zlacker

[parent] [thread] 12 comments
1. Camper+(OP)[view] [source] 2023-05-24 16:58:15
What exactly does it do for me as a user?
replies(1): >>cridde+o3
2. cridde+o3[view] [source] 2023-05-24 17:10:10
>>Camper+(OP)
It’s a security boundary. It lets you control the resources an application has access to. For example, if that cool weather app you just installed asks for access to your Documents directory, or your camera or microphone, you can say no.
replies(1): >>Camper+14
◧◩
3. Camper+14[view] [source] [discussion] 2023-05-24 17:13:15
>>cridde+o3
I see, it lets me install random .EXEs from sketchy web sites on my Windows machine without having to worry. Sounds safe.
replies(1): >>iknows+N7
◧◩◪
4. iknows+N7[view] [source] [discussion] 2023-05-24 17:28:39
>>Camper+14
Whats your point? You just ran a bunch of untrusted code when you visitied this website.
replies(2): >>EvanAn+bb >>parl_m+mL
◧◩◪◨
5. EvanAn+bb[view] [source] [discussion] 2023-05-24 17:45:58
>>iknows+N7
Untrusted code running in a well-defined and maintained sandbox.
replies(2): >>pauldd+gt1 >>hardwa+eZ1
◧◩◪◨
6. parl_m+mL[view] [source] [discussion] 2023-05-24 21:07:05
>>iknows+N7
Running a native binary in an environment with a large attack space and user level permissions is not NEARLY the same as running javascript in a browser with all of its sandboxing, isolation, and controls. And you know it.
◧◩◪◨⬒
7. pauldd+gt1[view] [source] [discussion] 2023-05-25 02:54:16
>>EvanAn+bb
Yes and....
replies(1): >>EvanAn+FU2
◧◩◪◨⬒
8. hardwa+eZ1[view] [source] [discussion] 2023-05-25 09:18:02
>>EvanAn+bb
Still stuff manages to escape constantly

You can find exploits on gh for older chromium versions easily

replies(1): >>EvanAn+kU2
◧◩◪◨⬒⬓
9. EvanAn+kU2[view] [source] [discussion] 2023-05-25 15:36:52
>>hardwa+eZ1
Even so it's disingenuous to compare running native code in an OS w/o a capabilities model to running Javascript in a browser.
◧◩◪◨⬒⬓
10. EvanAn+FU2[view] [source] [discussion] 2023-05-25 15:38:24
>>pauldd+gt1
Visiting a website and running Javascript vs. running a native application aren't equivalent. Browser sandbox exploits are "a thing" but that doesn't make the situations the same.
replies(1): >>pauldd+ue3
◧◩◪◨⬒⬓⬔
11. pauldd+ue3[view] [source] [discussion] 2023-05-25 17:13:17
>>EvanAn+FU2
Yes and WASM can be sandboxed just as easily as JavaScript.

There is nothing "magical" about web browsers in that regard.

replies(1): >>EvanAn+vm3
◧◩◪◨⬒⬓⬔⧯
12. EvanAn+vm3[view] [source] [discussion] 2023-05-25 17:54:09
>>pauldd+ue3
I don’t follow where you’re going.

I didn’t say there was anything “magical” about browsers. They have a sandbox for JavaScript, by default. Windows doesn’t have a sandbox for native apps, by default.

A parent poster seemed to be making a statement of equivalency between running a native application in Windows and running JavaScript in a browser. I don’t think they’re equivalent.

That’s what I’m saying.

replies(1): >>iknows+rg4
◧◩◪◨⬒⬓⬔⧯▣
13. iknows+rg4[view] [source] [discussion] 2023-05-25 22:40:15
>>EvanAn+vm3
We are literally talking about an environment for running Win32 apps in a sandbox
[go to top]