meanwhile
|
2008-04-14
, 19:11
|
Posts: 66 |
Thanked: 17 times |
Joined on Apr 2008
|
#21
|
|
2008-04-14
, 19:42
|
|
Posts: 868 |
Thanked: 474 times |
Joined on Oct 2007
@ Capital District, NY, USA
|
#22
|
Nokia do seem have to have designed an inherently insecure device, unfitted for most users. If I was them, I'd have firewalled the machine and given it a virtual machine with a sandbox mode, and required special effort and passwords to install apps that bypassed this.
|
2008-04-14
, 19:49
|
|
Posts: 481 |
Thanked: 65 times |
Joined on Aug 2007
@ Westcountry, UK
|
#23
|
If was a Linux programmer in a low wage economy, with the connections to use credit card numbers and paypal, I'd see the Nit's as a god send. Three months programming would get the machine the decent PIM it lacks; 2000 downloads (the most any Nit app seems to get) might get me 1000 compromised individuals. Say I get $1000 from each, of which I keep $500 - I don't have to work again for the rest of my life.
|
2008-04-14
, 20:43
|
Posts: 373 |
Thanked: 56 times |
Joined on Dec 2005
@ Ottawa, ON
|
#24
|
Anyway, *if* the above is true, then my biggest wish for OS2009 is a firewall.
The Following User Says Thank You to mwiktowy For This Useful Post: | ||
|
2008-04-14
, 21:00
|
Posts: 66 |
Thanked: 17 times |
Joined on Apr 2008
|
#25
|
What a waste of time. Write yourself a free downloadable game on windows. 1,000,000 downloads, of which 90% have some anti-spyware/virus/firewall thing. That gives you 100,000 x your $500.
And the programming would take a lot less time as well.
The NiTs I would put as so far under the radar it wouldn't be worth the overhead of programming for them.
|
2008-04-14
, 21:06
|
Posts: 66 |
Thanked: 17 times |
Joined on Apr 2008
|
#26
|
A firewall is not a magic bullet. Even if it is properly configured, it is not the end all of security. It will do very little against random third-party apps that are installed as root that want to do bad things.
Your best bet against something like that is SELinux but that is *a lot* of work to do right and it frequently gets in the way of random third-party apps that you might want to run. It also would be a bit heavy on a limited-resource mobile platform.
Likely the most bang for the buck will come from organizing a central repository of software that is simple to submit code to, where the source code is actually audited...
|
2008-04-14
, 21:35
|
|
Posts: 4,930 |
Thanked: 2,272 times |
Joined on Oct 2007
|
#27
|
Based on the posts above, I'm astonished by how potentially ineffective Linux firewalls are, as opposed to Windows ones.
Sandbox execution, otoh, can make the engineering effort for an attacker very high to impossible: that's the way I'd go. It's what Google are doing with Android, and it seems pretty bloody obvious as a solution.
The Following 2 Users Say Thank You to Benson For This Useful Post: | ||
|
2008-04-14
, 22:46
|
Posts: 66 |
Thanked: 17 times |
Joined on Apr 2008
|
#28
|
Sheesh. Running as root; what do you propose to stop a process running as root?
Kernel-space or hardware only. And kernel-space is hard, since you can flash the kernel and reboot the device as root.
Windows firewalls are not as effective as you might think, when applied to a system with a real security system, but with a crazy nut installing random things.
In Windows, many applications can be installed without administrative privileges. (Which is not the way to go; even if trojans can't automatically get root, they can still compromise privacy, destroy data, and use exploits (local exploits, of course) to get root.)
Sandbox execution, otoh, can make doing some things bloody near impossible. It works great for daemons with narrowly defined jobs; it works great for nice little applications. It doesn't work for, say, updating the kernel
it won't let me run I can get from a trusted source.
or anything else outside the sandboxes.
So unless you want to completely close the package management system, or require only Nokia signed OS packages, you're still in the same mess.
The trouble is giving a (clueless) user root, even for the limited purpose of installing packages. There's nothing that can (or should) stop a determined sysadmin from hosing a system, or a careless one from doing it by accident.
|
2008-04-14
, 23:20
|
|
Posts: 481 |
Thanked: 65 times |
Joined on Aug 2007
@ Westcountry, UK
|
#29
|
If you can write a game that can generate a million downloads, then you can probably do quite well on adware. 1000-50,000 are more realistic.
Anyway, leaving this aside, you're still wrong: the security tools on decently configured PC's will pickup a naughty application being naughty in the first few days. After which the app will be removed from download sites, before it has time to spread.
You might say that the app could wait six months to build decent user numbers before doing naughty things, but a lot of people delete this things every couple of weeks or so.
Which is why the world economy isn't collapsing because of $50M videogame thefts, in case you were wondering. In the real world, investing serious effort in a free game would probably only yield a few hundred successful attacks.
So you're basing your personal security on Nokia's continued lack of success? I think the strategy will probably work, but as I said, personally I'd find it undignified.
|
2008-04-15
, 00:38
|
|
Posts: 4,930 |
Thanked: 2,272 times |
Joined on Oct 2007
|
#30
|
How about "Only allowing a process to run as root if installed with specific root permission by the user"? It's not rocket science. Very few apps need this.
Sorry: the first clause isn't a sentence, so I can't understand what you meant. No criticism: typos happen.
That's opinion, your argument is..?
Anyway, my concern isn't a "crazy nut" but a moderately sensible user who isn't a linux developer, and who wants to install an independent PIM on his Nit.
That's the point. A sandbox lets me run 99% of apps safely. Conveniently, the 1% it can't handle are those that I expect to get from the platform owner - OS updates.
No, as I said users could have the option of non-sandbox apps. But with a decent design they would be rarely needed - certainly not for a PIM, a media player (given a decent api), or the other apps most users care about.
This is doubly wrong.
This is just irrelevant to how a sandbox model works.
The current security model (ie none) is a fairly good explanation why the Nit hasn't been picked up for vertical applications and other corporate development.
The Following 2 Users Say Thank You to Benson For This Useful Post: | ||