Is there a reason to prefer Distrobox over Toolbox, except for the availability of more distros to choose from?
Off-topic
I hear this with some frequency. Iād be interested to really understand how distant is the security in gecko browsers. Firefox seems that implemented site isolation in 2021, but if I understand it right it doesnāt fully isolate renderer processes per tab. The fission was reported by madaidans back in 2022 ānot as mature as Chromiumās site isolation, and it will take many more years for it to reach that point.ā
How is that measured?
This was raised back in 2022, did we see progress in this front? did the prediction fully materialized?
Then there is the sandbox issues in Linux. It is from my understand that X11 and PulseAudio isnāt something affecting most people anymore with Wayland and Pipewire ascension. Remaining strengthening seccomp-bpf.
Have we saw some improvements with seccomp-bpf? For example, Firefoxās sandbox now includes GPU process sandboxing and other hardening measures, no?
In general, for someone that isnāt a target and take security measures in Linux, can we maybe reduce the potential inflamed claim that gecko based browsers are leagues behind in security compared to Chromium based browsers? Can and should we be challenging this view?
Just to be clear, Iām talking about desktop gecko browsers only not Android browsers.
This is all offtopic but:
How is that measured?
This was raised back in 2022, did we see progress in this front? did the prediction fully materialized?
I havenāt seen evidence that this has significantly changed since. If anything, the prediction was too favorable to Firefox, since Chromium has added new service sandboxes and sandboxing improvements since then.
For example, Firefoxās sandbox now includes GPU process sandboxing and other hardening measures, no?
Disabled by default outside of Windows, AFAIK:
that isnāt a target
This is a poor way to think about security. Opportunistic attacks/malware are common.
can we maybe reduce the potential inflamed claim that gecko based browsers are leagues behind in security compared to Chromium based browsers?
No. Itās not inflamed. Itās An Inconvenient Truth.
Can and should we be challenging this view?
When/if I find significant free time (whatās that?
) I may put together a github gist doing a deep dive into the code showing how little has changed on firefoxās end and the ways chromium has pulled further ahead since. Or if PG folks have time to dig into the code, that might be a cool video to have? @jordan ?
I was all excited, Brave didnāt start and Telegram didnāt give me the QR and as a novice I went back to Bluefin, I would have to learn to give permissions to all my programs, Iām not interested in the short term, I hope the security reaches the dummies like me.
Brave didnāt start
Last I checked, Brave defaults to the X11 backend. I have no idea why they do this especially since itās a security degradation. If this is the underlying cause, I recommend asking them to fix this on their issues page. ![]()
Also reminder not to use flatpaked browsers (especially chromium-based browsers like Brave) as the flatpaking significantly weakens the internal browser sandboxing.
Telegram didnāt give me the QR
Did you lock down flatpak permissions? If so, we make it clear that breakage is to be expected. It should be avoided if users donāt want flatpaks breaking without manual permissions changes.
This will configure flatpak to automatically reject most permissions (with the exception of the Wayland socket and the Dri device, since these are commonly used and ensure at the very least most apps will work without crashing).
This will also grant Flatseal and Warehouse access to certain permissions to allow them to operate and make reconfiguring much easier.
NOTE: This will break just about all Flatpaks by default, it is ON YOU to configure them to work with this configuration.
NOTE 2: This DOES NOT enable hardened_malloc, use the harden-flatpak ujust command.
Iām curious about a few installations on the standard GNOME DE:
a. I installed Steam via Flatpak using ujust install-steam and got the following error upon trying to launch. It will not launch. Any ideas why?
āThe unofficial Steam Flatpak app requires a correctly-configured desktop
session, which must provide the DISPLAY environment variable to the
D-Bus session bus activation environment.
On systems that use systemd --user, the DISPLAY environment variable must
also be present in the systemd --user activation environment.
This is usually achieved by running:
dbus-update-activation-environment DISPLAY
during desktop environment startup.
For more details, please see:
https://github.com/ValveSoftware/steam-for-linux/issues/10554ā
b. for installing packages like Proton Pass and Proton Mail, are those important enough to justify layering them using rpm-ostree, or should these be containerized?
Additionally, for the part about layering vs. using containers for Proton Pass and Proton Mail, does it matter that thereās no repo for those?
Iāve seen that Steam flatpak issue when thereās no X server. The ujust should have toggled it on, but run ujust set-xwayland to be sure. Also make sure the flatpak has the X11 permission (not just the Fallback to X11 permission).
Xwayland is enabled. I stopped getting that error (not sure what changed), but it still wonāt launch. Now Iām getting an error that steamwebhelper is not responding. I attached a picture (sorry for the resolution, the popup is tiny). Iāve tried all the options except restart with sandboxing disabled.
I would try all other options. Otherwise, Iād suggest hopping in the Secureblue Discord server and requesting support if that option is available for you.
Thanks yāall. Ended up just layering Steam (I actually donāt mind this solution because I donāt love the idea of unverified flatpaks) and Mullvad Browser, going with the web app for Proton Mail, and the browser extension for Proton Pass in Trivalent.
I strongly recommend using neither and using the PWAs instead. Distrobox is not a sandbox and provides no isolation, and the Proton Pass and Mail official apps are electron, which should be avoided.
This looks like hardened_malloc. Make sure it is not preloaded in env vars in Flatseal. Our ujust already removes this, but maybe it got added back for whatever reason.
layering Steam (I actually donāt mind this solution because I donāt love the idea of unverified flatpaks)
Layering steam is equivalent to using the unverified flatpak. As is the case for any distroās steam package like archās. They are all unofficial third-party packages. The only official package is the deb from the steam website. Everything aside from that is equivalent to being unverified. At least with the flatpak, you get some kind of minimal sandboxing, and updates that are disconnected from the system (steam pulls in 32bit libs, which can cause dependency clashes due to package drift)
and Mullvad Browser
Using a Firefox-based browser on secureblue is largely contradictory. See this earlier post. TLDR, using an insecure browser on a āsecure OSā is contradictory, because of the criticality of the browser in the desktop use case. Out of curiosity, what motivated this security downgrade?
web app for Proton Mail
![]()
This was really easy to do. You guys did a great job on that Trivalent browser. Trying it out was one of the main reasons I wanted to try Secureblue, and it hasnāt disappointed. Really nice to have a simple and functional hardened chromium.
This dawned on me like ten minutes after I posted that. I couldnāt get the flatpak working though and really wanted to game, so layering it was.
I donāt really use my computer for much that I need to be highly, highly secure. For those things, Iām using GOS and Vanadium mostly. (I donāt have another browser on my phone.) I like Mullvad browser for its decent combo of security and privacy. It also makes it easy to proxy different sites automatically. Will be using Trivalent for all my logged in accounts though.
Thanks for the replies. I think what yāall are attempting with SecureBlue is really cool. The install process is well documented and very, very easy. The ujust scripts are kind of genius to build right into the OS. The audit feature and the ability to easily reset settings to default are also really cool. Of all the Linux distros Iāve tried, this one is the one thatās inspiring the most confidence that my system is working how it should. Thanks for the hard work.
Can you define what you mean when saying āsecurity.ā Do you just mean exploit protection?
I would argue some high risk Individuals like Edward snowden (he is probably not as high risk anymore) isnāt really using Tor for anonymity but uses/need Tor mainly for security purposes. But QubesOS+Whonix+Kicksecure would probably be a better fit for him
Have you considered making a Secureblue template for QubesOS for people who need the extra protection? I know you can make a unofficial templates but theyāre rarely as good as a official ones.
RoyalOughtness, I am not trying to hijack this discussion but I couldnāt find another way to contact you.
I am definitely an Eli5 member and have just started using SecureBlue (from Windows).
Iāve managed to get everything working and followed all the guidelines and advice I could find.(thank you to everyone).
My issue is that I canāt get my Canon MF743cw printer to work. Believe me, I have loaded drivers and have heard the printer react (beep) to my attempt to print, but it never leaves the laptopā¦.
Where can I go to get help in resolving this? Iāve done internet searches and Fedora Discussion searches but noting has helped yet.
Please open a support thread on the Discord. PG is not the place for secureblue support.
Can you define what you mean when saying āsecurity.ā Do you just mean exploit protection?
I mean prevention of unauthorized activity.
Have you considered making a Secureblue template
Thatās up to the Qubes folks. AFAIK itās not possible yet because Qubes doesnāt support wayland, but Iām not entirely sure as I donāt keep up with Qubes or know much about it. SecureBlue template Ā· Issue #9755 Ā· QubesOS/qubes-issues Ā· GitHub

