]
How feasible is it currently (I never tried as I don't want or need it yet) to run Android under Linux for your banking/gov apps? I can accessibility tooling to control them, so only in those cases, I could communicate with the android layer. I don't care about Netflix etc (I know many people do) but I must he able to login to banking and gov.
173. realusername ◴[] No.45090932{10}[source]
Yes I do, none of those scam games you have on iPhone would be allowed to be published on Ubuntu.

The app review process on the appstore isn't designed for the user's benefit but Apple's benefit. There's no problem publishing a casino game but if your app doesn't pay the tax, be sure that it will be rejected.

174. whizzter ◴[] No.45090940[source]
The problem is that tech-savvy users are like bikers, most of us are law-abiding and want the best for society.

Then there's the 1%'ers, people causing trouble, be it by being biker thugs or malware authors or toplevel pirates, actually disrupting the system but often not in a way that's good for the masses and when clashing authoritans the authoritans win due to the masses good.

And yes, the "good" for the masses is more about malware whilst DRM is more of powergrab by media industries that were unwilling to adapt.

175. sunshine-o ◴[] No.45090951{4}[source]
By the way, notice Yubikey did not really release any new series/models and jacked up their price in just a few years. About 50% in 4 years.

The large adoption of those devices and standards did not lower the price.

They probably just banked on the enterprise market where every CISO was pressured to tick the hardware/2FA checkbox. And is then gonna allow to use the Microsoft/Google "software" one because it is hard to manage otherwise.

replies(1): >>45091334 #
176. donkeybeer ◴[] No.45090955{9}[source]
I see the cause of confusion. I was assuming and talking about the case of the legitimate user have a root/non locked down device as being imputed as the "attacker". I don't think he was talking about other people stealing or having acces to your device. And in any case, all bets are off then if you meant that scenario. At least with a browser user can choose not to save passwords and the attacker won't get bank creds, so even in that case a web app would be better.
177. samrus ◴[] No.45090981{3}[source]
This doesnt work if the market incentives themselves encourage these rent seeking actions.

We have given capitalists more and more power pver the last few decades and instead making things better, its just allowed them to nueter the government regulations that would have prevented them from fucking common people over. The market can not solve for this the same way it cant solve for education or the military. This needs laws

replies(1): >>45091419 #
178. turblety ◴[] No.45090989{3}[source]
I wish this was a higher up comment because it's such an important point, and it's totally an achievable thing.

Governments should be supporting this competition, or at the very least not encouraging monopolies/duopolies. Give loads of support/help to startups, small businesses. Let the large corps fund themselves.

But instead, we end up giving them huge tax breaks, anti-competitive legislation and even give them a voice in government.

179. martijnvds ◴[] No.45090992{4}[source]
This is getting a lot better with Flatpaks and Wayland (and its "portal" system to access resources).
180. fsflover ◴[] No.45091014{9}[source]
Yes, you do:

> Anything that gets in my way is something that taken control away from me. Unfortunately giving me full control comes with dangers. That is a trade off.

replies(1): >>45091219 #
181. GoblinSlayer ◴[] No.45091049[source]
Netflix isn't worth to use or pirate even if it was free as in freedom.
182. m4rtink ◴[] No.45091074[source]
Is it really safer on a phone ? Don't banking apps reject latest community Androids builds with all the CVE fixes or Graphene OS yet work totally fine on years old, full of vulnerabilities yet signed official Android ROMs ?
replies(1): >>45091341 #
183. NeuralNomaD123 ◴[] No.45091089{3}[source]
in the face of large monopolies such as today's platforms, to keep competition you must regulate with laws that stop consumer abuse
184. GoblinSlayer ◴[] No.45091137{8}[source]
Apple will implement it.
replies(1): >>45095690 #
185. sharperguy ◴[] No.45091186[source]
While you have a point there is another aspect to this: If our current situation were already different, netflix and banks would not be able to pull these things in the first place.

E.g. if using open free platforms was already the norm, netflix requiring a verified OS would just result in netflix becoming unusable for most people rather than just killing a couple edgecases used by a relatively small number of people. And so it would no longer be in their financial interest. It's why we've had desktops for so long without this happening, although the pieces are finally being put in place to make it a reality.

186. hvb2 ◴[] No.45091192{5}[source]
Laws would need to be changed for that to happen, so don't expect it anytime soon. Also, cash is kind of the one remaining option when there's no electricity. So for disaster planning people have been asked to keep an amount of cash around. With recent developments in European security, the need for this has become all the more clear.
187. ori_b ◴[] No.45091194{4}[source]
Passkeys would be wonderful if they removed remote attestation. Remote attestation is still there, so I will not touch it.
replies(1): >>45091311 #
188. Levitz ◴[] No.45091196{3}[source]
>There has never been a utopian past and there will never be a utopian future.

I wouldn't call it utopian, but I'd say we are way past "peak democracy" at this point.

There was a time in which corporations did get broken up when too large, when we did understand that it's about serving the population first and accumulating wealth after that, when corporations influencing politics was widely seen as a negative. It does seem to me we are now way past that.

replies(3): >>45091588 #>>45092075 #>>45104398 #
189. noirscape ◴[] No.45091206{10}[source]
As a rule, yes. Both Apple and Google are horrendous stewards of their respective storefronts. Their review processes are infamously capricious and black boxes, in the case of Apple they put additional moral rules on what the app is allowed to do, and in spite of that capriciousness, scamware still regularly makes it's way onto the App Store. (Scamware defined here as having a specific set of anti-features[0] that a user would ordinarily pay to remove.)

This one isn't even hard to argue against; Apple being a good steward for its storefront was true in 2011. It is no longer true today. I'd consider a tech-illiterate user less likely to randomly lose a lot of cash by using different storefronts from the Apple App Store (or again, the Google Play Store), if only because those different storefronts actually do a bit of curation instead of focusing on quantity over quality.

[0]: Most of the ones listed here apply that aren't "non-free dependency" or are meant to be a category filter like NSFW. I'd also throw in "microtransactions to unlock basic functionality", but F-Droid effectively bars those with other inclusion rules. https://f-droid.org/docs/Anti-Features/

190. hvb2 ◴[] No.45091212{5}[source]
Even better, the system that Rabobank has.

They make you use this separate device to scan a color qr code generated by the app. The details of the transaction you're authorizing are then displayed on this completely decoupled device, no internet, nothing. After keying in your pin you're given an OTP to put back into the app to authorize.

And I haven't checked, but I'm sure the 'payload' the qr code conveys is signed.

191. extraisland ◴[] No.45091219{10}[source]
No I am not. The example given was ridiculous and absurd and you are doing exactly the same thing.

There is a big difference between basic memory protections and what was being discussed.

This is the issue with a lot of people that work in software. They take the most ridiculous interpretation because "that is technically" correct while not bothering to try to understand what was said.

replies(1): >>45092107 #
192. extraisland ◴[] No.45091274{4}[source]
No everything is a trade off. That is a reality of life in general.

Anything that is proposed has a cost associated with it (time, money). That always has to be weighed up against any potential benefit.

replies(1): >>45092239 #
193. GoblinSlayer ◴[] No.45091275[source]
In this case I install Linux Mint. No virus problem. This is a popularity problem: you are more likely to have a sandbox escape on iphone than a virus on PC, because iphone gets more attention.
194. GoblinSlayer ◴[] No.45091309{3}[source]
>If you want to run an alternative operating system, you got to learn how it works.

You only need to learn how to start a browser. You're a little behind the times, today browser is the OS.

replies(1): >>45091384 #
195. lucideer ◴[] No.45091311{5}[source]
Passkeys would be better without remote attestation, no doubt. But remote attestation is not only optional but also, passkeys are not a prerequisite for requiring remote attestation.

Lots of services that don't support passkeys currently require remote attestation. Boycotting passkeys (an open, possibly beneficial tech that doesn't require remote attestation) will not prevent bad actors from requiring remote attestation (with or without passkeys).

replies(1): >>45091320 #
196. ori_b ◴[] No.45091320{6}[source]
Agreed. Boycotting them is necessary but insufficient.
replies(1): >>45095473 #
197. ozgrakkurt ◴[] No.45091328{4}[source]
Don’t forget to change your password every week too
198. lucideer ◴[] No.45091334{5}[source]
I think there's a bunch of factors to why yubi have upped their prices - not least, waiting for competition in their form factor & not seeing any emerge (token2 & nitrokey are much bulkier) probably gave them some confidence in the uniqueness of their product offering.

It's also become a much more niche product as software based (and/or primary-device-hardware-based) solutions have evolved & improved. & niche costs more.

All that said I'm really not sure why they've been so quiet on new series releases.

replies(1): >>45092612 #
199. tuetuopay ◴[] No.45091341{3}[source]
Sadly yes. The average joe is not a target for technical exploits that use CVEs. They are, however, targets for meatsack exploits tricking them in installing crap like remote control software.
200. extraisland ◴[] No.45091340{4}[source]
> The typical user doesn't know how Windows works, and they can run that.

That is because Windows for the most part manages itself and there are enough IT professionals, repairs shops and other third support options (including someone that is good with computers that lives down the road) where people can problems sorted.

This is not the case with Linux.

> These days, users can run a friendly GNU/Linux distribution not knowing how it works. So, disagree with you here.

Sooner or later there will be an issue that will need to be solved with opening up a terminal and entering a set of esoteric commands. I've been using Linux on and off since 2002. I have done a Linux from Scratch build. I have tried most of the distros over the years, everything from Ubuntu to Gentoo.

When people claim that you will never have to know how it works. That is simply incorrect and gives a false impression to new users.

I would rather that other Linux users tell potential users the truth. There is trade off. You get a lot more control over your own computer, but you will need to peek under the hood sooner or later and you maybe be on your own solving problems yourself a lot of the time.

replies(2): >>45092733 #>>45093488 #
201. extraisland ◴[] No.45091384{4}[source]
What happens when the OS that is running the browser fails to update because /boot has run out of room for a new Linux kernel (this happened to me the other week)?

What happens when the browser update fails because the package database got corrupted?

What happens when a lock file stop the whole system updating because of a previous iffy update?

You are going to need to drop to a terminal and fix that issue or reinstall the whole OS.

Either way you are going to need to know something about how the machine works.

replies(1): >>45092758 #
202. safety1st ◴[] No.45091419{4}[source]
Of course I'm in support of consumer protection laws but what needs to be more widely understood is that with Google specifically, probably with Apple and maybe with Microsoft, we are at a unique point in history where passing laws isn't enough.

There are laws on the books, Google's breaking them, and it's just forging ahead with more of this anti-consumer control crap anyway. Google's unique in American history, it has recently been ruled an illegal monopolist in two cases in two markets and a third ruling against them in a third market is likely to drop soon. Even Standard Oil didn't achieve a rap sheet like Google's.

Yeah of course we need government action and I'm calling for that. But people need to realize that this monster is way bigger than just passing a law. The judges need to be choosing harsher remedies including a breakup. The enforcement apparatus needs to be stronger, willing and able to seize direct control of the company if it doesn't comply or complies maliciously. EVERYTHING in the system needs an upgrade because Google is so uniquely huge and criminal in the context of American history.

They are a different, far larger and more intractable problem than your standard, garden variety corporate criminals and extreme measures are needed to rein them in.

Now, imagine a future where the Web platform didn't become a duopoly and Phone+Tablet+PC OSes didn't become a triopoly. A half dozen vendors globally for one, and a different half dozen for the other. That's a very very different world where someone is going to carve out plenty of market share by letting you continue to install your own apps even if they're ad blockers or whatever else you would like. You just wouldn't get 12 companies plus the US, EU and Chinese governments or whoever to all agree on a single platform. We need the big guys to fight. We need the market to be divided. We need competition. We need to slay Google and never have another Google again.

replies(1): >>45091446 #
203. JustExAWS ◴[] No.45091432[source]
So you want the “freedom” of being able to run the hardware you want. But you don’t think Netflix should have the “freedom” to decide where there software should run?

You don’t have the right to other people’s content - especially for rental content in the case of Netflix.

Even if you don’t agree with that, do you really think that Google should allow Google Wallet run on hardware where they can’t verify the security? No one in the payment chain would trust Android devices. Credit card terminals and every one else has to fall under compliance regulations.

The banks are liable for fraud. Are you okay to say if use unverified hardware to use banking services they aren’t liable for any losses?

204. JustExAWS ◴[] No.45091446{5}[source]
So exactly what law is Google breaking? They are not a monopoly in the US or even 50% of the phone market.

And are you going to force app developers to support all of these platforms?

replies(2): >>45091479 #>>45091905 #
205. fsflover ◴[] No.45091454[source]
> I want my parents to have a computer they can safely do their banking on, without leaving them vulnerable to scams and viruses and the like

So you need to install Qubes OS for them?

206. safety1st ◴[] No.45091479{6}[source]
> So exactly what law is Google breaking?

I mean, why do you need us to repeat these very well publicized convictions that have been all over the news? They've been found guilty of anti-trust violations in multiple cases in multiple American markets. The details are just a Google search away... Are you disputing the court rulings that Google possesses a monopoly? Which court?

replies(1): >>45091505 #
207. JustExAWS ◴[] No.45091505{7}[source]
In the US where has Google been found guilty of anti trust when it came to mobile?
replies(1): >>45091846 #
208. pontifier ◴[] No.45091515[source]
I'm attempting to revive/create a streaming service to compete with Netflix et al. without any DRM. This would leverage physical media to eliminate requirements from copyright holders about how you might access something you actually own. There are challenges, and I'm almost certain to be sued, but it's a fight I believe is needed.
209. worldsayshi ◴[] No.45091588{4}[source]
There's no reason why democracy can't peak again and reach new heights. But that won't happen automatically.

Personally I think there are technological preconditions for stable democracy that have recently been countered by authoritarian leaning technology. We need to invent counter technology to those things.

replies(2): >>45091952 #>>45092157 #
210. benrutter ◴[] No.45091613{3}[source]
> here you're making a left wing argument that individual bad actors must be regulated for the good of the collective. However, left politicians would look at the situation and see the opposite. They prioritize an authoritarian safety-first victim-first mindset, in which individual freedoms are sacrificed to help the weakest.

I think you're simplifying a few things here, mainly the amount of different views that are under the umbrella you're classing as "left-wing" (some of which will fit your categorisation, and some won't) and the amount of different issues under the umbrella of "running your own things".

What I'm trying to say is that there's multiple arguments to be made along the lines of "large companies can and should be restricted from blocking out freedoms of smaller companies and individuals". There's a big economic argument to allowing competition, and I think that's something that unites a lot of thinkers you'd probably class as right wing, as well as the traditional left.

211. fsflover ◴[] No.45091629[source]
> This is why it's so important to defend the real principles here not just the technical artefacts of them.

You're not wrong, but technical artefacts can be an important step in the right direction. I came to my bank, showed them my Librem 5 phone and asked where I can download an app for it. It was a much clearer message than "but Android isn't free!" (which is of course true). I do the same with governmental services. It also makes it much easier to explain to ordinary people that the choice must not be artificially restricted to just two megacorps.

212. lwhi ◴[] No.45091710[source]
We need an open web, with open principles and to prevent any commercial enterprise from dominating our social / tech sphere via monopolisation or methods of proprietary control.

This isn't a surprise. A vocal minority have been saying the same ad infinitum.

The need hasn't changed, and won't change; however there's a strong likelihood we'll get to a point where action isn't possible because we've passed the point of no return.

213. pbhjpbhj ◴[] No.45091712{9}[source]
Then your version of KeyPass will not be signed and won't pass TPM checks and so the banking app will refuse to run unless you open the signed version?
replies(1): >>45096544 #
214. lwhi ◴[] No.45091721{3}[source]
In fact true competition is only possible via open standards, protocols and technology stacks.

We need agreement to ensure the large corporations adhere to these.

replies(3): >>45091974 #>>45092178 #>>45093770 #
215. lotsofpulp ◴[] No.45091786[source]
Most people don't want to have to learn multiple operating systems or ways of doing things.
216. Okawari ◴[] No.45091790{4}[source]
It's not about being defeatist, atleast not for me. It's about what is considered good enough.

Sure, locking down the OS in this way is more secure, but it's also very restrictive and personally I don't think the added security justifies this. Lock picks do exist, but I am still entirely content with a single lock on my front door. I do not need an extra biometric sensor or camera or security representative standing outside my door to check id's of people passing by in order to consider myself reasonably safe.

Maybe this is cultural/geographical, but I've yet to hear of anyone who lost access to their mail or had unauthorized access to their bank account as a result of malware. I'm sure you can find examples, but I do not consider this an attack vector that is prevalent enough to warrant requiring signed apps or preventing manual installation.

217. mcv ◴[] No.45091793[source]
Good point. The current security model of desktop OSs sucks. I was recently reminded of this by an issue at work. I'm used to devs having admin rights on their laptops, but here they closed that down: you have to request admin rights for a specific purpose, and then you get them for a week.

I recently requested those rights again because I needed to install something new for a PoC I was working on, and that wasn't allowed anymore. But during onboarding I had those rights and installed homebrew to more easily install dev tools, and homebrew keeps its admin rights to install stuff in a directory owned by admin. So that circumvents this whole security model (and I did, for my PoC).

The problem is that it's all or nothing. Homebrew should have the right only to install in a specific directory. Apps shouldn't automatically get access to potentially sensitive data. Mobile OSs handle that sort of thing more granularly. Desktop OSs should too.

Because the overly restrictive security rules at my work are little more than security theatre when it's so easy to circumvent.

replies(2): >>45092174 #>>45092533 #
218. mathiaspoint ◴[] No.45091815{4}[source]
This hardly stops anything, app stores are full of malware, and the cost is very high.

It's like having an automated turret on your lawn because sometimes people bring bad snacks to your dinner parties.

219. safety1st ◴[] No.45091846{8}[source]
For your convenience, I've accessed a summarizer technology which you can try out any time you need it. You'll find it at https://chat.openai.com/ .

Here are the big, recent U.S. antitrust rulings against Google, with what each court actually decided and where things stand:

#1 Search monopoly (DOJ v. Google – “Search” case) — liability found (Sept 2024) A federal judge found Google illegally maintained monopolies in general search services and general search text ads, violating Section 2 of the Sherman Act. Remedies are being handled separately.

#2 Open-web ad tech (DOJ & states v. Google – E.D. Va.) — liability found (Apr 17, 2025) The court ruled Google monopolized multiple digital advertising technology markets (tools used by publishers and advertisers), harming publishers, competition, and consumers. Remedies proceedings are underway.

#3 Android app distribution & in-app billing (Epic Games v. Google) — jury verdict + injunction affirmed on appeal (Dec 2023 → Oct 2024 → Jul 31, 2025) A jury found Google violated antitrust laws through exclusionary Play Store practices and tying Google Play Billing. The trial judge issued a nationwide permanent injunction (Oct 2024) requiring Google to open the Play Store to rival stores and payment options; the Ninth Circuit unanimously affirmed (Jul 31, 2025).

Case #3 is the direct answer to your question, but I want to again point out that the really serious problem is how Google has abused its market power in MANY US technology markets, and found guilty of these abuses independently by multiple judges in a short span of time, a feat of criminality even Standard Oil failed to achieve. This is why a historic level of action against Google, probably greater than that taken against Standard Oil, needs to be taken.

It's all in the court cases and it's all available publicly online for the interested public to read.

Edit: also, this comment is already too long, but in case it doesn't stand out as obviously to everyone else as it does to me, Google now introducing an additional layer of Google approvals above the multiple app stores that the court is forcing them to accept in case #3 is so amazingly, obviously a telegraphed case of malicious compliance, they are not even trying to hide it. This is the kind of thing I'm talking about when I'm saying passing more laws is part of the solution but not nearly enough on its own.

220. the_other ◴[] No.45091905{6}[source]
Weirdly, when the market was smaller, when there was less money available, developers DID support multiple platforms.

Today, when we have significantly fast tools, more standards, more shared knowledge, and MUCH more noney moving through the ecosystem, yet somehow it’s harder to support more platforms.

There’s a problem either at the level we’re talking about (the mono/duo-polies), or perhaps one level higher (national economies). My hunch is that it’s the same problems that are widening wealth gaps the world over (not just in the tech industry), but I’m open to other ideas.

221. tonyhart7 ◴[] No.45091923{7}[source]
good for them to care more about security then
222. komali2 ◴[] No.45091952{5}[source]
I disagree that there's a technological solution to late stage capitalism and the slow death of liberal democracy.

New technology doesn't change anything about social institutions - the most powerful groups before the technology was invented simply own the technology after it's invented and use it to further cement their power.

I think the luddites were on to something. We don't need technology, we need humans doing things a little differently, maybe even doing bizarre things like setting factories on fire. Personally I hope we can try other things before setting factories on fire, see Keith McHenry's version of The Anarchist Cookbook for peaceful resistance solutions as well.

The point is though without a restructure, new technology doesn't liberate, in fact it further entrenches existing power structures.

replies(1): >>45092149 #
223. Quarrelsome ◴[] No.45091971[source]
> A handful of tech-savvy users with rooted devices and open-source software will not make a difference to the giant crushing machine that is the system.

Agreed, although I don't think that's entirely true, its just that post-smartphones we no longer have any political agency over a significant volume of the new traffic. Much of the new traffic represents that faction of people who initially mocked the internet as "nerd shit". But we don't have to get discouraged by our smallness here.

Rather we can offer a sub-system that satisifes our demands and is an open door to those willing to find it. We could try to fight our corner, but unless we're incredibly organised, its unlikely they'll listen due to how less relevant we are, now that all the normies transitioned online.

So we either jump ship to other, more permissive platforms and help make them good by developing software that closes the gap, or we counter by attacking the systems that prevent people from installing software on the device they have bought.

We just shouldn't expect the general population to care about our problems en-masse because they never have and never will. We will make a difference by creating an alternative sub-system that is poised to grow when the giant crushing machine stumbles at some point in the future.

We can't hate people for picking the parental wing of Apple because for most normies they don't enjoy the freedoms of technology, its the choice and difficulty that they conversely find oppressive.

replies(1): >>45092667 #
224. _heimdall ◴[] No.45091974{4}[source]
This doesn't seem right to me. It is often in companies' best interests to adopt standards, but that is because it allows them both to have an optimized supply chain.

Car manufacturers today have a lot of standards that I expect would make competition from any new contenders harder not easier. Tesla would be an example of that, they did survive but the industry thought it was never going to work precisely because of all the standards and regulations required.

On the other hand, early car manufacturers didn't have standards and shared technology stacks. At that time new car makers popped up everywhere and we had a ton of competition in the space.

Open standards are good for the consumer and good for any features that require interoperability. It has nothing to do with competition though.

replies(1): >>45092439 #
225. komali2 ◴[] No.45092007[source]
This argument doesn't contradict the article.

An expensive iPhone ships with iOS and a rigid security model.

If you tap the `about` button 16 times and click a confirmation dialog, you disable certain security mechanisms against arbitrary software installation. Do something else easy but impossible to do accidentally, and you unlock the bootloader. You progressively lose portions of your warranty in doing so.

This is the path I think we should be going down.

replies(1): >>45092298 #
226. mlrtime ◴[] No.45092075{4}[source]
And when was this utopia in your opinion? This sounds like rosy retrospection to me.

Or are you talking about a very specific industry, because the thread sounds like it is all society or "Late capitalism" which I disagree with.

replies(1): >>45092263 #
227. 986aignan ◴[] No.45092107{11}[source]
The problem is that if what "really counts" is too vaguely defined, then it's hard to pin down and argue the point.

Virtual memory probably isn't what you meant, but take something like user privilege separation. It's usually considered a good idea to not run software as root. To interpret the statement generously, privilege separation does restrict immediate freedom: you have to escalate whenever you want to do system-level changes. But I think josephg's statement:

> Sandboxing gives users more control. Not less. Even if they use that control to turn off sandboxing, they still have more freedom because they get to decide if sandboxing is enabled or disabled.

can be directly transposed to user privilege separation. While it's true that escalating to root is more of a hassle than just running everything as root, in another sense it does provide more control because the user can run arbitrary code without being afraid that it will nuke their OS; and more freedom because you could always just run everything as root anyway.

Maybe josephg's sense of freedom and control is what you're saying there is a trade-off between. But the case of privilege separation shows that some trade-offs are such that they provide a lot of security for only a little bit of inconvenience, and that's a trade-off most people are willing to make.

Sometimes the trade-off may seem unacceptable because OS or software support isn't there yet. Like Vista's constant UAC annoyances in the case of privilege separation/escalation. But that doesn't mean that the fundamental idea of privilege levels is bad or that it must necessarily trade off too much convenience for control.

I think that's also what josephg is suggesting about sandboxing. He says that the clipboard problem could probably be fixed; then you say, "but there are other examples". What remains to be shown is whether the examples are inherent to sandboxing and must degrade a capabilities/sandbox approach to a level where the trade-off is unacceptable to most.

replies(1): >>45092535 #
228. mlrtime ◴[] No.45092138{5}[source]
1Password is completely broken in android. I have barely a 50% success rate with it filling in passwords, I'm usually copy/pasting back and forth.

If there were anything better and as easy to use as Chrome, I'd switch.

229. safety1st ◴[] No.45092149{6}[source]
> New technology doesn't change anything about social institutions

This is of course demonstrably untrue. Marshall McLuhan devoted his life to illuminating how technology changes society. The printing press, radio, television and the Internet have all undoubtedly changed our social institutions. It's hard to imagine secular democracy ever becoming a thing if we hadn't been able to mass produce books and newspapers, and writing manuscripts had remained mostly under the control of the Church. It seems less probable that the Nazis would have come to power if not for the immense skill Goebbels and Hitler had in the use of radio. And I doubt Trump would have been elected if he hadn't known how to press people's buttons so well on social media.

Let's not forget that more ancient things like fire, agriculture and accounting are also technology that irrevocably changed humanity and put new people in power. Or take a look at how railroads remade American society. Or how sufficiently advanced sailboats placed half the world under the thrall of colonialism...

Absolutely there can exist technologies which are anti-democracy, and surveillance technologies are exactly that. You become afraid to say or write the wrong thing in public, and then to say or write it in private, and then to even think it, and finally the thing is forgotten. I felt like Orwell made the point well enough in 1984.

All that said I don't see technology saving us from our current problems, it needs to be invented, it needs to mature, there needs to be adoption. One might imagine mesh networking and censorship proof distributed messaging or something having an influence on society but we simply aren't there yet.

replies(3): >>45092782 #>>45094009 #>>45098882 #
230. intended ◴[] No.45092157{5}[source]
There is no authoritarian leaning technology. People figured out how to create 1984 while saying they defend free speech.

It is simply that, eventually, people learn how to use technology to their advantage.

replies(2): >>45092823 #>>45096179 #
231. mlrtime ◴[] No.45092174{3}[source]
It's not theater, your IT department just isn't implementing it correctly. I recently switched jobs and gave up one macbook pro for another (work issued).

Company A gave me sudo access and I could do anything I wanted.

Company B locks down everything, no sudo, no brew, nothing. But I do get a big VM with root to do anything I want. There is an approved "appstore" of many different varieties of IDEs/tools.

TLDR: Not having brew is not a problem, and /can be/ a better experience if done right.

It took a couple weeks to shift the mental model but I have no problems. The dev experience is quite good because they provide all the libraries you need to do your job.

replies(2): >>45092465 #>>45092916 #
232. wizzwizz4 ◴[] No.45092178{4}[source]
We don't need agreement for this. In the past, hardware was limited, and you could only really implement one (maybe two) network stacks before things got silly. Nowadays, a software-defined radio can speak ten thousand protocols, for a lower cost than saving a cat video to your hard drive.

We only need that the standards are open, and described clearly enough for a schoolchild to implement, and that we are not prevented from adding additional protocol support to systems we acquire.

Hardware protocols are a bit different, but I actually dislike the USB-C standardisation. We already had better de-facto standards (e.g. small, "fixed-function" devices like feature phones and e-readers all use Micro USB-B for charging). Our problems were mainly "this laptop barrel charger is incompatible with this other laptop barrel charger", and proprietary Apple connectors.

The most important hardware protocol is power supply, which we can fix by requiring well-documented, user-accessible contacts that, when sufficiently-clean power is applied to them, will power the device. These could be contacts on the motherboard (for something designed to be opened up), or something like Apple's Smart Connector (without the pointless "I'll refuse to charge until you handshake!" restriction).

Requiring open, well-documented protocols which aren't unnecessarily-complicated is imo more important than requiring standard protocols.

replies(1): >>45092463 #
233. mlrtime ◴[] No.45092187{3}[source]
Because parents typically have bad eyes and need big monitors, or they just want to be able to use a computer like we have been for years?
234. arcbyte ◴[] No.45092238[source]
Perhaps we should pick a page from the example of radio and force all video content to be openly reproducible for a forced flat fee.
235. josephg ◴[] No.45092239{5}[source]
That claim is too generic to add anything to this discussion. Ok, everything has a trade off. Thanks for that fortune cookie wisdom. But we’re not discussing CS theory 101. In this case in particular, what is the cost exactly? Is it a cost worth paying?
replies(2): >>45092511 #>>45092659 #
236. safety1st ◴[] No.45092263{5}[source]
I don't believe there was any utopian period in the past, but in US history, the Gilded Age had a lot in common with our current day (corruption, centralization of wealth and power, stemming from new technologies). And it was followed by the Progressive era and then the New Deal which were distinctly more populist in nature. Those were the eras of American history where the US got serious about anti-trust and unionization respectively.
237. josephg ◴[] No.45092298{3}[source]
Citation please? It’s my understanding that there is no officially approved way to unlock an iPhone.

They’ve had something like that for a long time on Android, and I think it’s a reasonable middle ground between making the platform open and closed. But as far as I know, Apple never did something like that on iOS.

replies(1): >>45092955 #
238. g-b-r ◴[] No.45092301{6}[source]
> > That's fine. Let determined people do that, but don't make it easy for a user to be tricked into handing over all of their credentials in clear text.

Has there even, ever, been an instance of that happening?

replies(1): >>45092819 #
239. oigursh ◴[] No.45092306{6}[source]
Can you explain your motivation around gpg-agent and yubikey little more, please? So the private key can't be copied elsewhere?
replies(1): >>45095502 #
240. johnisgood ◴[] No.45092316{5}[source]
Good to know. People should read this when they say cryptocurrencies are bad. Well, guess what, so is cash and your card. Any alternatives?
replies(1): >>45104038 #
241. thunfischtoast ◴[] No.45092325[source]
I agree, but your points becomes stronger when you leave Netflix away. Netflix is a private entertainment company, and when I don't like their conditions I can always quit.

Banks on the other hand have so much more control over my life. With their apps being locked to the two major mobile OS I have many hoops to go through when I want to use an alternative one. It's not impossible yet, but it becomes very cumbersome to do so.

242. g-b-r ◴[] No.45092336{4}[source]
> The ones banks that do have physical presence are closing left and right? Also, I don’t think I can money transfers at the physical office of my bank.

It's crazy if you really can't

243. g-b-r ◴[] No.45092352{4}[source]
Apps for QubesOS??
244. disiplus ◴[] No.45092361{3}[source]
yeah this whole shit where lets optimize it for the lowest common denominator is stupid. I hate everything about it.

im a older millennial, so i have older parents and young kids. My father could not bother with a smartphone or does not care about internet at all. My mother uses whatsapp and everything after initial year she is quite handy with it. Im not scared about her, im more scared that she is reading AI slop.

My kids are now at the age where a lot of the pears are getting a smartphone for them im not giving them a smartphone. If i give them a smartphone in a year or i will be using parental controls.

245. 3abiton ◴[] No.45092364[source]
I am looking forward for the day I remote ssh into a <insert kvm solution> controlling my iPhone/Android so I can login to my bank app because they stopped allowing web access, and I don't want to compromise on privacy. Shit is nuts.
246. camgunz ◴[] No.45092409[source]
> What I like about your comment is that it points out that all technical work-arounds are moot if people as a whole are not willing to stand up with pitchforks and torches to defend their freedoms.

If your system requires extraordinary political efforts from large numbers of people, your system will fail. We are the elites, we have to oppose this. If Netflix asks us to implement this kind of DRM, we have to resign. If Facebook asks us to implement sophisticated surveillance, we have to resign. Etc. etc. We can't keep cashing the checks and then point to the body politic like "I beg you to stop me".

replies(1): >>45092432 #
247. tiahura ◴[] No.45092412[source]
I prefer to live in a society where adults are free to come to their own arrangements with other adults. Not one where those with a penchant for authoritarianism set terms for others.

Sometimes this system may have warts like not getting to watch Netflix on your Switch, but that seems like a small price to pay for respecting individual autonomy.

248. tiahura ◴[] No.45092419[source]
Telling people how they have to design their systems is the opposite of freedom.
249. p1esk ◴[] No.45092432{3}[source]
We are the elites

Wait, what?

replies(1): >>45092674 #
250. lwhi ◴[] No.45092439{5}[source]
Sorry, but you're incorrect.

If a particular product is tied to a specific proprietary tech stack, then the consumer is also tied to specific suppliers. This is known as vendor lock in.

Microsoft used this approach with Internet Explorer back in the old days; ensuring that it provided proprietary elements and implementation, that would encourage developers to provide websites that only functioned using their browser.

Open standards allow choice.

replies(1): >>45092647 #
251. lwhi ◴[] No.45092463{5}[source]
We're not just talking about hardware here.

Any standard that is developed closed-source and is protected or proprietary, can and will prevent consumer choice further down the line.

Interoperability of data, choice between vendors, and the ability for smaller players to compete with established larger players are all directly negatively affected by a lack of open standards.

replies(1): >>45092524 #
252. mcv ◴[] No.45092465{4}[source]
There is an app store here too, but lots of vital dev tools simply aren't in there. We should probably make sure they get added.
253. raxxorraxor ◴[] No.45092495[source]
It is the other way around. The security model of mobile devices seriously inhibits innovation and we end up with ever the same crappy apps we don't really need.

I also don't believe more people get scammed on PC compared to mobile platforms. Scammers go where the most naive people congregate.

A sensibly configured Linux system is very secure compared to your mobile device. No security model can really shield against user stupidity. The people would need completely different devices as they simply aren't fit to use a computer. My parents are the same, but I won't accept a bad compromise of an OS just because they essentially need other devices.

At some point a user will be asked to allow execution of code they got through some fishy mail. There is no defense against that other than for the user sticking to books.

replies(1): >>45092547 #
254. raxxorraxor ◴[] No.45092511{6}[source]
The cost is that developing that simple script to execute something and accessing files will have to be constructed differently. It will be much more complex.

That or the OS settings for said script will need to be handled. That is time and money.

replies(1): >>45099588 #
255. wizzwizz4 ◴[] No.45092524{6}[source]
They're negatively affected by a lack of openness. Some proprietary XML nonsense that's well-documented makes interoperability a week's work, maximum. Meanwhile, Microsoft's incomprehensible "open standard OOXML", supported by every document editor I care to name, is a huge impediment to interoperability. Limiting myself to even the well-designed ODF format means there are features I can't implement in my software: standardisation comes at the expense of innovation.

In software, the problem is closedness, protectionism, and undocumentedness, not proprietary wheel reinvention.

replies(1): >>45092557 #
256. raxxorraxor ◴[] No.45092533{3}[source]
There is software that does exactly that. You install a software kiosk were users can pick from and users don't get admin rights.

Won't satisfy developers for long though because it cannot work.

The problem is that mobile OS security systems isn't fit to develop anything but shit. It is simply no solution for desktop.

replies(1): >>45095936 #
257. extraisland ◴[] No.45092535{12}[source]
> The problem is that if what "really counts" is too vaguely defined, then it's hard to pin down and argue the point.

It really wasn't. It isn't hard to understand what was meant.

> Virtual memory probably isn't what you meant,

No it wasn't and there is no need to put "probably". It was obvious it wasn't.

> can be directly transposed to user privilege separation. While it's true that escalating to root is more of a hassle than just running everything as root, in another sense it does provide more control because the user can run arbitrary code without being afraid that it will nuke their OS; and more freedom because you could always just run everything as root anyway.

The difference is that there are very few things I need to run as user directly daily as root on my Desktop Linux box. I can't think of anything.

However having to cut and paste a meme into ~/Downloads so I can share it on Discord or Slack is a constant PITA. If you sandbox apps you have to restrict what they can access. There is no way around this. The iPhone works the same way BTW. I know I used to own one. You either have to say "Discord can have access to this file", or you have to give it all the access.

> Maybe josephg's sense of freedom and control is what you're saying there is a trade-off between. But the case of privilege separation shows that some trade-offs are such that they provide a lot of security for only a little bit of inconvenience, and that's a trade-off most people are willing to make.

No they are a false sense of security with a lot of inconvenience. The inconvenience is inherent and always will be because you will need to restrict resources using a bunch of rules.

> Sometimes the trade-off may seem unacceptable because OS or software support isn't there yet. Like Vista's constant UAC annoyances in the case of privilege separation/escalation. But that doesn't mean that the fundamental idea of privilege levels is bad or that it must necessarily trade off too much convenience for control.

There are many things that seem like they are fundamentally sound ideas on the face of it. However there are always secondary effects that happen. e.g. Often people just ignore the prompts, this is called "prompt fatigue". I've literally seen people do it on streams.

Operating systems are now quite a lot more secure than they were. So instead of going for the OS, most bad actors will use a combination of social engineering to gain initial entry to the system. The OS security often isn't the problem. Most operating systems have either app stores, some active threat management.

If you are running things from npm/PyPI/github without doing some due diligence, that is on you. This is well past what non-savvy user is likely to do.

> I think that's also what josephg is suggesting about sandboxing. He says that the clipboard problem could probably be fixed; then you say, "but there are other examples". What remains to be shown is whether the examples are inherent to sandboxing and must degrade a capabilities/sandbox approach to a level where the trade-off is unacceptable to most.

It is inherent. It obvious it is. If you want to share stuff between applications like data, which is something you want to do almost all the time. You will need to give it access at least to your file-system. The more of this you do, you will either have to give more access or having to faff moving stuff around. So either you work with a frustrating system (like I have to do at work), or you disable it.

So what happens is you only have "all or nothing".

replies(3): >>45092645 #>>45092873 #>>45096009 #
258. hollerith ◴[] No.45092547{3}[source]
>A sensibly configured [desktop, i.e., not just a headless server] Linux system is very secure compared to your mobile device.

That is not true. It is understandable that you believe it because it gets repeated a lot, but those repeaters are doing what you are, namely repeating what they heard (and sometimes what they want to be true) without sufficient actual knowledge of what they are talking about.

replies(1): >>45092727 #
259. lwhi ◴[] No.45092557{7}[source]
>In software, the problem is closedness, protectionism, and undocumentedness, not proprietary wheel reinvention.

Quite simply, the first three problems are actually caused by proprietary wheel reinvention.

replies(1): >>45093110 #
260. sunshine-o ◴[] No.45092612{6}[source]
> I think there's a bunch of factors to why yubi have upped their prices - not least, waiting for competition in their form factor & not seeing any emerge (token2 & nitrokey are much bulkier)

It is true about the size.

Sill I do not understand the price difference between 5C Nano [0] and the PIN+ Mini-C [1]. 3 to 4 times more expensive depending on the currency.

- [0] https://www.yubico.com/pt/product/yubikey-5-series/yubikey-5...

- [1] https://www.token2.com/shop/product/pin-mini-c-release3-1-fi...

261. fsflover ◴[] No.45092645{13}[source]
> It isn't hard to understand what was meant.

At least two independent people understood you in the same way. So just dismissing it isn't productive.

> PITA. If you sandbox apps you have to restrict what they can access. There is no way around this.

This has nothing to do with freedom though.

> You will need to give it access at least to your file-system.

On Qubes, you copy-paste with ctrl+shift+v/c and nothing is shared unless you actively do it yourself. It becomes a habit very quickly (my daily driver). Sharing files is a bit harder (you send them from VM to VM), but it's not as hard as you want it to look.

replies(1): >>45092750 #
262. _heimdall ◴[] No.45092647{6}[source]
That can be one aspect of it, though I would argue that doesn't mean open standards are always better for competition.

I think you're also assuming the only competition that matters is long term. In the short term the potential for locking users into your own ecosystem can incentivize short term competition.

Long term competition seems like a good goal, but that assumption wasn't part of it at the beginning of this chain.

replies(2): >>45092714 #>>45092716 #
263. extraisland ◴[] No.45092659{6}[source]
> That claim is too generic to add anything to this discussion. Ok, everything has a trade off. Thanks for that fortune cookie wisdom.

It isn't fortune cookie wisdom and no it isn't "too generic". It is something that fundamentally wasn't understood by the person I was replying to from their comment. I also don't believe you really understand the concept either.

> But we’re not discussing CS theory 101.

No we are not. We are discussing concepts about security and time / money management.

> In this case in particular, what is the cost exactly? Is it a cost worth paying?

You just accused me of "fortune cookie wisdom" and "being too generic". While asking a question where the answer differs dependant on the person / organisation.

All security is predicated on what you are protected against. So it is unique to your needs. What realistically are your threats. This is known as threat modelling.

e.g. I have a old vehicle. The security on it is a joke. Without additional third party security products, you can literally steal it with a flat blade about two inches long and drive away. You don't even need to hot-wire it. Additionally it is highly desirable by thieves. I can only realistically as a individual without a garage to store it in overnight, protect it from an opportunist. So I have a pedal box, a steering wheel lock, and a secret key switch that turns off the ignition and only I know where it is in the cab. That is like stop an opportunist. However more determined individuals. It will be stolen. Therefore I keep it out of public view when parked overnight. BTW because of the security measures, it takes about a good few minutes to be able to drive anywhere.

Realistically. Operating system security is much better than than it was. It is at the point that many recent large scale hacks in the last few years were initiated via social engineering to bypass the OS security entirely. So I would say it is in the area of diminishing returns already. So the level of threats I face and most people face, it is already sufficient. The rest I can mitigate myself.

Just like my vehicle. If a determined individual wants to get into you computer they are going to do so.

replies(1): >>45099867 #
264. GoblinSlayer ◴[] No.45092667{3}[source]
On Android they do enjoy the freedoms and fall for "side load this random app ignoring warnings" scam.
replies(1): >>45092842 #
265. fsflover ◴[] No.45092673{7}[source]
> Any security mechanism has a weakness or it will be bypassed by other means. So all this will give you a false sense of security.

> The moment you think you are safe. Is when you are most unsafe.

This is demonstrably false. Qubes OS has the lowest number of CVEs, even less than that of Xen. Last VM escape in it was found in 2006 by the Qubes founder (it's called "Blue Pill").

Also: https://news.ycombinator.com/item?id=27897975

replies(1): >>45092778 #
266. GoblinSlayer ◴[] No.45092674{4}[source]
Different kind of elites.
replies(1): >>45092863 #
267. fsflover ◴[] No.45092714{7}[source]
> that doesn't mean open standards are always better for competition

Yes, they are. Show us a counter-example.

replies(2): >>45093119 #>>45094881 #
268. lwhi ◴[] No.45092716{7}[source]
If we don't think about long term competition we end up in the scenario we are in now.

Two main players. No choice.

269. raxxorraxor ◴[] No.45092727{4}[source]
It is fairly true, what is your definition here? The main attack vector today is malicious mails being opened. These usually don't target linux systems and fail to execute.

Sure, it is circumstancial security, but exploits exist for mobile devices as well.

replies(1): >>45092850 #
270. GoblinSlayer ◴[] No.45092733{5}[source]
Anybody who is good with computers should be able to install linux, it's easier than to install windows, because you don't need to jump through capitalist dark patterns.

>Sooner or later there will be an issue that will need to be solved with opening up a terminal and entering a set of esoteric commands.

That's what I did to export drivers from previous windows installation in suspicion of regression.

replies(1): >>45092801 #
271. pixelmonkey ◴[] No.45092746[source]
What do you mean by "locked down computer." Maybe something like ChromiumOS?

Might be a tough sell for the volunteer open source community ("linux & friends") to work on such an alternative "locked down" computing experience. Free and open source software is usually more focused on unlocking use cases, not locking them up.

That all said, I basically consider macOS to be a locked down computing experience. So that's my solution for older people.

It's not a perfect solution but the Apple closed ecosystem is better designed for the limited use cases of the elderly. Rely on iCloud and built-in Apple approaches to data security as much as possible.

For example, an iMac and an iPhone can get all "adulting" use cases done, including typing/receiving emails, printing documents, online banking, government services, and so on. Apple Passwords plus Face ID helps to simplify password-based security. My biggest issue is getting TOTP-based two-factor adopted. Apple Passwords supports this but I usually have to do remote tech support to get it set up initially. It's also annoying that right now, the current generation of iMacs don't support FaceID, because that would simplify authentication across the two primary platforms (desktop/mobile).

I would never use this setup myself since I like to run F/OSS everywhere as much as possible. But I am realistic about tech expectations for the elderly who just want to live their life with minimal investment in learning about data/software security.

But you're right, along with other commenters, that it's dangerous for society to rely on a monopolist technocorporate overlord (or a pair of overlords forming a de facto duopoly) for the basic administrative tasks of adult living and lawful citizenship.

272. extraisland ◴[] No.45092750{14}[source]
> At least two independent people understood you in the same way. So just dismissing it isn't productive.

Two people that we are aware of.

BTW, I often encounter this when talking to other techies. People go to the most ridiculous extremes to be contrarian. Often they don't even know they are doing. I know because I used to engage in this behaviour.

So I feel like I am well withing my rights to dismiss it.

replies(1): >>45092790 #
273. GoblinSlayer ◴[] No.45092758{5}[source]
Does flatpak update automatically? As for /boot, format the whole drive and make it /boot
274. james_marks ◴[] No.45092773[source]
> Netflix shouldn't be able to insist on a particular type of DRM for me to receive their service.

Maybe it’s just a bad example, but why would this be true? As a private company delivering entertainment, they can have any restrictions they want as a condition to selling to you.

275. extraisland ◴[] No.45092778{8}[source]
You are only thinking of attacking computer directly itself. Often people socially engineer access to a computer system. Many UK super markets were hacked, using some of the software that is very secure, because people managed to socially engineer access.

There is nothing and I mean nothing that is completely secure.

replies(1): >>45092818 #
276. fsflover ◴[] No.45092782{7}[source]
> You become afraid to say or write the wrong thing in public, and then to say or write it in private

It's called "social cooling": https://news.ycombinator.com/item?id=24627363

> but we simply aren't there yet

Actually, I2P is already here. It should be promoted more.

277. fsflover ◴[] No.45092790{15}[source]
I didn't say you weren't within your rights. I said it's counter-productive for the discussion.
replies(1): >>45092809 #
278. extraisland ◴[] No.45092801{6}[source]
> Anybody who is good with computers should be able to install linux

Installation is not the same as support and isn't the same as trouble shooting.

That why people distro hop. They keep on installing thinking that distro X will solve there problem. It may do, but it frequently has it own problems.

> That's what I did to export drivers from previous windows installation in suspicion of regression.

Which is unusual situation. It isn't unusual situation in Linux.

replies(1): >>45092935 #
279. extraisland ◴[] No.45092809{16}[source]
I think it is counter productive to bring up ridiculous examples, which was obviously not what I meant.
replies(1): >>45092831 #
280. fsflover ◴[] No.45092818{9}[source]
> There is nothing and I mean nothing that is completely secure.

You're not wrong, but dismissing security because there are always other threats is just security nihilism. See my link.

281. lucideer ◴[] No.45092819{7}[source]
There have been literally thousands of documented incidents of this.

There's an entire subsection of the security industry dedicated to this happening. The DefCon international security conference holds an on-stage competition where security researchers demonstrate this happening to real targets in real time in front of a live audience.

replies(1): >>45094578 #
282. swayvil ◴[] No.45092823{6}[source]
There is a small community of billionaires who control everything to the best of their ability. They control for their own benefit.

Technology, its development and production, is one thing that they control.

The rest of the population (the nonbillionaires) is another thing that they seek to control. It's near the top of their list.

Phones, internet and social media are tools for controlling us. Arguably. Right?

replies(1): >>45094908 #
283. fsflover ◴[] No.45092831{17}[source]
Both things can be counterproductive simultaneously.
284. Quarrelsome ◴[] No.45092842{4}[source]
I'd imagine the volume we're discussing aren't even aware of options outside of the appstore.

A study was done a while back of average user competence and when given the task of arranging a meeting in a calendar app for a time where all participants could attend (given calendar conflicts) a meagre 5% of participants succeeded. The bar is tragically low for technical literacy and 95% of people (ballpark) fail to clear it. I'd imagine the first time these sorts of people are aware of side-loading is when they get scammed by being told to side-load some malware. So for these people they wouldn't even notice their digital rights being eroded or taken away completely, because they don't even understand how or why they'd be important.

285. hollerith ◴[] No.45092850{5}[source]
Media decoders are an important attack vector. Examples include PDF viewers and the library that produces thumbnails for display by the file browser. (One way to attack a media decoder is to get the user to open a malicious email, but there are other ways.)

The web browser is an important attack vector, and there are no Linux distros that sandboxes the browser anywhere near as effectively as Android and ChromeOS do except maybe Qubes, but Qubes is stuck using X for the display server and using Zen, both of which have been abandoned by their maintainers and aren't receiving enough maintenance attention to fix security vulnerabilities. I.e., Qubes's reputation for security probably comes from the fact that it was relatively secure many years ago.

Android and ChromeOS use selinux to sandbox the browser. Fedora uses selinux, too, but it only sandboxes server software: any program including a web browser started by the user is unconstrained (unaffected) by Fedora's selinux implementation.

The kernel is another important attack vector (and Linus has always been bored by and impatient with security considerations.)

Ditto the C library. Note that GrapheneOS uses a special, hardened C libary (which in the last few years has migrated to at least one security-focused Linux distro, namely, secureblue, but of course none of the people that show up here on HN proudly proclaiming that Linux is more secure than iOS or Android use secureblue, and the lead of the secureblue project freely admits that MacOS iOS Android and ChromeOS are more secure than secureblue is).

You know how one of the arguments for Wayland is the fact that there is no way to prevent any process from reading the contents of any X window? Well, to actually achieve this "window privacy" inherent in Wayland requires active support from the compositor, and Gnome has the only Wayland compositor that actually provides this support.

Till the vulnerability started getting exploited some time last year, anyone could upload a theme to KDE's theme store that could run arbitrary code when the user chose to install it. No one was reviewing uploaded themes for malware or warning users of the danger.

Hyprland uses a trampoline (files at a known location in the file system that are occasionally executed by Hyprland) for reasons that are hard to explain if we assume that Hyprland's maintainers care anything about security.

replies(1): >>45094326 #
286. p1esk ◴[] No.45092863{5}[source]
I’m not “elite” of any kind.
287. fragmede ◴[] No.45092873{13}[source]
> However having to cut and paste a meme into ~/Downloads so I can share it on Discord or Slack is a constant PITA.

Why round trip it through the file system or Files.app? That seems like extra (annoying) work On my iPhone, I copy the meme onto the clipboard and then I open discord/slack/signal/Whatsapp and find the right channel/chat, and paste right in there.

288. turboat ◴[] No.45092916{4}[source]
Interesting. If you don't mind, I have a few questions:

1. Is the "big VM with root" running macOS itself, or a different OS?

2. Do you do any work on the bare metal version of macOS, or do you just start the VM in the morning and do everything from there?

3. How do you experience the performance/UX of the VM?

4. Do you know why Company B IT has set up this VM solution, instead of a plain old MacBook locked down with Apple's enterprise management tools?

5. Can you explain more about the App Store? Is it the actual Apple App Store but restricted to a curated set of apps, or is it a different system? If so, is the store a custom in-house thing or is it provided by a vendor?

replies(2): >>45096416 #>>45107704 #
289. GoblinSlayer ◴[] No.45092935{7}[source]
>Installation is not the same as support and isn't the same as trouble shooting.

The meme is still alive that windows accumulates garbage and becomes slower with time, so you need to reinstall it periodically. Reinstallation is also how you fix regressions, because ms is busy with cloud services.

>It isn't unusual situation in Linux.

As I remember, on linux I have an ample choice of kernel versions, but I didn't encounter regressions. For windows intel provides only the latest drivers.

replies(1): >>45097002 #
290. komali2 ◴[] No.45092955{4}[source]
That was my fictional proposal, I wasn't clear enough about that in my post.
291. goodpoint ◴[] No.45093013{6}[source]
...and it will be too late.
292. jjani ◴[] No.45093094[source]
It is no coincidence whatsoever that the control accelerated at a pace seen never before just as those two words entered the vernacular. Censorship of such topics on places like Reddit and Youtube tenfolded. It scared them. It's the only thing that works.
293. GoblinSlayer ◴[] No.45093101{3}[source]
A smartphone is not a good video device due to small screen. If you do, you just become zombiewalking.
294. wizzwizz4 ◴[] No.45093110{8}[source]
Correct. But proprietary wheel reinvention is necessary (albeit clearly not sufficient) for progress, so we mustn't prohibit it!
replies(1): >>45093454 #
295. king_geedorah ◴[] No.45093119{8}[source]
The web is open and is famously very competitive. We have three whole browser engines and only two of them are implemented by for-profit corporations whose valuations have 13 digits. I mean other ones exist, but the average modern developer claims it's your fault when something doesn't work because you use firefox or safari and also demands the browser rewrap all the capabilities the operating system already provides for you because they can't be assed to do the work of meeting users where they are.
replies(1): >>45093426 #
296. lwhi ◴[] No.45093426{9}[source]
In a world with over 3 billion people we have 'three whole browser engines'.

I don't want to be mean, but this isn't a great counterpoint.

replies(1): >>45093789 #
297. lwhi ◴[] No.45093454{9}[source]
No it isn't necessary for progress.

Standards can be (and are) developed cooperatively and these still allow and encourage progress.

replies(1): >>45093816 #
298. const_cast ◴[] No.45093464{4}[source]
I don't think Google play integrity and only allowing installing blessed apps on blessed devices is more secure. I just don't.

Google blesses malware all the time because otherwise they would go bankrupt. They're an ad company, not a security company.

299. const_cast ◴[] No.45093488{5}[source]
> That is because Windows for the most part manages itself

Windows is the least "manage itself" OS out of all OS available today. It needs pretty constant maintenance and esoteric enchantments to keep trucking.

replies(2): >>45095703 #>>45096984 #
300. const_cast ◴[] No.45093541{5}[source]
If we have to always appeal to the lowest of the low, the stupidest of the stupidest, then society sucks ass.

What's even the point of me being alive is I can't do anything that isn't completely idiot-proof and made for goo goo ga ga users?

Look, I get it. Think of the children! Think of the granny!

But I'm not a child, I'm an adult. I would like to be treated as such. Otherwise what the fuck are we even doing here? Why can't I just live in daycare forever? Why am I paying bills?

301. safety1st ◴[] No.45093770{4}[source]
I'm not opposed to open standards, but what makes you think that a corporation which simultaneously violates anti-trust law in three markets and evades meaningful enforcement can be forced to comply with standards?

The problem is not primarily technological, it is a problem of rule of law. Google is a serial violator, found guilty multiple times. So it is a failure of enforcement of law (unless government actions in the near term end up being very dramatic).

If someone points a gun to your head, I guess you could solve that by inventing a personal forcefield. But until you do, we need law enforcement as a deterrent against murder. Otherwise murderers will just keep on doing it.

302. king_geedorah ◴[] No.45093789{10}[source]
I'm not sure what the number of people in the world has to do with whether an open standard does or doesn't promote innovation. The user asked for a case where an open standard didn't do that and I provided one. Whether you think it's a great counterpoint is entirely irrelevant to me.
replies(1): >>45093984 #
303. wizzwizz4 ◴[] No.45093816{10}[source]
C23 would not be nearly as good as it is without proprietary C compiler extensions, and other non-C programming languages. Sure, C23's versions of some features are better than many proprietary implementations, but they wouldn't exist at all if the lessons hadn't been learned from that exploration.

Once upon a time, Jabber was the messaging protocol. But what killed interoperable instant messaging wasn't a shift away from Jabber: it was a shift away from interoperability. Requiring all chat communication systems to be Jabber wouldn't have helped, and it would have prevented IRCv3.

replies(1): >>45094462 #
304. lwhi ◴[] No.45093984{11}[source]
But browser engines are entirely functional based on open standards!!!!!

This is the core proposition!

The benefit of open standards here, is to the consumers of these standards .. not the engines.

Open standards allow the consumers (websites / apps) to be able to benefit.

replies(1): >>45094901 #
305. komali2 ◴[] No.45094009{7}[source]
I didn't use the right word, maybe you can help me pick a better one. You are of course correct that technology has many times completely changed our societies, but my point is that despite overwhelming transformations, the core of societal organization doesn't change: those with capital control those without. Those with capital determine what labor those without may do, when, where, and what becomes of the result of that labor.

The printing press resulted in the first ultrapowerful media companies that were able to capitalize on later revolutionary technologies such as radio and television (for those nimble enough to keep up with the times). Even in that era the newspaper was leveraged to serve the needs of the wealthy and solidify their power. Countless unpublished books that couldn't get picked up by the publishing houses. And the end game of those media technologies is Rupert Murdoch, Disney.

You are right, power shifted from the church to other Capital holders. And the laborers continued to labor at the whim of some new master.

Railroads led to Standard Oil and America's first ultra powerful monopolies, laying rail to serve their needs (or wasting rail to suck money from the government) rather than the needs of the people.

Sailboats created the East Indian trading company and actual corpotocracies, as you said.

Incredible changes to society in so many ways except perhaps the most important, and that's my point: it won't be technology in the end. It wasn't technology that led to the syndicalization of pre Franco Spain, or the revolutions in Russia and the ROC, or the development of the Paris commune, events that signify some of the few brief times in our history that the core paradigm was shifted if only briefly.

replies(1): >>45099618 #
306. altairprime ◴[] No.45094130{3}[source]
No, I’m talking about the Engine Control Module.
307. raxxorraxor ◴[] No.45094326{6}[source]
Of course the browser still is an attack vector but the relevancy of that vector is lower today. Same goes for these examples. These are exploits and they will always exist, sandbox or not. A few years ago you could log in to MacOS as root without a password. Meta just released a memo two days ago that Whatsapp exploits compromised Android and iOS devices. Guess it was sandboxed, but all users allowed the app to access files and contacts anyway.

Today the main problem is social engineering and scams. The disadvantage of mobile OS are too great to justify bad approaches to desktop systems or security in general. And for browsers that means the security threat isn't some arcane media decoder, it is the well made phishing site.

But my argument is more that perhaps I don't want window privacy because it doesn't fit my security needs and reduces functionality and access. And one assumption in that is that one compromised app can compromise the whole system in the worst case and believe risks must be mitigated elsewhere. In case of doubt, I can reasonably sandbox something I execute myself, if the need is warranted.

I would love a good file explorer for my mobile device. But file access is restricted. How many hours wasted to bad security...

replies(1): >>45094658 #
308. lwhi ◴[] No.45094462{11}[source]
>Once upon a time, Jabber was the messaging protocol. But what killed interoperable instant messaging wasn't a shift away from Jabber: it was a shift away from interoperability.

And how is interoperability possible without agreed standards?

replies(1): >>45095971 #
309. g-b-r ◴[] No.45094578{8}[source]
> There have been literally thousands of documented incidents of this.

Of making people export all their credentials from a password manager and send them to a scammer?

310. seba_dos1 ◴[] No.45094658{7}[source]
It's always entertaining to see security people struggling to understand what security is there for. They just consider "security" as the goal in itself, because being more secure is obviously good, right? Yo dawg, I've put a sandbox into your sandbox so you can be secure while you are secure.

If you insist that using software with trampolines means not "caring anything about security", I'm afraid it's a you problem. I'll still be happy to hug my partner when she comes home regardless of what germs might have been on a tram's seat she was sitting on on the way there, regardless of whether someone thinks that this means I don't care anything about health (I'm sure someone does).

In case someone needs it spelled out: I do care, but there are other things I care about too and I won't let some minuscule threats ruin them.

replies(1): >>45095863 #
311. _heimdall ◴[] No.45094881{8}[source]
Did you see my earlier comment? Car manufacturing for decades or so years didn't have open standards with regards to parts used or how they were built. We ended up with a huge number of competing car manufacturers compared to what we have today.
replies(1): >>45096521 #
312. altairprime ◴[] No.45094886{3}[source]
I appreciate your support of this position :)
313. _heimdall ◴[] No.45094901{12}[source]
The presumption that started this thread is that open standards are always good for competition. I think browsers are a good counter example where open standards led to three browser vendors, we have less competition rather than more.
replies(2): >>45095680 #>>45097013 #
314. ◴[] No.45094908{7}[source]
315. ◴[] No.45094965{3}[source]
316. lucideer ◴[] No.45095473{7}[source]
No, boycotting them is entirely orthogonal to the issue. Passkeys have no role in ensuring that we do or don't rely on remote attestation - they're two totally separate considerations.

Passkeys have many benefits over current alternatives for auth, & the inclusion of remote attestation doesn't make them worse than current auth because all current auth can be coupled to remote attestation.

Continue to oppose remote attestation but do use Passkeys. They're a massive improvement.

317. tadfisher ◴[] No.45095502{7}[source]
Yes, that's the motivation.

These days I would explore the TPM option, but I'm worried that has less legal teeth than a physical key if I'm in a law enforcement situation.

There's also practicality; I really, really don't want to tell my boss that TSA or whoever had access to the company git repositories and databases for X minutes or hours, and that's sidestepped by checking a bag with the Yubikey (wastes their time) or mailing it to the destination (needs a warrant).

318. fsflover ◴[] No.45095680{13}[source]
Do you expect that browsers relying on closed standards would result in more competition under the same circumstances? You didn't demonstrate that.
replies(1): >>45098673 #
319. tadfisher ◴[] No.45095690{9}[source]
Source? That is surprising news.
320. josephg ◴[] No.45095703{6}[source]
That’s not my experience with it. I have 2 windows installations at home and they both seem fine.

I must admit - I spent about an hour figuring out how to turn off telemetry and other junk after installation. But since then, windows has been trucking along just fine.

replies(1): >>45102840 #
321. josephg ◴[] No.45095863{8}[source]
The threat model I think about a lot is supply chain attacks.

We’ve found out about a handful of such attacks over the last few years - like xz. And I’ve seen the number of random dependencies which get pulled in by most nodejs, cargo or python projects. The dependencies just scroll on by. There is no vetting process for putting code in npm or cargo. Nobody signs off on anything. Nobody reads the source code. There are no checks, and you can put anything in there.

If malicious code slipped in, would you even notice? I probably wouldn’t. How terrifying.

Linux’s security model means that any malicious code in a crate can run as me and access all of my files. Or delete them or whatever it wants to do. To me this is crazy. There’s no reason to give arbitrary untrusted code full permissions to all of my files and data - but there we have it.

I worry that it’s only a matter of time before we see more attacks like this. It’s such an obvious attack. And our lax endpoint security makes the vulnerability a way bigger problem than it needs to be. It would be trivial for a remote attacker to install C&C software on my computer. They could grab my SSH certificates and install backdoors in any of my projects on github. Read my email. Impersonate me. Crypto locker my stuff. Install malicious extensions into my web browser. And on and on.

None of this would be possible with proper isolation. There’s no reason a build.rs file needs write access to my whole filesystem. It’s crazy.

322. mcv ◴[] No.45095936{4}[source]
Well, one issue with the app store solution at my workplace is that you can still download anything, even if you can't install it. And executables can still be executed even from your downloads folder. Or your personal bin folder. So preventing people from executing unknown apps is not going to work that way.

But then again, we write and execute our own code, so of course we have to be able to execute unknown code.

The whole thing feels like an exercise in futility to me. It would make more sense to specify what rights a specific application should have. Let me approve the external urls it wants to visit, the folders it wants to access, etc. Shield everything else off.

323. SirMaster ◴[] No.45095938{7}[source]
>decrypting things like 4K Netflix content, among other things, generally requires you to have something like a Widevine L1 CDM from one of the Netflix-approved devices, which typically sits in those hardware trusted execution environments, so you need an active valuable exploit or insider leaks from someone at one of the manufacturers.

Or just use a cheap Chinese HDMI splitter that strips HDCP 2.2 and record the 4K video with a simple HDMI capture device.

But if you are talking about preserving media or making media accessible, then it's not like we NEED 4K.

324. wizzwizz4 ◴[] No.45095971{12}[source]
The same way it always has been? Microsoft Office implements the WordPerfect formats, and WordPerfect implements the Microsoft Office formats.
replies(1): >>45103027 #
325. josephg ◴[] No.45096009{13}[source]
> If you want to share stuff between applications like data, […]. You will need to give it access at least to your file-system. The more of this you do, you will either have to give more access or having to faff moving stuff around.

Why are those the only answers?

If we had free rein to redesign our computers from the ground up, there’s lots of other ways that problem could be solved.

One obvious example is to make copy+paste be an OS level shortcut so apps can’t access the clipboard without the user invoking that chord. Then just copy paste stuff between applications.

Another idea: right now when I invoke a shell script, I say “foo blah.txt”. The argument is passed as a string and I have to trust that the program will open the file I asked - and not look instead at my ssh private keys. Instead of that, my shell program could have access to the filesystem and open the file on behalf of the script. Then the script can be invoked and passed the file descriptor as input. That way, the script doesn’t need access to the rest of my filesystem.

If we’re a little bit creative, there’s probably all sorts of ways to solve these problems. The biggest problem in my mind is that Unix has ossified. It seems that nobody can be bothered making desktop Linux more secure. A pity.

Maybe it’s time to give qubes a try.

326. worldsayshi ◴[] No.45096179{6}[source]
I agree with this. And yet.

> It is simply that, eventually, people learn how to use technology to their advantage.

What should we call this accumulation of lessons in how to do things for your benefit? It can be and is encoded as algorithms is it not?

327. yencabulator ◴[] No.45096416{5}[source]
It's funny because some 25 years ago we did the exact opposite. Corporate IT insisted on some Windows software, so we each ran a Windows VM that the corporate could pretend to remote manage.

(This was at a branch office where every employee worked on very low-level Linux kernel code, so yeah everyone ran their favorite Linux distro.)

328. fsflover ◴[] No.45096521{9}[source]
Didn't older cars rely on open standards making it possible to go to any repair shop? Or maybe it was effectively open stanards, i.e., nothing prevented you from learning how they worked and modifying them.

Nowadays, all cars became hostile to users thanks to the closed software: https://www.theregister.com/2023/09/06/mozilla_vehicle_data_... I wouldn't call it "better competition".

replies(1): >>45098704 #
329. yencabulator ◴[] No.45096544{10}[source]
Which leads us back full circle to "Passkeys are incompatible with open-source software" from https://news.ycombinator.com/item?id=45090297
330. ekianjo ◴[] No.45096703{4}[source]
> legal obligation to to assess and mitigate risks

It's obviously not about risks. It's about convenience on their side to only support 2 platforms and call it a day.

331. extraisland ◴[] No.45096984{6}[source]
No it doesn't. I barely do anything to manage my Windows Installation. I install loads of garbage (I mostly still run the same programs as I did 15 years ago).

I don't understand why people propagate these falsehoods.

replies(1): >>45102835 #
332. extraisland ◴[] No.45097002{8}[source]
> The meme is still alive that windows accumulates garbage and becomes slower with time, so you need to reinstall it periodically.

I've not needed to worry about this since Windows XP. Which was what? 25 years ago almost.

> Reinstallation is also how you fix regressions, because ms is busy with cloud services.

I've never had hardware regressions with Windows. I've had plenty of weird and annoying bugs return with Linux.

e.g. My Dell 6410 has an issue where the wifi card would die after suspend with kernel 6.1. However it would get fixed by a patch, and then get unfixed the next patch.

> As I remember, on linux I have an ample choice of kernel versions, but I didn't encounter regressions. For windows intel provides only the latest drivers.

"Swings and Roundabout".

Again. It is a pretty niche problem. I've had plenty of weird hardware regressions with the Kernel. Recently there was a AMD HDMI audio bug, IIRC it was kernel related.

replies(2): >>45097316 #>>45100110 #
333. lwhi ◴[] No.45097013{13}[source]
Without open standards, we would need to pick a browser and provide for it.

If we needed to support another browser we'd need to provide a new solution built to its specification.

Open standards have allowed the possibility of multiple browser vendors, without making the life of browser consumers (i.e. developers and organisations providing apps and sites) a living hell.

Without this, we'd be providing apps and sites for a proprietary system (e.g. Macromedia Flash back in ancient history).

Furthermore, when Flash had cornered a market, it had absolutely no competition at all. A complete monopoly on that segment of the market.

It took Steve Jobs and Apple to destroy it, but that's a different story.

--

The reasoning for only three engines, isn't the fault of open standards.

There are many elements of our economic system that prevent competition. Open standards is not one of them.

replies(1): >>45098688 #
334. josephg ◴[] No.45097316{9}[source]
I’ve had the same experience. Never had a regression with windows. Had plenty with Linux.

One Linux kernel version broke hdmi audio and another fixed it. Recently a change to power management has made my Intel Ethernet controller stop working about an hour after the computer boots up. And so on. Each time I’ve needed to pouring through forums trying to find the right fix. That or pin an older version which worked correctly.

335. hollerith ◴[] No.45097589{3}[source]
>It's the only OS that has managed this transition to all-sandboxed-all-the-time.

Apps are all-sandboxed-all-the-time on iOS and Android, too; right?

replies(1): >>45101094 #
336. bigyabai ◴[] No.45098402{3}[source]
Sure is slow. The FOSDEM audience you're describing sounds identical to the one from 15 years ago.
replies(1): >>45100383 #
337. _heimdall ◴[] No.45098673{14}[source]
My original demonstration wasn't actually the browser question. Auto manufacturers did show much higher levels of competition before standards and shared components.

Though it is worth noting that there was heavy competition in the browser space prior to the specs we have today. Part of the reason we ended up with a heavily spec-driven web is precisely because the high level of competition was leading to claims of corporate espionage, and it was expected that end user experience would be better with standards.

I absolutely agree the end user experience is better. I disagree that has anything to do with competition.

replies(1): >>45100904 #
338. _heimdall ◴[] No.45098688{14}[source]
Browser engines are extremely difficult to start today because of the extensive, complicated, and ever growing list of specifications.

We had a web before open standards. It wasn't the best user experience and each browser was somewhat of a walled garden, but there was heavy competition in the space.

replies(1): >>45100883 #
339. _heimdall ◴[] No.45098704{10}[source]
Older cars could go to most mechanic shops because older cars were more simple. The fundamentals of how the cars worked were similar not because the companies collaborated on parts and designs but because they were comparatively simple and all were based on combustion engines that required certain components and physics to be similar.

Well, most. There were the odd steam powered and even early electric vehicles back then. I wouldn't expect either to roll into any mechanic shop in town and get service.

340. nobody9999 ◴[] No.45098882{7}[source]
>I felt like Orwell made the point well enough in 1984.

True enough. Although I think Frederick Pohl and C.M. Kornbluth came closer to our current situation with The Space Merchants[0] (which I just read, almost by accident).

Orwell was more explicit in his exposition of totalitarianism and told a more compelling story than Pohl/Kornbluth did in their tale of authoritarian/corporatist dystopia.

That said, the universe of The Space Merchants more closely matches the current environment, IMHO.

[0] https://en.wikipedia.org/wiki/The_Space_Merchants

replies(1): >>45099661 #
341. josephg ◴[] No.45099588{7}[source]
I've said this elsewhere in this thread - but I think it might be interesting to consider how capabilities could be used to write simple scripts without sacrificing simplicity.

For example, right now when you invoke a script - say "cat foo.js" - the arguments are passed as strings, parsed by the script and then the named files are opened via the filesystem. But this implicitly allows cat to open any file on your computer.

Instead, you could achieve something similar with capabilities. So, I assume the shell has full access to the filesystem. When you call "cat foo.js", the shell could open the file and pass the file handle itself to the "cat" program. This way, cat doesn't need to be given access to the filesystem. In fact, literally the only things it can do are read the contents of the file it was passed, and presumably output to stdout.

> It will be much more complex.

Is this more complex? In a sense, its exactly the same as what we're doing now. Just with a new kind of argument for resources. I'm sure some tasks would get more complex. But also, some tasks might get easier too. I think capability based computing is an interesting idea and I hope it gets explored more.

replies(1): >>45101997 #
342. safety1st ◴[] No.45099618{8}[source]
We are totally talking about a technology-driven shift in who controls society though. In the past it was kings and the church and their wealth was certainly a factor but the king's direct control over the state monopoly on violence, and by extension over land, and the church's control over information and belief, were the greater factors. Remember all these kings started out mostly as thugs with bands of other thugs behind them who had the biggest weapons and the most violent tendencies. And the churches started out as smaller dudes who were willing to eat mushrooms, wear face paint, and tell stories about how the biggest thug in the pack was the son of a god so you had better obey him.

Now, because of technology shifts, it's the political/bureaucratic and merchant classes in charge. The king and the church are pretty much powerless. The military class has gone both ways depending on what country we're discussing. In some their growing ability to commit mass killing has given them dictatorship powers. In others they are relatively defanged by the political/merchant classes.

Wealth is a very interesting thing because it was originally a byproduct of power. The king sent soldiers to collect taxes. The church propagandized you into tithing. Now the relationship is inverted and the wealth creates the power. Silicon Valley spends $140M on lobbying to get the legislative outcomes they want.

IMO the more we zoom in to shorter spans of time the less we see technology toppling an entire class of elites in favor of another. It doesn't happen in 30 years. It takes hundreds. That said, technology seems to just keep on moving faster, so I wouldn't discount it playing a bigger role in the future than it did in the past.

343. safety1st ◴[] No.45099661{8}[source]
That looks like a great book, I'll have to check it out!

My go-to in fiction for comparison with the authoritarianism of the modern world is actually Brave New World. We were drugged (whether pharmacologically or psychologically) into submission, more than we were beaten into it.

1984 is great however for getting the surveillance point across in the most brutally direct way possible. The telescreen was a mind-bogglingly prescient idea for a guy writing a book in the 1940s. "Omnipresent and almost never turned off, they are an unavoidable source of propaganda and tools of surveillance." We actually did it. We invented and embraced George Orwell's telescreens of 1984, en masse. The only difference is we put them in our pockets and carry them around all day, instead of having them in our living rooms.

replies(1): >>45100544 #
344. josephg ◴[] No.45099867{7}[source]
Thanks for educating me there champ. I'm sure you're very smart. But I've been writing software for a few decades now. Longer than a lot of people on HN have been alive. There's a good chance the computer you're using right contains code I've written. Suffice it to say, I'm pretty familiar with the idea of engineering tradeoffs. I suspect many other people in this thread are familiar with it too.

You missed the point the person you were replying to upthread was making. You're technically right - there is always some tradeoff when it comes to engineering choices. But there's a pernicious idea that comes along for the ride when you think too much about "engineering tradeoffs". The idea is that all software exists on some paraeto frontier, where there's no such thing as "better choices", there's only "different choices with different tradeoffs".

This idea is wrong.

The point made upthread was that often the cost of some choice is so negligible that its hardly worth considering. For example, if you refactor a long function by splitting it into two separate functions, this will usually result in more work for the compiler to do. This is an engineering tradeoff - we get more readability in exchange for slower compile times. But the compilation speed difference is usually so miniscule that we don't even talk about it.

"Everything comes with tradeoffs" is technically true if you look hard enough. But "No, not everything is a trade-off. Some things are just good and some are just bad" is also a good point. Some things are better or worse for almost everyone. Writing a huge piece of software using raw assembly? Probably a bad idea. Adding a thorough test suite to a mission-critical piece of software? Probably a good idea. Operating systems? Version control? Yeah those are kinda great. All these things come with tradeoffs. But the juice can still be worth the squeeze.

My larger point in this thread is that perhaps there are ways we can improve security that don't make computing measurably worse in other ways. You might not be clever enough to think of any of them, but that isn't proof that improvements aren't possible. I wasn't smart enough to invent typescript or rust 20 years ago. But I write better software today thanks to their existence.

I would be very sad if, in another 30 years, we're still programming using the same mishmash of tools we're using today. Will there be tradeoffs involved? Yes, for sure. But no matter, the status quo can still be improved.

> Realistically. Operating system security is much better than than it was. [...] So I would say it is in the area of diminishing returns already. So the level of threats I face and most people face, it is already sufficient.

What threat models are you considering? Computers might be secure enough for you, but they are nowhere near secure enough for me. I also don't consider them secure enough for my parents. I won't go into detail of some of the scams people have tried to pull on my parents - but better computer systems could easily have done a better job protecting them from some of this stuff.

If you use programming languages with a lot of dependencies, how do you protect yourself and your work against supply chain attacks? Do you personally audit all the code you pull into a project? Do you continue doing that when those dependencies are updated? Or do you trust someone to do that for you? (Who?). This is the threat model that keeps me up at night. All the tools I have to defend against this threat feel inadequate.

345. GoblinSlayer ◴[] No.45100110{9}[source]
>I've never had hardware regressions with Windows.

Until recently I didn't either. Windows resizing to 640x480 when display turns off and sound resetting to 100% after a toast notification.

>It is a pretty niche problem.

I think hdmi audio is a niche problem. What do you even use it for? With linux you can at least try a different version, with windows you have to just eat it.

346. zeroCalories ◴[] No.45100128{7}[source]
> Capital doesn't really care what you want, it will exert control regardless.

Working as intended. The market doesn't care what capital wants either.

> So in this case Netflix will continue to be part of capital that normalizes the need for DRM to access videos

I can access video without DRM. If you want to access Netflix's service that's on you.

> write IP law

Netflix does not write IP law, our politicians do. Vote better.

> generally force you into either accepting the world they want or forcing you to become a hermit.

I don't accept their world, and I'm not a hermit.

347. pjmlp ◴[] No.45100383{4}[source]
Yes, which kind of shows what current generation cares about.

Yearly FOSDEM was all about carrying on devices where BSDs and Linux distros managed to run on, with all the FOSS ecosystem around them.

348. nobody9999 ◴[] No.45100544{9}[source]
>That looks like a great book, I'll have to check it out!

Honestly, I wasn't all that impressed with the novel. The characters were rather two-dimensional and the plot was somewhat muddled.

That said, its depiction of a corporatist/authoritarian society incorporates some of the tropes (rewriting history, mass market influencing/propaganda, redefining "good" and "bad", demonizing the "other" etc.) included in 1984 and Brave New World (BNW), but in a far right wing context. Which, as I mentioned, is more apropos to current circumstance than are the left wing "utopias" depicted in 1984 and BNW.

As such, while I don't discourage you from reading The Space Merchants (or its 1984 sequel, The Merchants' War -- which I haven't read), I'm not saying it's a fabulous piece of literature. Pohl[0][2] has written much better stuff, with similar cynicism but significantly better plotting and character development and takes on technology (cf. Heechee Saga[1] -- which I highly recommend -- and others).

In any case, I agree with your assessment of BNW WRT today, but with a far right wing dystopic bent rather than a far left wing dystopic one -- hence my reference to The Space Mechants.

[0] https://en.wikipedia.org/wiki/Frederik_Pohl

[1] https://en.wikipedia.org/wiki/Heechee_Saga

[2] Pohl was, as were many mid 20th century Sci-Fi (and other) authors, alarmed by the rapid population growth after World War II, especially as Malthus[3] was widely read at the time and we had not yet seen the fruits of the widespread agriculture technology deployment of the 20th century (Green Revolution[4]).

[3] https://en.wikipedia.org/wiki/An_Essay_on_the_Principle_of_P...

[4] https://en.wikipedia.org/wiki/Green_Revolution

Edit: Clarified prose. Added footnotes for more detail.

349. lwhi ◴[] No.45100883{15}[source]
It was a literal hellscape before open standards.

I imagine there's most likely a subset of the population who believe that open standards are aligned conceptually to regulation, and that any form of regulation in a free market is wrong.

This subset of the population is misguided at best, and delusional at worst.

Open standards are essential.

replies(1): >>45101766 #
350. lwhi ◴[] No.45100904{15}[source]
Without open standards, we would likely choose _one browser_, due to the economic cost of development.

One manufacturer would call all the shots for the _one browser_.

There would be zero competition until something calamitous happened to the manufacturer and the pendulum swung to a new monopolist.

We even have an example of how this plays out to fall back on; Macromedia Flash.

351. mike_hearn ◴[] No.45101094{4}[source]
Right, I should have said only desktop OS.
352. _heimdall ◴[] No.45101766{16}[source]
Did that hellacape include more competition between companies building web browsers?
replies(1): >>45118858 #
353. alexvitkov ◴[] No.45101997{8}[source]
> how capabilities could be used to write simple scripts without sacrificing simplicity.

I proposed a solution for that in my original comment - you should be able to trivially bypass the capability system if you trust what you're running ($ yolo my_script.sh).

The existance of such a "yolo" command implies you're running in a shell with the "full capabilities" of your user, and that by default that shell launches child processes only a subset of those. "yolo" would then have to be a shell builtin, that overrides this behavior and launches the child process with the same caps as the shell itself.

354. const_cast ◴[] No.45102835{7}[source]
Because we actually use the operating system?

Windows rots. Even a few days without a reboot and things will just stop working or be really slow. No idea why.

But if you don't clean install once every few years you'll just have a ton of shit everywhere. Programs don't clean themselves up.

Also every program has its own update mechanism. Great... now I don't just have to manage windows update, but also a few dozen other esoteric update mechanisms.

iOS and Android are self managing. Windows? Can we be for real? Why get on the internet and lie to people?

355. const_cast ◴[] No.45102840{7}[source]
I use Windows at work, this is just not my experience. It needs to be rebooted every couple days or things just don't work.
replies(1): >>45113279 #
356. lwhi ◴[] No.45103027{13}[source]
Which is a process of reverse engineering and guess work.
replies(1): >>45103526 #
357. touristtam ◴[] No.45103036[source]
I'll be "funny" to publish findings about apps on a very public page and see it being brought to the forefront of the news cycle. A bit of a name and shame type of things, since Corps don't seem to understand any other language.
358. wizzwizz4 ◴[] No.45103526{14}[source]
Unless the formats are clearly-documented, and not overcomplicated. The WordPerfect format is philosophically similar to RTF, except that it's easier to get a plain-text version. Quoth http://justsolve.archiveteam.org/wiki/WordPerfect:

> If you're a programmer attempting to get a program to extract the plain text out of a WordPerfect document, and are not interested in the fancy formatting and other features, this is a fairly simple process; just make the program skip the parts that are not text.

The "fancy formatting" is pretty easy to parse, too, as I understand (though I've never tried it): it's pretty much one-to-one with what's shown in the program's UI, which is literally designed to be easy to understand.

Formats like DOC (Microsoft Office's pre-DOCX format) and PSD (PhotoShop's horrid mess) require reverse-engineering, even given the (atrocious) documentation, because they're overcomplicated and the documentation is not complete. This is what I'm saying should be prohibited. We don't need to mandate that people use existing protocols or file formats.

replies(1): >>45105681 #
359. rahkiin ◴[] No.45104038{6}[source]
Cryptocurrencies do not solve any issues described above. It even solves fewer of them as there is no bank giving you support or giving back insured money
replies(1): >>45115968 #
360. FredPret ◴[] No.45104398{4}[source]
I think everyone would have a problem with the type of domination exhibited by Apple & Google, if they understood it.

There are many voters who are not well versed in tech. You can see this reflected in the kinds of politicians that win, and in the types of issues they are (and are not) fighting over.

It's up to us to make the issues clear and simple.

361. NoGravitas ◴[] No.45105105{3}[source]
> It's the only OS that has managed this transition to all-sandboxed-all-the-time.

Depending on how broadly you define [desktop] OS. There are immutable Linux distributions like Fedora Silverblue or Kinoite where all user apps are run from Flatpak, and so have sandboxing. I'd say it's less mature than MacOS but it's catching up.

replies(1): >>45113244 #
362. lwhi ◴[] No.45105681{15}[source]
None of this is about mandating or forcing adherence.

Open standards allow interoperability by default. Open standards simplify development. Open standards encourage the creation of new markets. Open standards allow competitiveness that provides the consumer with choice, which is ultimately what a free market economy thrives on.

replies(1): >>45110392 #
363. mlrtime ◴[] No.45107704{5}[source]
There are multiple choices of OS but it's mostly Windows or Linux. Note, we don't do any mac/arm development.
364. wizzwizz4 ◴[] No.45110392{16}[source]
How would you suggest we ensure that the large corporations adhere to open standards, if not by mandating it?
replies(1): >>45113340 #
365. rblatz ◴[] No.45110661{4}[source]
NPR had 3 stories last week in their NPR News Now Podcast about K-Pop Demon Hunters. Like I said it has 4 songs on the Billboard Hot 100 all in the top 10. It's the best performing movie ever on Netflix with over 236 million streams. It was so successful they actually did a run of showings on over 1,700 screens topping the box office charts for that week and grossing over 18 million in a weekend.

I'm not sure what else it would need to do besides dominate the music, box office, and streaming charts to be considered a success. It was widely covered in the news media as well. I predict that Rumi is going to be maybe the most popular costume with kids this year. My daughter and all her friends all claim they're going to be Rumi for halloween.

Stranger Things was huge, and maybe it's trailed off over the years. It never was quite as big as say Game of Thrones, but it was probably at least same tier as a Ted Lasso.

Wednesday is big as well, but hasn't dominated the work conversations as much as other shows, but I've heard it routinely mentioned in media. Wednesday Addams is also predicted as a top costume this halloween. The Wednesday dance was definitely a huge cultural meme last season.

But I guess to your point, there isn't something as big as a Game of Thrones out there right now on Netflix. But they have hit a pretty hot streak recently.

366. mike_hearn ◴[] No.45113244{4}[source]
Good point, I'd forgotten about all-Flatpak distros.
367. josephg ◴[] No.45113279{8}[source]
I wonder why! Has your workplace installed weird junk on the machine which is gumming it up? Are you using some set of configuration options that microsoft doesn't regularly check?

My experience of windows is that it works pretty well these days. But I don't develop on windows - I just use it for entertainment (steam, vlc, etc). So there's probably a lot of edge cases that I'm not hitting.

replies(1): >>45121657 #
368. lwhi ◴[] No.45113340{17}[source]
Are browsers mandated to follow standards?
replies(1): >>45120590 #
369. BlueTemplar ◴[] No.45114735[source]
KISS : Have a separate device to do banking, and ONLY banking on.

(More tech savvy users could instead boot into a different partition.)

370. johnisgood ◴[] No.45115968{7}[source]
They could, but in any case, any alternatives to cryptocurrencies, cash, and cards?
371. matheusmoreira ◴[] No.45118021{4}[source]
It's not a technical problem. It's a social, legal and business problem.

Computers are subversive. They have the power to not only wipe out entire sectors of the economy but also defeat governments and militaries. If you let people run software freely, they can give themselves the power to do things like block ads and copy artificially scarce data at zero cost, directly impacting the bottom line of corporations. And that's when they don't run cryptography, cryptocurrency and anonymization software to escape government control.

So these businesses and governments have every reason in the world to usurp control of your computer. They want computers to only run software that's been authorized by them, so that you can do nothing that harms their interests.

It's not your computer, it's theirs, they're just letting you use it, and only if you follow company and government policy. And it's not at all about your security against external attackers in general, it's about their security against you.

It's got nothing at all to do with "capabilities". It's got everything to do with putting you in digital shackles so that you are forced to live in a dystopian cyberpunk technofeudalist digital fiefdom as a serf who pays and consumes in perpetuity.

372. fsflover ◴[] No.45118858{17}[source]
With Microsoft bundling IE with the OS, no.
373. wizzwizz4 ◴[] No.45120590{18}[source]
It is literally impossible to implement the full WHATWG spec, as an independent developer.
replies(1): >>45124258 #
374. const_cast ◴[] No.45121657{9}[source]
It wasn't ever different when I ran windows on my personal computers, although granted that was back in 8.1. 8.1 was just bad for a variety of reasons, but it definitely still had the rot problem.

The latest in my saga of Windows being annoying is applications just randomly killing themselves when I'm not looking. I don't reboot my work computer because I have far too much precious stuff open.

But, every other day or so, an application or two will mysteriously disappear from my taskbar. Silently. I never catch it, then I get the "hey did you see this email??"

Why no, no I did not. Outlook committed suicide at some point and I'm not pocket watching the windows taskbar. My mistake.

For a while I thought I just hallucinated me closing the application, but I don't close applications, like, ever.

To put into perspective, my work has a policy which forcefully reboots windows once every 14 days. It helps, but not much, because by day 2-3 it's already breaking down. My Debian machine has an uptime of a few hundred days. I legitimately still have applications open from last year.

Maybe I use my computer like a psychopath, or maybe my expectations are too high, but I don't consider windows to take care of itself. Its the most babying-an-OS I ever have to do. iOS and Android are much better as well.

375. lwhi ◴[] No.45124258{19}[source]
You haven't answered the question.
replies(1): >>45129506 #
376. wizzwizz4 ◴[] No.45129506{20}[source]
That's because it's a big question. You can make a browser like Dillo, but it won't be able to run web-based banking software. You can make a browser like Konquerer, but it won't be able to use Netflix, or reliably get past Cloudflare walls. So, I'd say… yeah, browser developers are effectively mandated to follow standards – except that (as I said before) it's impossible for an unauthorised developer to implement the full WHATWG spec.
replies(1): >>45169009 #
377. fsflover ◴[] No.45157061{6}[source]
> Phones have the right idea. I just don't want Apple and Google to be the only ones who can modify the system at the OS level.

You may be interested in Qubes OS then.

378. lwhi ◴[] No.45169009{21}[source]
You're being obtuse.

Standards aren't the issue here.