I use KDE. Some use GNOME. Most other options are probably to be left out as X11 is unsafe.

Cosmic is not nearly finished, but will probably be a bit safer, as its in rust, even though not tested.

Then there are window managers like Sway, Hyprland, waymonad, wayfire, etc.

RaspberryPi also has their own Wayland Desktop.

Is every Wayland Desktop / WM equally safe, what are other variables here like language, features, control over permissions, etc?

  • berber@lemmy.chaos.berlin
    link
    fedilink
    arrow-up
    1
    ·
    11 months ago

    i don’t really get what people mean when they say this…

    when you get tty you still get no access, you need to log in as always. a DE/wm/any x11 session/a wayland session (even though wayland is more secure probs?) should pretty much always be less secure, as depending on what state it is in, what features it has, or what happens when certsin components crash somehow, you can more easily “hack” your way in that way than via doing a “ctrl+alt+F-key”. so i don’t get the whole “get tour mind blown” thing there, i have heard it multiple times.

    or am i missing something?

    • corship@feddit.de
      link
      fedilink
      arrow-up
      1
      ·
      11 months ago

      Yeah you’re missing the point that the mind blown is just ironic.

      The entire point here was to demonstrate that the “security” features of these DEs are not implemented by the DE but by the underlying components such as PAM, and you can just ignore the DE until you have the basics fixed.

      What’s the point in having a super duper secure login screen if I can bypass it by booting from a USB stick for example.

      • berber@lemmy.chaos.berlin
        link
        fedilink
        arrow-up
        1
        arrow-down
        1
        ·
        edit-2
        11 months ago

        reading your comments, you like to say that someone has “missed the point”.

        well, my point is, you should not ignore the DE. i mean, you can, if you can bypass the login as is, sure. but from a user perspective, you should not ignore it, because the DE is a potential security risk. e.g. if your screen lock crashes and whatnot.

        sure, yes indeed, your DE can be as secure as you want and it doesn’t matter if your underlying system is not secure. and yes indeed, with any non-encrypted drive, you can just mount the drives on another system (e.g. boot the computer from a USB drive). that almost goes without saying imo, and of course that’s why an encrypted drive is recommended.

        the question is, how easy is it to get to the stuff with an encrypted drive when the system is booted and the encrypted drive(s) is (are) mounted? it is not that easy. and there, the quality of your screen lock setup is the biggest risk factor, usually. if you can crash your DE/WM somehow, if it is not setup right with your display manager or something, then you might be able to get into a login (and interactive) shell of that user (maybe because it is the parent process of your WM that you started with startx).

        if you “allow” your potential attacker to reboot from a usb stick, then it is obvious that your DE doesn’t matter at all pretty much.

        • corship@feddit.de
          link
          fedilink
          arrow-up
          1
          ·
          11 months ago

          Well especially if the previous comment asked “or am I missing something”.

          Obviously I could be wrong that’s why I said I THINK

          • berber@lemmy.chaos.berlin
            link
            fedilink
            arrow-up
            1
            ·
            11 months ago

            the “missing something” was with regards to what i said about ctrl+alt+F-something not giving some extra attack point. missing something that would blow my mind. if you say the mind blowing is ironic or whtever then it doesn’t matter anyway.