This only matters if you compare properly sandboxed apps, otherwise an app that runs with your uid can still do harm and practically indirectly completely compromise the system..
Are most flatpaks _properly_ sandboxed? Of course not.
And X11 always had a mechanism for isolating clients as well, i.e. trusted and untrusted clients. Nobody used it because it was irrelevant before sandboxing.
And they always, always forget that it's not about "work", it's about whether a particular person will be able to contribute work that someone is willing to pay for. It's definitely NOT true that there'll always be more paid work to do that can be done by a particular person.
But this is what you get when these authors are wondering if something is good for "the economy" instead of thinking about actual people.
Since after doing this Google knows the user knows what they're doing (and officially they say they don't want to get in the way), why does this only enable installing unverified apps (still unprivileged), why is the system still insanely locked down? I thought the 24-hour delay solved the "security" problem?
I didn't know a single company could just pay politicians state-by-state to pass a given law - in my country that would be a crime, but it seems in the US this is how the legislation process works :)
And well, the law represents an intent.. if self-reporting won't work (obviously won't), then the scenario where PCs end up as locked down as smartphones is not far fetched.
No no no, wasm has shitty speed if you want to emulate something (it doesn't even support JIT), the problem is in its architecture (tons of restrictions like no self modifying code, no jumps).. this can't be fixed, we need something real, something like WebKVM.
On the web you can dynamically create new Wasm modules and use JS APIs to load them, though there are ergonomic issues. There are per-module costs and systems like CheerpJ and CheerpX currently do batching of multiple functions into a module to mitigate the per-module costs.
This only matters if you compare properly sandboxed apps, otherwise an app that runs with your uid can still do harm and practically indirectly completely compromise the system..
Are most flatpaks _properly_ sandboxed? Of course not.
reply