• Rentlar@lemmy.ca
    link
    fedilink
    arrow-up
    84
    ·
    5 months ago

    It’s the GUI software manager, I think the LM developers should get a pass at curating selections for users who wouldn’t know any better.

    I personally think they can make it a total non-issue if they put in “some unverified results hidden, see settings to change”.

  • Eugenia@lemmy.ml
    link
    fedilink
    English
    arrow-up
    65
    arrow-down
    2
    ·
    5 months ago

    I actually agree with Linux Mint’s decision. You can not trust any random upload. Either it’s an official/verified upload, or it shouldn’t be there at all (or it should be a separate app for those who want it). That’s why in my system, I only install from the official debian repos and not the community ones. I just don’t trust random anonymous uploaders.

  • fpslem@lemmy.world
    link
    fedilink
    arrow-up
    52
    ·
    5 months ago

    I’m fine with this, particularly since you can just tick the box and still access them. Linux Mint is such a good gateway for new Linux users, it makes sense to hide unverified flatpaks until they understand the risks. Plenty of people (perhaps myself included) won’t ever need to worry about unverified flatpacks if their needs are simple and they don’t add much beyond the standard software.

  • subtext@lemmy.world
    link
    fedilink
    arrow-up
    27
    ·
    5 months ago

    A new preferences dialog has been added to Software Manager that has, among other options, a toggle to show unverified Flatpaks — but the distro makes clear this is “not recommended”

  • theshatterstone54@feddit.uk
    link
    fedilink
    arrow-up
    26
    arrow-down
    2
    ·
    5 months ago

    This is the first time I ever find myself kind of disagreeing with the Mint team. As others have said, some of the most popular packages on Flathub are unverified so popular programs like Inkscape are not going to show up as Flatpaks?

    I think just a warning, like what Flathub does, and maybe a dialog before installing, warning the app is packaged by an unverified packager, would have been enough.

    • GolfNovemberUniform@lemmy.ml
      link
      fedilink
      arrow-up
      21
      ·
      5 months ago

      Idk if a warning is a good idea too. As you said, most of the apps are unverified. If a beginner sees warnings when installing every package, it will raise some questions

    • Diplomjodler@lemmy.world
      link
      fedilink
      arrow-up
      9
      ·
      5 months ago

      I think their approach is pretty solid. For beginners, it’s probably better to only see the verified FPs. More advanced users can change the preference. There is simply no ideal solution in this case, until we get more verified FPs

      • theshatterstone54@feddit.uk
        link
        fedilink
        arrow-up
        2
        ·
        edit-2
        5 months ago

        Completely unrelated but your use of FP really confused me at first, as I’ve been studying for a Programming exam, half of which is on FP (Functional Programming).

    • biribiri11@lemmy.ml
      link
      fedilink
      arrow-up
      8
      ·
      5 months ago

      If a new user installs malware from flathub while trying out mint for the first time, they’ll probably blame mint instead of flathub. Nobody will say “damn, I should have listened to that warning” while their “discrod” app rm -rf’s their entire PC away, they’ll instead claim Linux is crap and go somewhere else. Doing this helps keep mint safe, and definitely encourages unverified FOSS apps to hurry up and get verified.

  • Bitrot@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    21
    ·
    5 months ago

    I appreciate the clear marking that something is unverified, but don’t think disabling by default is the right move. As others have mentioned, most of the software in the distribution is also unverified.

    • SapphironZA@sh.itjust.works
      link
      fedilink
      arrow-up
      3
      ·
      5 months ago

      I think this strategy makes sense, if you do an overall push to have all software sources verified. Knowing users, a simple warning that an app is unverified rarely affects their behaviour. You need to hide the app, to encourage app developers to get verified for it to work. Users ideally should be able to trust by default, because we can’t trust them to know any better.

      • Bitrot@lemmy.sdf.org
        link
        fedilink
        English
        arrow-up
        2
        ·
        5 months ago

        I think most likely app developers who aren’t verified don’t care to be. Spotify isn’t rushing to build a flatpak.

  • biribiri11@lemmy.ml
    link
    fedilink
    arrow-up
    20
    ·
    5 months ago

    This is a great start, but tbh, I’m not fully sold on “verified” flathub apps. Verification requires a token to be placed into a source repo or a website, but there appears to be nothing on actually verifying that the source/site are the original creators. So, for example, if someone packaged a malicious version of librefox and established it under io.github.librewolf-community instead of the canonical io.gitlab.librewolf-community, I’m concerned it’ll still show as verified (though quickly removed). The process can be read about here.

    • JustAnotherRando@lemmy.world
      link
      fedilink
      arrow-up
      4
      ·
      edit-2
      5 months ago

      Is the token not keyed to a specific source? I would have expected it to operate similarly to an SSL cert, where part of the verification process is that the source is the correct origin that the token belongs to - so if someone just lifted a valid cert to put into a malicious one, it would catch anything from changing a single character in the project name to changing the repository host (i.e. GitHub to GitLab)

      • biribiri11@lemmy.ml
        link
        fedilink
        arrow-up
        8
        ·
        5 months ago

        Afaik yes, the token is keyed to a specific source in the case of verifying through a website, but from what I can tell, that doesn’t stop someone else from creating a separate malicious website (or git repo) that looks similar but contains malware, and publishing that as a verified app with a similar name as the real app to flathub (so there would be multiple versions of an app, with only 1 being the “real” one on flathub).

  • BananaTrifleViolin@lemmy.world
    link
    fedilink
    English
    arrow-up
    12
    arrow-down
    1
    ·
    edit-2
    5 months ago

    It kind of makes sense except the vast majority of software in all distros is not being packaged by the developers, its being packaged by volunteers in the relevant project. Most software is being used on trust that it is built off the original code and not interfered with.

    Its very difficult for any distros to actually audit all the code of the software they are distributing. I imagine most time is spent making sure the packages work and don’t conflict with each other.

    The verified tick is good in flatpaks but the “hide anything not verified” seems a little over the top to me. A warning is good but most software is used under trust in Linux - if you’re not building it yourself you don’t know you’re getting unadulterated software. And does this apply to all the shared libraries on flathub? Will thebwarn you if your software is using shared libraries that ate not verified?

    And while Flatpak is a potential vector to a lot of machines if abused, it is also a sandboxed environment unlike the vast majority of software that comes from distros own repos.

    Also given the nature of Flatpaks, any distros could host its own flatpaks but everyone seems to use flathub. If they’re not going to take on the responsibility of maintaining flathub and its software then their probably needs to be some way of “verifying” packages not coming directly from the developers. Otherwise users may lose put on the benefits of a shared distros agnostic library of software.

    I get why mint are doing this but i think its a bit of a false reassurance. Although from mints point of view they would be able to take direct responsibility for the software they distribute in their own repos (as much as you can in a warrentyless “use as your own risk” system)

  • boredsquirrel@slrpnk.net
    link
    fedilink
    arrow-up
    8
    ·
    edit-2
    5 months ago

    Have a look at my flatpak repo list with instructions on that

    The question is, do they change the remote or just hide the apps?

    I currently use 2 flathub remotes, the verified (named flathub-v) and the unfiltered one. When installing from CLI I can see if it is verified (2 possible remotes show up). I hope COSMIC store and KDE Discover will show the verification check soon.

    I use nearly only verified Flatpaks (a list of recommended ones is here, will soon update)

    But a few popular ones are not, like VLC (developers dont know Flatpak, should get an introduction by the current maintainer), Inkscape, Spotify, Steam, Bitwarden, Signal, Torbrowser launcher, Blender, Calibre, and more (excluding Chromium Browsers, use the native versions for security reasons) are all missing.

    Important things to consider:

    • distro packages are nearly always unverified i.e. maintained by distro packagers instead of upstream
    • spotify flatpak is not verified, but the flatpak is securely packaged. Mint has a deb repo, and that proprietary piece of malware could do whatever they like with your entire system
    • flatpaks are very often more secure, at least they have some security mechanism that can be easily manually hardened. Unlike firejail or bubblejail, which are very complex.
    • bitfucker@programming.dev
      link
      fedilink
      arrow-up
      1
      ·
      5 months ago

      The difference with the distro package is that you are already using the distro anyway. If you cannot trust the distro package then the whole distro itself is untrusted. Or depending on the repo provided, maybe the whole repo not the whole distro.

      • boredsquirrel@slrpnk.net
        link
        fedilink
        arrow-up
        1
        arrow-down
        1
        ·
        5 months ago

        There is a difference between the packages shipped by default, and any random package in the repo.

        In this case, Ubuntus universe repo will have less supported packages.

  • Plopp@lemmy.world
    link
    fedilink
    arrow-up
    6
    ·
    5 months ago

    Since the user can select to show unverified software I’m very much in favor of this. As long as it’s still very visible that a package is unverified after you changed the setting. With security being one of the main selling points of Flatpaks, there should be a clear distinction between verified and unverified packages, and the goal should be that all packages should be verified.