Most active commenters
  • johnisgood(4)
  • TomaszZielinski(4)
  • gejose(3)
  • 0cf8612b2e1e(3)
  • schmichael(3)
  • dtkav(3)
  • jabbany(3)
  • HSO(3)
  • bdzr(3)

←back to thread

429 points saeedesmaili | 97 comments | | HN request time: 0.835s | source | bottom
1. gejose ◴[] No.45308131[source]
This is one way to look at it, but ignores the fact that most users use third party community plugins.

Obsidian has a truly terrible security model for plugins. As I realized while building my own, Obsidian plugins have full, unrestricted access to all files in the vault.

Obsidian could've instead opted to be more 'batteries-included', at the cost of more development effort, but instead leaves this to the community, which in turn increases the attack surface significantly.

Or it could have a browser extension like manifest that declares all permissions used by the plugin, where attempting to access a permission that's not granted gets blocked.

Both of these approaches would've led to more real security to end users than "we have few third party dependencies".

replies(19): >>45308149 #>>45308208 #>>45308212 #>>45308222 #>>45308224 #>>45308241 #>>45308572 #>>45308600 #>>45308749 #>>45310219 #>>45310642 #>>45310881 #>>45310991 #>>45311185 #>>45311760 #>>45311782 #>>45312975 #>>45313054 #>>45314194 #
2. 0cf8612b2e1e ◴[] No.45308149[source]
Don’t most plugin models work this way? Does VSCode, Vim, Emacs, and friends do anything to segregate content? Gaming is the only area where I expect plugins have limited permissions.
replies(6): >>45308244 #>>45308310 #>>45308373 #>>45308539 #>>45309613 #>>45310771 #
3. zargon ◴[] No.45308208[source]
That's ok. I haven't come across an Obsidian plug-in that's worth introducing a dependency for.
replies(1): >>45308269 #
4. schmichael ◴[] No.45308212[source]
The Simpsons Springfield Nuclear Plant Security scene in real life.

https://www.youtube.com/watch?v=eU2Or5rCN_Y

5. justsomehnguy ◴[] No.45308222[source]
> Obsidian plugins have full, unrestricted access to all files in the vault.

And how exactly you can solve that?

I don't want to press 'allow access' on the every file some plugin is accessing.

replies(2): >>45308268 #>>45308541 #
6. gjsman-1000 ◴[] No.45308224[source]
That just sounds like Linux packages; also not a system known for security of desktop apps and scripts especially compared to MacOS, shoot me.
replies(1): >>45308294 #
7. dtkav ◴[] No.45308241[source]
I'm developing an Obsidian plugin commercially. I wish there was a higher tier of vetting available to a certain grade of plugin.

IMO they should do something like aur on Arch Linux and have a community managed plugin repo and then a smaller, more vetted one. That would help with the plugin review time too.

replies(1): >>45310435 #
8. jabbany ◴[] No.45308244[source]
Browser extensions also have a relatively robust permissions-based system.

If they wanted to, one would guess that browser-ish local apps based on stuff like Electron/node-webkit could probably figure out some way to limit extension permissions more granularly.

replies(2): >>45308286 #>>45312257 #
9. schmichael ◴[] No.45308268[source]
One of the large dependencies they call out is an excellent example: pdf.js.

There is no reason for pdf.js to ever access anything other than the files you wish to export. The Export to PDF process could spawn a containerized subprocess with 0 filesystem or network access and constrained cpu and memory limits. Files could sent to the Export process over stdin, and the resulting PDF could be streamed back over stdout with stderr used for logging.

There are lots of plugin systems that work this way. I wish it were commodofied and universally available. AFAIK there's very little cross-platform tooling to help you solve this problem easily, and that's a pity.

10. myvoiceismypass ◴[] No.45308269[source]
I use “Templater” and “Dataview” but now I am rethinking my usage; they were required for the daily template I use (found here on HN) but this is probably overkill.
replies(1): >>45308329 #
11. 0cf8612b2e1e ◴[] No.45308286{3}[source]
I would have thought, but it has been how many years, and as far as I know, there is still no segregation for VSCode extensions. Microsoft has all the money and if they cannot be bothered, not encouraged that smaller applications will be able to iron out the details.
replies(1): >>45308319 #
12. jabbany ◴[] No.45308294[source]
Operating systems are different though, since their whole purpose is to host _other_ applications.

FWIW, MacOS isn't any better or worse for security than any other desktop OS tbh....

I mean, MacOS just had it's "UAC" rollout not that long ago... and not sure about you, but I've encountered many times where someone had to hang up a Zoom or browser call because they updated the app or OS, and had to re-grant screenshare permissions or something. So, not that different. (Pre-"UAC" versions of MacOS didn't do any sandboxing when it came to user files / device access)

13. schmichael ◴[] No.45308310[source]
vim and emacs are over 30 years old and therefore living with an architecture created when most code was trusted. Encrypting network protocols was extremely rare, much less disks or secrets. I don't think anything about the security posture of vim and emacs should be emulated by modern software.

I would say VSCode has no excuse. It's based on a browser which does have capabilities to limit extensions. Huge miss on their part, and one that I wish drew more ire.

replies(3): >>45311209 #>>45312130 #>>45312368 #
14. jabbany ◴[] No.45308319{4}[source]
I think it's just because supply-chain attacks are not common enough / their attack surfaces not large enough to be worth the dev time... yet...

Sneak in a malicious browser extension that breaks the permissions sandbox, and you have hundreds of thousands to millions of users as an attack surface.

Make a malicious VSCode/IDE extension and maybe you hit some hundreds or thousands of devs, a couple of smaller companies, and probably can get on some infosec blogs...

replies(3): >>45309290 #>>45311372 #>>45311771 #
15. cgriswald ◴[] No.45308329{3}[source]
I did too but have switched over to “bases” now that that’s in core. Before that I had an apparmor profile restricting Obsidian from reaching the web.
16. erik ◴[] No.45308373[source]
> Gaming is the only area where I expect plugins have limited permissions.

Do you mean mods on Steam? If you do, then that's down to the individual game. Sandboxing mods isn't universal.

replies(1): >>45308573 #
17. gejose ◴[] No.45308539[source]
Perhaps, but I think what you might put onto Obsidian (personal thoughts, journal entries etc) can be more sensitive than code.
18. gejose ◴[] No.45308541[source]
Specific permissions declared in a manifest much like browser extensions could be a good first step.
19. bryanhogan ◴[] No.45308572[source]
This open letter seems relevant here: https://www.emilebangma.com/Writings/Blog/An-open-letter-to-...
20. 0cf8612b2e1e ◴[] No.45308573{3}[source]
I was thinking more Lua/Luaua which make it trivial to restrict permissions. In general, the gaming client has access to a lot more information than it shares, so to prevent cheats from plugins, the developers have to be explicit about security boundaries.
21. eek2121 ◴[] No.45308600[source]
Funny enough, I thought this earlier about Arch Linux and it's deritives. It was mentioned on reddit that they operate on a small budget. A maintainer replied that they have very low overhead, and the first thought that popped into my mind was that most of the software I use and rely on comes from the AUR, which relies on the user to manage their own security.

If engineers can't even manage their own security, why are we expecting users to do so?

replies(3): >>45308871 #>>45311168 #>>45312763 #
22. varenc ◴[] No.45308749[source]
Another thought: what about severely sandboxing plugins so they while they have access to your notes, they have no network or disk access and in general lack anyway for them to exfiltrate your sensitive info? Might not be practical but approaches like this appeal to me.
replies(1): >>45311458 #
23. zer00eyz ◴[] No.45308871[source]
> If engineers can't even manage their own security, why are we expecting users to do so?

This latest attack hit Crowdstrike as well. Imagine they had gotten inside Huntress, who opened up about how much they can abuse the access given: https://news.ycombinator.com/item?id=45183589

Security folks and companies think they are important. The C suite sees them as a scape goat WHEN the shit hits the fan and most end users feel the same about security as they do about taking off their shoes at the airport (what is this nonsense for) and they mostly arent wrong.

It's not that engineers cant take care of their own security. It's that we have made it a fight with an octopus rather than something that is seamless and second nature. Furthermore security and privacy go hand and hand... Teaching users that is not to the benefit of a large portion of our industry.

replies(1): >>45309326 #
24. connicpu ◴[] No.45309290{5}[source]
The solution at my job is you can only install extensions vetted by IT and updates are significantly delayed. Works well enough but sucks if you want one that isn't available inside the firewall.
25. marcosdumay ◴[] No.45309326{3}[source]
> It's not that engineers cant take care of their own security.

I dunno. My computer has at least 1 hardware backdoor that I know off, but that I just can't get hardware without any equivalent exploit.

My OS is developed with a set of tools that is known to make code revision about as hard as possible. Provides the bare minimum application insulation. And is 2 orders of magnitude larger than any single person can read on their lifetime. It's also the usable OS out there with best security guarantees, everything else is much worse or useless.

A browser is almost a new complete layer above the OS. And it's 10 times larger. Also written in a way that famously makes revisions impossible.

And then there are the applications, that is what everybody is focusing today. Keeping them secure is close to useless if one don't fix all of the above.

replies(1): >>45310638 #
26. ◴[] No.45309613[source]
27. ibash ◴[] No.45310219[source]
> Obsidian plugins have full, unrestricted access to all files in the vault.

Unless something has changed, it's worse than that. Plugins have unrestricted access to any file on your machine.

When I brought this up in discord a while back they brushed it aside.

replies(4): >>45310455 #>>45310482 #>>45310762 #>>45310878 #
28. netghost ◴[] No.45310435[source]
Just out of curiosity, what's the plugin? Are there folks interested in paying for plugins?
replies(1): >>45310591 #
29. hsbauauvhabzb ◴[] No.45310455[source]
To be fair, it’s no worse of a dumpsterfire than any other plug-in ecosystem.
30. esseph ◴[] No.45310482[source]
If you're using a flatpak, that's not actually the case. It would have very restricted access to the point where you even would have to explicitly give it access to user /home.
replies(2): >>45310702 #>>45311794 #
31. dtkav ◴[] No.45310591{3}[source]
The plugin is called Relay [0] -- it makes Obsidian more useful in a work setting by adding real-time collaboration.

One thing that makes our offering unique is the ability to self-host your Relay Server so that your docs are completely private (we can't read them). At the same time you can use our global identity system / control plane to collaborate with anyone in the world.

We have pretty solid growth, a healthy paid consumer base (a lot of students and D&D/TTRPG), and starting to get more traction with businesses and enterprise.

[0] https://relay.md

replies(1): >>45311231 #
32. dehugger ◴[] No.45310638{4}[source]
You never actually told us what your OS is.
replies(2): >>45310925 #>>45311406 #
33. hinkley ◴[] No.45310642[source]
When I was young there were a few luminaries in the software world who talked about how there is a steady if small flow of ideas from video game design into conventional software.

But I haven't heard anyone talk like that in quite sometime (unless it's me parroting them). Which is quite unfortunate.

I think for example if someone from the old guard of Blizzard were to write a book or at least a novella that described how the plugin system for World of Warcraft functioned, particularly during the first ten years, where it broke, how they hardened it over time, and how the process worked of backporting features from plugins into the core library...

I think that would be a substantial net benefit to the greater software community.

Far too many ecosystems make ham-fisted, half-assed, hair-brained plugin systems. And the vast majority can be consistently described by at least two of the three.

replies(3): >>45311199 #>>45311317 #>>45311448 #
34. pipes ◴[] No.45310702{3}[source]
So if I run their software in a container they can't access my entire filesystem. I don't think that is a security feature.

It sounds like if I ever run obsidian I should be using flat seal too.

replies(1): >>45310918 #
35. HSO ◴[] No.45310762[source]
What if you run little snitch and block any communications from obsidian to anything?
replies(2): >>45311159 #>>45311167 #
36. raincole ◴[] No.45310771[source]
> Gaming is the only area where I expect plugins have limited permissions.

It's pretty much the opposite. A lot of modding communities' security model is literally just to "trust the community."

Example: https://skylines.paradoxwikis.com/Modding_API

> The code in Mods for Cities: Skylines is not executed in a sandbox.

> While we trust the gaming community to know how to behave and not upload malicious mods that will intentionally cause damage to users, what is uploaded on the Workshop cannot be controlled.

> Like with any files acquired from the internet, caution is recommended when something looks very suspicious.

replies(1): >>45312353 #
37. Tallain ◴[] No.45310878[source]
Having recently read through a handful of issues on their forums, they seems to brush aside a lot of things. It's a useful tool but the mod / dev team they have working with the community could use some training.
38. hahn-kev ◴[] No.45310881[source]
It's no worse than vscode. Sure there's permissions, but it's super common for an extension to start a process and that process can do anything it wants.
replies(3): >>45310885 #>>45310970 #>>45311166 #
39. endorphine ◴[] No.45310885[source]
And why is VSCode our baseline?
replies(1): >>45311562 #
40. esseph ◴[] No.45310918{4}[source]
Er, what?

I'm not claiming it's a security feature of Obsidian, I'm saying it's a consequence of running a flatpak - and in this situation it could be advantageous for those interested.

replies(1): >>45311565 #
41. Alive-in-2025 ◴[] No.45310925{5}[source]
They must mean macos, right?
42. thund ◴[] No.45310970[source]
Plus vscode is maintained by a company with thousands of devs. Obsidian is less than 10 people, which is amazing. About plugins why blame the product, pls check what you install on your machine instead
43. shelled ◴[] No.45310991[source]
This app deals with very critical, personal, and intimate data – personal notes and professional/work-related notes, but proudly has an Electron app. This alone has seemed like a massive red flag to me.
replies(1): >>45311936 #
44. formerly_proven ◴[] No.45311159{3}[source]
Little snitch can block open(2)?
replies(3): >>45311288 #>>45311855 #>>45312838 #
45. bdzr ◴[] No.45311166[source]
It's *significantly* worse than vscode. vscode is at least attempting to grapple the problem: https://code.visualstudio.com/docs/configure/extensions/exte....
46. elric ◴[] No.45311167{3}[source]
Or firejail. Or QubesOS using a dedicated VM. There are options, but it would still be nice if Obsidian had a more robust security model.
replies(1): >>45311195 #
47. fa3556 ◴[] No.45311168[source]
I think this criticism is unfair because most common packages are covered by the core and extra repos which are maintained by Arch Linux. AUR is a collection of user build scripts and using it has a certain skill cliff such that I expect most users to have explicit knowledge of the security dangers. I understand your concern but it would be weird and out of scope for Arch to maintain or moderate AUR when what Arch is providing here amounts to little more than hosting. Instead Arch rightly gives the users tools to moderate it themselves through the votes and comments features. Also the most popular AUR packages are maintained by well known maintainers.

The derivatives are obviously completely separate from Arch and thus are not the responsibility of Arch maintainers.

replies(1): >>45311306 #
48. bdzr ◴[] No.45311185[source]
I think it's a matter of time until we see a notable plugin in the obsidian space get caught exfiltrating data. I imagine then, after significant reputational harm, the team will start introducing safe guards. At a minimum, create some sort of verified publisher system.
49. johnisgood ◴[] No.45311195{4}[source]
I have been using firejail for most of these kind of applications, be it Obsidian, Discord, or the browser I am using. I definitely recommend people start using it.
replies(1): >>45311393 #
50. awesome_dude ◴[] No.45311199[source]
Kernel design is (to me) another one where ideas have flowed into other software fields - there were monolithic kernels, micro kernels, and hybrid kernels, and they all need to work with third party modules (drivers)

The lessons from all fields seem to be relearnt again and again in new fields :-)

replies(1): >>45311266 #
51. tlavoie ◴[] No.45311209{3}[source]
I'd love to see software adopt strong capabilities-based models that enforce boundaries even within parts of a program. That is, with the principle of least authority (POLA), code that you call is passed only the capabilities you wish (e.g. opening a file, or a network socket), and not everything that the current process has access to. Thomas Leonard's post (https://roscidus.com/blog/blog/2023/04/26/lambda-capabilitie...) covers this in great detail, and OCaml's newer Eio effect system will has aspects of this too.

The Emily language (locked-down subset of OCaml) was also interesting for actively removing parts of the standard library to get rid of the escape hatches that would enable bypassing the controls.

replies(1): >>45312303 #
52. bdzr ◴[] No.45311231{4}[source]
Are you worried about being sherlocked at all? I know "multiplayer" is on their official roadmap.
replies(1): >>45311477 #
53. ozim ◴[] No.45311266{3}[source]
Because learning how to make a proper one requires building your own broken one first.

It might be slightly sped up by reading up on theory and past experiences of others.

I am around mid life and I see how I can tell people stuff, I can point people to resources but they still won’t learn until they hit the problem themselves and put their mind into figuring it out.

54. 4ndrewl ◴[] No.45311288{4}[source]
I believe they're saying it can open, it just can't send the data anywhere.

Seems a little excessive, but here we are.

replies(2): >>45311853 #>>45312113 #
55. anon7000 ◴[] No.45311306{3}[source]
Disagree. AUR isn’t any trickier than using pacman most of the time. Install a package manager like Yay or Paru and you basically use it the same way as the default package manager.

It’s still the same problem, relying on the community and trusted popular plugin developers to maintain their own security effectively.

replies(1): >>45311478 #
56. setr ◴[] No.45311317[source]
I’ve been of the opinion that every hard problem in CS shows up somewhere in gamedev. It’s a great space for inspo.
replies(1): >>45313066 #
57. anon7000 ◴[] No.45311372{5}[source]
The time has come. The nx supply chain attack a couple weeks ago literally exfiltrated admin tokens from your local dev machine because the VS code extension for nx always downloaded the latest version of nx from npm. And since nx is a monoreop tool, it’s more applicable to larger projects with more valuable tokens to steal.
58. dotancohen ◴[] No.45311393{5}[source]
Sell it to us! Why do you use specifically firejail?

There are so many options, from so many different security perspectives, that analysis paralysis is a real issue.

replies(1): >>45312026 #
59. dotancohen ◴[] No.45311406{5}[source]
Because that would be a distraction to the point they're actually making.
60. pjmlp ◴[] No.45311448[source]
I came to learn that even though in process plugins are easier to implement, and less resource demanding, anyone serious about host stability and security can only allow for plugins based on OS IPC.

And in general, it will take less hardware resources that the usual Electron stuff.

61. antoniojtorres ◴[] No.45311458[source]
Deno would be a good candidate for this.
62. dtkav ◴[] No.45311477{5}[source]
yeah, definitely.

It might not be the most strategic move, but i want to build cool and useful tools, and the Obsidian folks are a big inspiration.

I hope there's a way to collaborate and/or coexist.

63. fa3556 ◴[] No.45311478{4}[source]
I understood GP's point to be that because Obsidian leaves a lot of functionality to plugins, most people are going to use unverified third party plugins. On arch however most packages are in core or extra so for most people they wont need to go to AUR. They are more likely to install the flatpak or get the appimage for apps not in the repos as thats much easier.

yay or paru (or other aur helpers afaik) are not in the repos. To install them one needs to know about how to use AUR in the first place. If you are technically enough to do that, you should know about the security risks since almost all tutorials for AUR come with the security warnings. Its also inconvenient enough that most people wont bother.

In obsidian plugins can seem central to the experience so users might not think much of installing them, in Arch AUR is very much a non essential component. At least thats how I understand it.

replies(2): >>45311526 #>>45311830 #
64. tomsmeding ◴[] No.45311526{5}[source]
> Its also inconvenient enough that most people wont bother. > in Arch AUR is very much a non essential component.

While somewhat true, we are talking about a user who has installed Arch on their machine. If a user wanted to not bother with installation details, they would've installed Ubuntu.

65. wiseowise ◴[] No.45311562{3}[source]
Because it is one of the most popular dev tools out there? If not the most popular. It also uses Electron, like Obsidian. Has thousands of plugins, like obsidian.
66. pipes ◴[] No.45311565{5}[source]
Sorry, it genuinely sounded to me like you were saying that it's not a problem because flat pack.
67. freehorse ◴[] No.45311760[source]
> most users use third party community plugins

Is this true? Is there any source about how many obsidian users use third party plugins? For once I don't. Moreover, obsidian by default runs in "restricted mode" which does not allow for community plugins. You have to specifically enable it to be able to install community plugins, hence I assume somebody who does that understands the risks involved. How many people even get into enabling that?

For me it is not even about security firstmost, the whole appeal of markdown is simplicity and interoperability. The more I depend on "plugins" the more I am locked in into this specific platform.

68. fauigerzigerk ◴[] No.45311771{5}[source]
>Make a malicious VSCode/IDE extension and maybe you hit some hundreds or thousands of devs, a couple of smaller companies, and probably can get on some infosec blogs..

Attackers just have to hit one dev with commit rights to an app or library that gets distributed to millions of users. Devs are multipliers.

69. Pikamander2 ◴[] No.45311782[source]
> could've instead opted to be more 'batteries-included', at the cost of more development effort, but instead leaves this to the community, which in turn increases the attack surface significantly.

Ah, the WordPress model.

replies(1): >>45313949 #
70. s_ting765 ◴[] No.45311794{3}[source]
You're wrong. The obsidian flatpak ships by default with access to /home. https://github.com/flathub/md.obsidian.Obsidian/blob/5e594a4...
replies(1): >>45312923 #
71. seaal ◴[] No.45311830{5}[source]
The Arch-based distros that most normies will install have AUR helpers instaled by default.

I can't even install Brave without the AUR.

72. notpushkin ◴[] No.45311853{5}[source]
It still can encrypt everything and demand you pay some ₿₿₿₿.
73. HSO ◴[] No.45311855{4}[source]
Very, very good point

I got lazy

Time to crank the paranoidmeter up again

ty

74. aucisson_masque ◴[] No.45311936[source]
Until there is a better alternative you’re left with electron. Nothing come close to obsidian.
replies(1): >>45312310 #
75. johnisgood ◴[] No.45312026{6}[source]
I feel like I should keep track of all my comments on HN because I remember writing a lengthy comment on firejail more than once. I cannot keep doing this. :D

For user-space, there is usually bubblewrap vs. firejail. I have not personally used bubblewrap, so I cannot comment on that, but firejail is great at what it does.

The last comment was about restricting clipboard access to either X11 or Wayland which is possible with firejail quite easily, so if you want that, you can have that.

You can do a LOT more with firejail though.

https://wiki.archlinux.org/title/Firejail

https://man.archlinux.org/man/firejail.1

replies(2): >>45312081 #>>45312546 #
76. wonger_ ◴[] No.45312081{7}[source]
FYI you can search your comment history with hn.algolia.com:

https://hn.algolia.com/?dateRange=all&page=0&prefix=true&que...

replies(1): >>45314028 #
77. lxgr ◴[] No.45312113{5}[source]
If it can open and write any file on the OS, it's pretty much game over. Too many ways to exfiltrate data even without network/socket access.
replies(1): >>45312679 #
78. formerly_proven ◴[] No.45312130{3}[source]
iirc vscode has RCE by design when you use the remote editing feature (i.e. editing files on a server, which is obviously a bad idea anyway, but still a feature) and nobody gives a fuck.
79. sunaookami ◴[] No.45312257{3}[source]
>Browser extensions also have a relatively robust permissions-based system.

Yeah and they suck now. We need a better security model where it's still possible to do powerful stuff on the whole machine (it's MY computer after all) without compromises.

80. debugnik ◴[] No.45312303{4}[source]
> OCaml's newer Eio effect system

Eio is an IO library out of many competing ones, not OCaml's effect system. The capabilities are an Eio thing, not an effects thing.

81. deafpolygon ◴[] No.45312310{3}[source]
There are better alternatives. It's just that people have convinced themselves they need the features Obsidian offers - because it makes them feel smart and important.

At the end of the day, you're just taking notes. If you write a journal, don't put it in something like Obsidian. Even Apple Notes is better (in security, privacy, etc) in this regards.

82. debugnik ◴[] No.45312353{3}[source]
I think they meant games that specifically come with a sandboxed scripting layer. Otherwise, I agree that most mods are indeed just untrusted patches for a native executable or .NET assembly.

I guess the intent behind Cities Skylines's support for mods is just removing the need for a mod manager and enabling Steam Workshop support.

83. skydhash ◴[] No.45312368{3}[source]
You have to get out the beaten path to get plugins into Vim/Emacs. It's not difficult, but you don't have access to a marketplace open to the world from the get go. I think Emacs have ELPA, but I would put that at the level of OS repos like Debian/Alpine.
84. rufugee ◴[] No.45312546{7}[source]
So do you configure firejail to give each app their own separate, permanent home directories? Like "firejail --private=/home/user/firejails/discord discord", "firejail --private=/home/user/firejails/chromium chromium", and so on?
replies(1): >>45313982 #
85. HSO ◴[] No.45312679{6}[source]
Worse, what keeps this from editing the config files for Little Snitch (or similar blockers)?
replies(2): >>45312858 #>>45313080 #
86. mcgrath_sh ◴[] No.45312763[source]
I'm shocked it is most of your software. I think I have under a dozen AUR packages. It has been that way for about a decade. I added a couple for gaming recently (mostly because Lutris just crashes for me), but nearly all of my software comes from the official repos.
87. TomaszZielinski ◴[] No.45312838{4}[source]
I treat LS as a privacy/anti-telemetry/anti-accident tool, not as anti malware.

Obviously it can detect malware if there’s a connection to some weird site, but it’s more like a bonus than a reliable test.

If you need to block FS access, then per app containers or VMs are the way to go. The container/VM sandboxes your files, and Little Snitch can then manage externa connectivity (you might still want to allow connection to some legit domains—-but maybe not github.com as that can be use to upload your data. I meant something like updates.someapp.com)

88. TomaszZielinski ◴[] No.45312858{7}[source]
I believe LS has some protections against this. Never tried them, but there are config related security options, incl. protection against synthetic events. So they definitely put some thought into that.
89. TomaszZielinski ◴[] No.45312923{4}[source]
I „love” such sandboxing defaults. Apps like Docker Desktop also share the whole home by default [1], which is pretty interesting if a big selling point is to keep stuff separated. No idea why node_packages need to have access to my tax returns :). Of course you can change that, but I bet many users keeps the default paths intact.

[1] https://docs.docker.com/desktop/settings-and-maintenance/set...

90. TomaszZielinski ◴[] No.45312975[source]
My personal take is that the only way to be reasonably sure you're OK is to install as few apps as possible and then as few plugins as possible (and ideally stick to the bundled ones only). I don’t think it’s controversial, but for some reason this is not how many people think, even if in the real world you don’t give keys to your place to everyone who says they’re cool :)
91. mallowdram ◴[] No.45313054[source]
Is there an alternate to obsidian?
92. mallowdram ◴[] No.45313066{3}[source]
My team's approach is game dev is probably for the hard problems in reality, behavior, ecology, language.
93. 4ndrewl ◴[] No.45313080{7}[source]
File system permissions?
94. ◴[] No.45313949[source]
95. johnisgood ◴[] No.45313982{8}[source]
I have my own Discord.profile!

This is my ~/.config/firejail/Discord.profile[1]:

  include disable-common.inc
  include disable-devel.inc
  include disable-interpreters.inc
  include disable-shell.inc

  noblacklist /sys/fs
  noblacklist /sys/module

  keep-config-pulse
  keep-dev-shm

  name discord
  apparmor
  caps.drop all
  caps.keep sys_admin,sys_chroot
  netfilter
  nodvd
  #nogroups
  #noinput
  nonewprivs
  noroot
  notv
  #nou2f
  #novideo
  protocol unix,inet,inet6
  #shell none

  disable-mnt
  private-cache
  #private-tmp

  noexec /tmp

  dbus-user filter
  dbus-user.talk org.freedesktop.Notifications

  private-bin Discord,cut,echo,egrep,electron,electron[0-9],electron[0-9][0-9],grep,head,sed,sh,tr,xdg-mime,xdg-open,zsh,gzip,wget,curl,notify-send
  private-etc alternatives,asound.conf,ca-certificates,crypto-policies,fonts,group,ld.so.cache,ld.so.preload,localtime,login.defs,machine-id,password,pki,pulse,resolv.conf,ssl

  noblacklist /usr/lib/discord/
  whitelist ${HOME}/.config/discord
  read-write ${HOME}/.config/discord
  whitelist ${DOWNLOADS}
  whitelist ${HOME}/.config/pulse/*

  include whitelist-common.inc
  include whitelist-var-common.inc
  include whitelist-run-common.inc
  include whitelist-runuser-common.inc
I have some things commented out but you could probably uncomment most.

Some has this, too:

  disable-mnt
  private-dev
  private-cache

  env http_proxy=socks5://127.0.0.1:9050
  env https_proxy=socks5://127.0.0.1:9050
FWIW, once you start whitelisting, it will only have access to those directories and files only, so Discord has no access to anything other than its own directory and ${DOWNLOADS}, which I should probably change.

You should check out the default profiles for many programs / apps under directory "/etc/firejail".

[1] You run it via "firejail Discord" or "firejail ./Discord" if you name it "Discord.profile".

96. johnisgood ◴[] No.45314028{8}[source]
Thank you, exactly what I have been looking for!
97. NelsonMinar ◴[] No.45314194[source]
I agree Obsidian plugins do nothing about safety. But I'm not sure "most users use plugins", that's not my impression from reading the subreddit. I wonder if there's any data on it?