-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Why does Wire run with --no-sandbox
?
#21
Comments
This appears to come from Wire upstream judging by wireapp/wire-desktop#2507. |
Also the Chrome sandbox can't run inside Flatpak anyway. |
Why did this get closed? (the question has not been answered) - #2507 is not related |
It is impossible to run the current Chromium sandbox inside of Flatpak. So the upstream answer doesn't even matter anyway. |
Why? Is there an issue about that somewhere? Is Flatpak sandbox more secure than the Chromium one, does it render the Chromium one unrequired? |
The namespace API is considered insecure so its part of the syscall blacklist. Chromium would have to be ported to use No the situation is not more secure. |
I was testing if
flatpak run com.wire.WireDesktop --startup
is the method for starting Wire in the background and looked intohtop
to see how it affects my memory usage and happened to notice that Wire gets parameter--no-sandbox
and I started wondering why? Is Flatpak so well sandboxed that it's unnecessary to have sandboxing in Wire? I think the permissions already look a bit wide.com.wire.WireDesktop/com.wire.WireDesktop.json
Lines 12 to 24 in 258bf19
The text was updated successfully, but these errors were encountered: