[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
bug#49029: ungoogled-chromium failed to disable malware extension The Gr
From: |
Jorge P. de Morais Neto |
Subject: |
bug#49029: ungoogled-chromium failed to disable malware extension The Great Suspender |
Date: |
Tue, 15 Jun 2021 13:59:44 -0300 |
Hi. I didn't receive your email (I did this reply from Emacs debbugs
package). Please include my email address in further messages to
mitigate the risk that I miss them. I continue below:
On 06/15/21 09:49 , Leo Famulari wrote:
> Chromium is a program that is meant to be "evergreen". Version
> numbers are not highlighted to the user and the software is supposed
> to update itself, quickly and often. It's like a "rolling release"
> just for that program.
> A variant of the package that blocks communication to Google and
> requires one of us to update it is, if you trust the Chromium team,
> categorically less up-to-date than a "normal Chromium" downloaded
> directly from chromium.org, and thus also less "secure", as you've seen.
> I don't know exactly how the "disable malware extensions" mechanism
> works, but it's likely that the "ungoogling" disables the possibility
> that it can happen quickly, outside of full program updates.
>
> It's a tradeoff we (have to?) make to offer a variant of Chromium that
> is judged acceptable by us under the Free System Distribution
> Guidelines, which Guix follows:
I can accept a reasonable trade-off, but I still believe this should be
actively communicated to users. It is not obvious. If had known that
before, I would certainly have been more careful with extensions.
Indeed, now that I know, I have not only deleted my old
(ungoogled-)Chromium profile, but also, on the new profile, I installed
only HTTPS Everywhere and Privacy Badger extensions. I have also
changed an important password that I remember having used on the
malware-infected Chromium.
> By the way, the Debian testing branch is the last to receive security
> updates, and in general has no guarantee of fast security updates. If
> you want to use a Debian with more up-to-date software than the stable
> branch and also are concerned about your security, you might consider
> using Debian sid.
Thank you for the advice. I already knew that though, and I think the
security risk of Debian testing is mitigated by my care. I have
installed and configured debsecan. It emails be about Debian
vulnerabilities, and then, in aptitude, I manually pull important
security updates from Debian unstable (sid).
That is a bit time-consuming, but I fear that going full unstable would
be too unreliable (more breakages) and would remove the option of
settling in stable without reinstalling. I mean, since my sources.list
refers to bullseye, then, when it becomes stable, I will have Debian
stable and will have a choice whether (and when) to upgrade to the new
testing (bookworm).
Regards!
--
- https://stallmansupport.org "In Support of Richard Stallman"
- If an email of mine arrives at your spam box, please notify me.
- Please adopt free/libre formats like PDF, ODF, Org, LaTeX, Opus, WebM and 7z.
- Free/libre software for Replicant, LineageOS and Android: https://f-droid.org
- https://www.gnu.org/philosophy/free-sw.html "What is free software?"