https://bugs.kde.org/show_bug.cgi?id=497273
--- Comment #1 from Noah Davis <noaha...@gmail.com> --- Similar to bug 479184, not sure if it should be marked as a duplicate. I'm going to copy/paste some comments from that report that are relevant. (In reply to Nate Graham from comment #3) > In the past we had Spectacle going through the screenshot portal but the UX > was awful: > 1. Launch Spectacle > 2. Click one of the "Take a screenshot" buttons > 3. Get prompted by the portal to allow this, and also to select what kind of > screenshot you want all over again > > It was terrible, especially for the case of launching spectacle to via a > global shortcut to take a screenshot quickly. The UX was simply unacceptable > for an app whose only purpose is to take screenshots. It's for that reason > that Spectacle currently uses a private protocol to talk to KWin. > > Now, I would like it to eventually be ported back to use the portalized > screenshot system, but only once we can ensure an adequate UX that doesn't > prompt the user to confirm doing what they just explicitly said they want to > do. As a result no actual security wold be gained by this as Spectacle would > either be whitelisted by the system, or allowed once by the user with that > permission being remembered over time. > > Now, I do get your point that the existence of the command-line interface > for spectacle means that any app with access to run shell commands can > secretly take screenshots without the user's permission. That's true, and > it's a theoretical security risk. > > However the interface is also useful for users automating their own > workflows. We can't prevent the users from doing something useful simply > because it *could* be abused. This would be like nailing someone's windows > shut to protect against the threat of someone nefarious climing into an open > window. That's not real security. > > As such I'm quite dubious about this suggestion. If your threat model > involves untrustworthy local software having shell access, you have already > lost the battle. > > But I'll let Noah the maintainer decide what to do from here. (In reply to Noah Davis from comment #4) > [snip] > > The fundamental issue in the situation you described is that you can start a > program capable of doing nearly anything in the background using other > programs without getting consent from the user. You could also start a > program that copies documents to some place on the internet or deletes > nearly everything in the Home folder without your permission. [snip] (In reply to Nate Graham from comment #7) > I appreciate your understanding. > > FWIW the sandboxing and portals systems seem designed to support a use case > where we can't necessarily trust our own apps, more akin to the Google Play > store on Android. However from my perspective this is ceding most of the > field before battle has even been joined. If we can't prevent the user from > installing actively malicious software on their system, I think we've > already lost. Android shows us what this world looks like: 99% of the free > apps on the Google Play store are garbage that's at best only mildly > user-hostile and at worse is using every dark pattern in the book to try to > harm you. Even the strongest sandbox is no protection at all for local > software that can trick the user into giving it permission to do whatever it > wants. > > This approach passes the buck by saying, "well, I told you there was a risk, > you you clicked on the Accept button anyway!" But it should be obvious that > this is not an effective system for truly protecting the user. We have > decades of experience to show us that regular people will click on anything, > won't read dialogs, don't understand digital risks, etc. Putting the > responsibility on them is wrong. > > Personally I think what we should be striving for us to keep actively bad > software out of our apps stores and software repos in the first place, and > therefore off the devices of casual users who are least able to manage the > risks of malicious apps. > > But this is a much larger topic. :) -- You are receiving this mail because: You are watching all bug changes.