Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

>where what you wrote doesn't apply

You can configure your flatpak app so that it will have permission to read microphone in the background or have full access to the disk. Many flatpaks of real apps request dangerous permissions that users have been conditioned to ignore. For example Blender is such an app which has full disk access and background microphone access, and I'm sure many people have installed that. This is unlike Android where these are locked down for every app.



...and if you want an Android app to actually be able to do something useful, you give it root permissions and completely bypass the permission model.

The world isn't black and white. Most reasons why Android apps are being so heavily locked down don't apply to Blender. As a user, I'm not interested in Android-bis - if I were, I would just use Android after all. Nevertheless, things like Flatpak give me, the user, the power over application's permissions and I can take them away (or give more) in a few taps at will. The defaults being tuned for different use cases and threat models are not "being decades out of date", especially when you could already use the existing tooling to replicate other models - regardless of whether you happen to like these defaults or whether they fit your specific use case.


>you give it root permissions

This is not possible on a device following the Android security model. Permissioned features should always be implemented using proper security mechanisms like permissions.

>don't apply to Blender

You say that until the SuperRetopologyTools5000.py addon you try out infects your system.

>Flatpak give me, the user, the power over application's permission

Most people are not going to bother with this. It's important for the defaults to be secure. People shouldn't have to opt in to a secure experience, and doing so shouldn't break the program.


> This is not possible on a device following the Android security model.

Yes, that's the user experience on such devices. "This is not possible on a device following the Android security model, either bypass it or use another device".




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: