On Wed, Mar 25, 2020 at 9:06 AM Jorge Almeida <jjalme...@gmail.com> wrote:
>
> On Wed, Mar 25, 2020 at 12:56 PM Alec Ten Harmsel
> <a...@alectenharmsel.com> wrote:
> >
> > On Wed, Mar 25, 2020, at 08:54, Jorge Almeida wrote:
> > > On Wed, Mar 25, 2020 at 12:42 PM Michael <confabul...@kintzios.com> wrote:
> > > > Have you looked at using WebRTC with Zoom, rather than installing their 
> > > > code
> > > > on your PC?
>
> > WebRTC is a web standard. You should be able to use Zoom in-browser, 
> > without downloading the application.
> >
> OK. But it seems to offer limited functionality:
> https://support.zoom.us/hc/en-us/articles/115005666383-Show-a-Join-from-your-browser-Link
>
> (And will it be safer that the application?)
>

Web tabs are fairly highly sandboxed in most browsers.  Suffice it to
say something running in a web tab isn't going to be spying on your
process list/etc.

An application can basically do absolutely anything you can do from a
shell unless you've done something to contain it.  Running it in a
container would obviously be one way of containing it. Running it
under another UID would be another, though users can generally see all
the processes in the system and read any file that is world-readable.

I'm not sure how the flatpak version of zoom that was mentioned
earlier is packaged.  I believe flatpak is container-based, but I
haven't used it and I can't speak to how well-contained it actually
is, either in general or in its implementation of this particular
application.  In theory they could make it very secure, but that
doesn't mean that they did.

Oh, and keep in mind that X11 itself isn't the most secure piece of
software in existence.  In particular any window on your desktop can
spy on the keyboard input into any other window on your desktop,
unless you're employing protective measures that nobody actually
employs outside of maybe pinentry (I haven't checked that one and I
forget if it is completely modal - as in you can't type in any other
x11 window while it is displayed).

-- 
Rich

Reply via email to