Which OS for private secure internet browsing PC?

No offense, but that was not the only link I posted.

Actually, I am aware of that, but we know that they have been working on the userspace confinement for some time. Secureblue - Immutable Fedora Hardening - #62 by qoijjj

Yes, I have already commented on this in the secureblue thread.

Eventually secureblue users will want to use other browsers. There’s a general recommendation in the secureblue you suggested to use bubblejail only if the flatpak package of the applications is not going to be installed. There is no mention of whether the hardened chromium browser uses bubblejail or not, nor whether it is necessary for browsers. If there is something missing here, it might be worth mentioning it.

On that note, I chose the non userns version, which I know talked about bubblewrap. Does this mean bubblewrap will still work with flatpaks?

The reason I ask is because my browser of choice has been Librewolf and ideally I’d like to stay with it, but I’m guessing Chromium has been chosen in SB for a reason, so is it a bad idea to use Flatpak Librewolf instead of the bundled Chromium? I don’t really mind Chromium, I just like the familiarity of what I’m used to.

Thanks

Amazing, thank you!

We just shipped built-in content blocking using the same method GrapheneOS’s Vanadium uses (chromium’s subresource filter).

You can always install UBO-lite if you find it lacking (some ads will still show like youtube ads, unfortunately. which is also the case on Vanadium).

1 Like

Either they don’t mind sacrificing security, or there are things that are not as important as claimed.

The former. Brave in particular. For example they have also opted to retain MV2 support. They are willing to sacrifice security for convenience / “privacy”.

So how can immutable -and traditional- distributions be secure to use browsers?

The lack of userspace confinement for desktop linux apps is a fundamental flaw in desktop linux security. It’s not specific to browsers. The problem with browsers is that you unfortunately have to choose between:

  1. a weak sandbox for chromium itself that also unfortunately breaks the browser’s robust internal sandboxing
  2. no sandboxing for chromium but preserving chromium’s robust internal sandboxing

#1 seems like a terrible idea, #2 is less than ideal but highly preferable.

1 Like

We don’t exclude any vanadium patches that are relevant to the desktop. Please do not spread misinformation about secureblue :slight_smile:

Librewolf might not last much longer, unfortunately.

Native packages and Snaps are fine. Flatpaks not. Flatpaks block the namespace+chroot/pivot_root sandbox layer.

Brave recommends against using their own Flatpak version:

We currently recommend that users who are able to use our official package repositories do so instead of using the Flatpak.

Modern browsers have a multi-process architecture, with sandboxing around the important processes, for example renderer sandboxes, gpu sandbox, extension sandbox and so on. This way you can make these sandboxes much more tailored and thus stricter than you would be able to do around the browser as whole.

Install them not as a flatpak. That’s independent of distros and doable on immutable ones, too.

@sha123 You have already expressed these views in the hyperlinked threads I have attached to my posts and more. I have benefited a lot from your views in the past months, and you have helped me to search for more accurate information in other sources. I thank you for that.

Since this thread is more focused on distributions based on Fedora, I wanted to know if other browsers installed from traditional packages should be restricted by tools like bubblejail, firejail. As we can see the OP is considering using a browser based on Firefox not hardened Chromium.

By the way they wrote the same thing for the official snap package:
You can find Brave in the Snapcraft Store, but while it is maintained by Brave Software, it is not yet working as well as our native packages. We currently recommend that users who are able to use our official package repositories do so instead of using the Snap.

Flatpak uses bubble wrap. So yes, it does work.

Just ditch librewolf (reasons stated by others in the thread above). My opinion is staying with the native hardened chromium is definitely better.

You can always do it, it’s your PC. But since it’s slightly complex, I would not suggest for someone new to Linux.

Use this to setup the instance: Bubblejail - ArchWiki

Then use this tool to setup the rules: GitHub - igo95862/bubblejail: Bubblewrap based sandboxing for desktop applications

As for if you should, I don’t. Browser is a complex OS-like application on its own, and I trust my browser to not access my filesystem or my system maliciously. I also trust chromium sandbox to prevent malicious attacks from escaping. If you are looking for a definitive answer, ask security experts ig (although I haven’t seen any serious conversation between experts that recommends sandboxing browsers explicitly on Linux, outside of hobbyist users on forums.)

:+1:

That’s good to know, thanks :slight_smile:

Basically then I’m going to to follow all the post install recommendations, and use it as is (other than maybe adding uBO lite and my VPN app. Sounds like I don’t need to worry about additional sandboxing. I assume I should apply all updates as soon as they become available, and they are updates from Fedora, not SB - and they will all play nicely with SB tweaks?

I am sorry if I got that wrong.
There used to be a table with all the Vanadium patches and marking which were/weren’t included and why, no? I can’t seem to find it…

A bit of feedback for @qoijjj from a linux noob’s perspective:

I think the post install documentation could be easier. I’m getting lost in the steps required

A few examples:
ujust enroll-secure-boot-key

It rebooted to BIOS and I had to select options on a menu, I think I’ve done it right but not sure how to verify.

GRUB
Is this a password required for modifying boot entries (order) in the BIOS? Not really sure what the expected result is. However I did notice the disk encryption password that I was having to enter on boot is now not coming up anymore for some reason?

I skipped the wheel section and went on to do bash lockdown and LUKS TPM2 sections.

When I now try to do the wheel section - adduser admin, I get the response
User add : Permission denied
User add : Cannot lock /etc/passwd - try again later

Maybe it’s because I didn’t do the list in order? Also it mentions about rolling back to a snapshot but wasn’t sure how to create one. Also in discovery software centre its not showing anything and saying not connected when I am.

Maybe it’s just a sign that if I can’t navigate through the post install instructions then I’m out of my depth (I know that’s the case really!)

Why was the OP’s post flagged?

I had a message:

Your post was flagged as spam: the community feels it is an advertisement, something that is overly promotional in nature instead of being useful or relevant to the topic as expected.

Not sure what in relation to though

In my humble opinion, you probably should’ve went with something easier to use, like openSUSE Aeon for example which requires little to no maintenance and is quite fine for Linux beginners.

Well, it certainly wasn’t spam. Perhaps someone accidentally flagged the post? I’m not sure, but it’s certainly not an advertisement.

I may yet still give it a try. What does it mean by " Aeon is still in a Release Candidate stage!" ?

It’s not officialy released, but it doesn’t matter because it works flawlessly.

Yes, but it’s pretty much finished, according to them:

RC3 may be the final Release Candidate before Aeon’s official release. There are no major structural changes planned to the core Aeon OS, just regular improvements as upstream versions develop and our community contributes to new features and packages.