• jbk@discuss.tchncs.de
    link
    fedilink
    arrow-up
    28
    arrow-down
    1
    ·
    9 months ago

    Those are just app distribution formats. Since there’s just 1 snap store which can deliver snaps, they’re not comparable.

    • cybersandwich@lemmy.world
      link
      fedilink
      arrow-up
      11
      ·
      9 months ago

      Most people get their flatpaks from the same handful of places though, right? Flathub and ??

      This isn’t a snap specific issue is what he is saying. It could happen to other stores.

      Also, my snap nextcloud is amazing and was the easiest to set up and maintain.

      • jbk@discuss.tchncs.de
        link
        fedilink
        arrow-up
        4
        ·
        9 months ago

        Flathub has manual submission verification though, which includes the steps to build flatpaks. Reviewers (currently) would definitely catch fishy looking apps.

        They’ve also implemented manual reviews in case of metainfo or flatpak permission changes, another thing for additional safety.

    • AMDIsOurLord
      link
      fedilink
      arrow-up
      5
      ·
      edit-2
      9 months ago

      People download and run completely opaque AppImages from god knows where and that’s better than Snap Store which is hit with malicious apps so rarely it’s actual news

      Flatpak also has a system where any scammer and malicious developer can just roll their own flatpak repo and voila, nobody can stop them. If it ever becomes mainstream, it’ll be a shit show worse than Google Play

      • Gamma@beehaw.org
        link
        fedilink
        English
        arrow-up
        3
        ·
        edit-2
        9 months ago

        You’re pretty much just rehashing a possible apt repo “vulnerability,” but at least with flatpak they remember where each package was installed from.

          • Gamma@beehaw.org
            link
            fedilink
            English
            arrow-up
            3
            ·
            9 months ago

            Anyone can create an apt repo and the override your system packages with new versions.

            At least with flatpak only the applications you installed from the bad actor’s repo would be affected, though obviously they can still have a ton of malicious dependencies

      • jbk@discuss.tchncs.de
        link
        fedilink
        arrow-up
        2
        ·
        9 months ago

        Text files could theoretically contain malicious content. Why doesn’t the format have a built-in virus scanner??? Is this what you’re suggesting?

        • AMDIsOurLord
          link
          fedilink
          arrow-up
          1
          ·
          9 months ago

          No, but root-of-trust isn’t really established unless you ONLY take packages that the distro’s security maintainers actually maintain, Flatpak, Appimage and Snap are a bit of a no man’s land. You have to trust the developers to be cool, independent of the tool, unless you as mentioned before use only FOSS software from the distro’s main repositories. And yes, specifically main repos because any random dick can go and upload a PKGBUILD or make a PPA.

    • lengau@midwest.social
      link
      fedilink
      arrow-up
      1
      ·
      9 months ago

      What Flatpak stores are there in widespread use other than flathub? (Additional servers that depend on the runtimes flathub distributes don’t count.)