• jqubed@lemmy.world
    link
    fedilink
    arrow-up
    31
    arrow-down
    1
    ·
    8 months ago

    WARNING: Global themes and widgets created by 3rd party developers for Plasma can and will run arbitrary code. You are encouraged to exercise extreme caution when using these products.

    On the one hand, if any commercial store put out a statement like this and did no vetting of submitted applications people would (rightly) be up in arms. But on the other, this is pretty much the standard with FOSS, right? Unless you’re paying for a supported commercial license from someone like Red Hat, everything is as-is, without warranty, caveat emptor. The power of open source is that anyone can review the code and look for problems or malicious behavior, but also (especially with smaller projects) there’s no guarantee that anyone else has looked at the code. So is it a best practice with Linux and FOSS to run a system backup before installing any software or update? I mean I guess that’s technically true for any OS, but especially for open source?

    • floofloof@lemmy.ca
      link
      fedilink
      English
      arrow-up
      45
      ·
      8 months ago

      Users are probably aware of that with most software. But for something called a “theme”, we’re used to expecting it to be a bunch of non-executable resources. I’m sure I wasn’t the only one who gave it no thought and made this assumption, since it applies almost everywhere else we see themes.

      • oo1@kbin.social
        link
        fedilink
        arrow-up
        10
        ·
        8 months ago

        Yeah 100%.
        They should be given a more threatening name.

        Maybe the word “global” is supposed to invoke fear (maybe it does for people who review shonky c++ code a lot).
        But I don’t think that is so for most people.
        Better to call them “High risk unofficial theme” or something to prompt people to read the small print.

    • henfredemars@infosec.pub
      link
      fedilink
      English
      arrow-up
      11
      ·
      edit-2
      8 months ago

      In my mind, it’s more like a library of scripts. Scripts are powerful and could potentially do anything, and it would be wise to not run these scripts arbitrarily without reviewing them first or having some other trust basis you can rely upon.

      For example, I don’t think you’re expected to review all open source software on your system. It’s much easier to instead trust a group of people with high visibility, such as the core Debian developers, and proceed to exercise graduated caution according to the likelihood that the code has been reviewed. You probably don’t need to review the Linux kernel. When it comes to random widgets and themes off the internet, it’s easy to encounter code that has never been reviewed.

      I think there is such a thing as a risk tolerance. You can’t build a completely trust-free computer. For practical and economic reasons, you’re going to have to trust somebody. I think the optimal strategy is to be smart about who you’re trusting and where you’re focusing your limited resources to review. Popular Debian packages? Probably safe. Widget by person you’ve never heard of that nobody else uses? Probably risky.

      If this makes you feel uncomfortable, I suggest that a person takes a few moments to review their threat model. What kinds of attacks are you worried about? What costs are you willing to pay to mitigate these attacks?

    • Possibly linuxOP
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      1
      ·
      8 months ago

      I would just be mindful of independently generated content. A backup will not help you if your computer is in a bot net

      • jqubed@lemmy.world
        link
        fedilink
        arrow-up
        9
        ·
        8 months ago

        Why would a backup not help with a bot net? Shouldn’t rolling the computer back to its state before installing the malware remove it? (This is a genuine question; I’ve had very little exposure to actually using Linux but am interested and will probably install it on a machine someday)

        • imecth@fedia.io
          link
          fedilink
          arrow-up
          9
          ·
          edit-2
          8 months ago

          Botnets work as background malware, most people never realize they’re infected, as opposed to in your face malware like ransomware.
          Backups are only relevant for malware if you can pinpoint when the malware was installed and the backups aren’t compromised.

    • d3Xt3r@lemmy.nzM
      link
      fedilink
      arrow-up
      3
      ·
      8 months ago

      So is it a best practice with Linux and FOSS to run a system backup before installing any software or update? I mean I guess that’s technically true for any OS, but especially for open source?

      Being opensource doesn’t make backups an extra special requirement. Backups should be considered a compulsory, non-optional thing these days, regardless of your choice of OS. I mean, your device could crash or fail, get stolen, get damaged, get hit by crypto - anything is possible. Being opensource or not makes little difference to the question “is it best practice to backup”.