this post was submitted on 14 Jul 2024
67 points (98.6% liked)

Linux

47976 readers
1053 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
 

As I understand it, X11 has many inherent security concerns, including programs being able to read the contents of other windows and intercept keystrokes. Wayland addresses these concerns but at the moment breaks certain functions like screen readers, cursor warping, and the ability of a program to resize its own window.

I am curious as to how the display protocols of MacOS and Windows handle these situations differently. How does a program in those operating systems gain permission to read the contents of other windows, if at all? What is to be done in Wayland for these functions to be more seamless or are there inherent obstacles?

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] -1 points 3 months ago* (last edited 3 months ago) (1 children)

No, they are not. If someone has enough access to install a keylogger, then they can just grant permission to themselves. This is mostly security theater, trying to turn desktops into phones.

[–] [email protected] 2 points 3 months ago (1 children)

I don't understand your point. If they don't have enough access to install a keylogger, then they can't grant permission to themselves. That's why you want to keep them from being able to do that.

[–] [email protected] 2 points 3 months ago

if they don't have access to install keyloggers then you don't need to protect yourself from them.