zlacker

[return to "Notepad++ supply chain attack breakdown"]
1. ashish+q9[view] [source] 2026-02-03 23:29:06
>>natebc+(OP)
I am running a lot of tools inside sandbox now for exactly this reason. The damage is confined to the directory I'm running that tool in.

There is no reason for a tool to implicitly access my mounted cloud drive directory and browser cookies data.

◧◩
2. taftst+qa[view] [source] 2026-02-03 23:34:14
>>ashish+q9
I almost feel like this should just be the default action for all applications. I don't need them to escape out of a defined root. It's almost like your documents and application are effectively locked together. You have to give permissions for an app to extra data from outside of the sandbox.

Linux has this capability, of course. And it seems like MacOS prompts me a lot for "such and such application wants to access this or that". But I think it could be a lot more fine-grained, personally.

◧◩◪
3. joseph+hb[view] [source] 2026-02-03 23:38:39
>>taftst+qa
I've been arguing for this for years. There's no reason every random binary should have unfettered, invisible access to everything on my computer as if it were me.

iOS and Android both implement these security policies correctly. Why can't desktop operating systems?

◧◩◪◨
4. IcyWin+Cl[view] [source] 2026-02-04 00:37:08
>>joseph+hb
Windows has had this for over a decade, but no one wants to put their application in a sandbox.
◧◩◪◨⬒
5. akdev1+zm[view] [source] 2026-02-04 00:44:08
>>IcyWin+Cl
If a sandbox is optional then it is not really a good sandbox

naturally even flatpak on Linux suffers from this as legacy software simply doesn’t have a concept of permission models and this cannot be bolted on after the fact

[go to top]