Questions tagged [desktop]
63 questions
63
votes
3 answers
How does the Windows "Secure Desktop" mode work?
Can anyone explain (or provide a link to a simple explanation) of what the Windows "Secure Desktop" mode is and how it works?
I just heard about it in the KeePass documentation (KeePass - Enter Master Key on a Secure Desktop) and would like to…
snth
- 965
- 1
- 9
- 10
44
votes
6 answers
Why do mobile apps have fine-grained permissions while desktop apps don't?
Androids apps use fine-grained permissions for security reasons, iOS apps (afaik) do it as well. Windows 8.1 applications don't have a permission schema like that, all Linux versions which I have tried so far don't have it either and I guess Mac OS…
rdmueller
- 2,413
- 3
- 18
- 17
40
votes
6 answers
Secure Linux Desktop
I'm looking for hints about secure linux desktops. Securing servers is no problem. Most recent Software Updates, run only the services required etc. But what about desktops? I'm thinking about details like Noscript for Firefox. ASLR, PIE and similar…
chris
- 401
- 1
- 5
- 3
38
votes
1 answer
Passive and active attacks via X11. Is Wayland any better?
In The Linux Security Circus: On GUI isolation - The Invisible Things Lab's blog, Joanna Rutkowska describes attacks from one X11 app on another and the general problem of the lack of GUI-level isolation, and how it essentially nullifies all the…
nealmcb
- 20,544
- 6
- 69
- 116
37
votes
5 answers
Password manager: safer on laptop or on smartphone?
I want to recommend a password manager to my non-tech friends and family and help them set it up and use it. One of the decisions I have to make is whether I recommend one that works on laptops or one that works on smartphones.
Smartphones:
Have…
Luc
- 31,973
- 8
- 71
- 135
24
votes
3 answers
Should a hostname ever be considered a secret?
I've been told in the past that you should never give out the host names of computers on your network. I can't think of any reason why this would be the case.
Could someone tell me if they should be considered sensitive information and if so, why?
Jake Nelson
- 345
- 3
- 8
18
votes
1 answer
How to verify Google sign-in screen is legit? (Linux Desktop)
I've installed an Electron app "Google Play Music Desktop Player" which presents a Google login screen:
This is in a standalone window with no URL displayed. Although I have no reason not to trust this app, how can I be sure that this login screen…
Andrew M.
- 283
- 1
- 6
13
votes
3 answers
Attacks against windows kiosk software
I am interested in potential/actual attacks against kiosk software.
I am not talking about physical access, or specifically designed kiosk operating systems or shells, bur rather software that runs over windows and attempts to prevent access. All…
Sonny Ordell
- 3,476
- 9
- 33
- 56
11
votes
2 answers
Why are apps for mobile devices more restrictive than for desktop?
Application devlopement for mobile devices is generally more restrictive, i.e. the apps runs in a sandboxed environment, they have many limitations when accessing the filesystem, etc. compared to their desktop counterparts. What is the main reason…
j78981
- 111
- 3
11
votes
4 answers
Alternatives to the "open PC" security model
Today, PCs (laptops, desktops, etc.) generally work under what I'll call the "open PC" security model. Users have full, system administrator/developer-level access to their own machine. Users can install arbitrary software of their choice onto…
D.W.
- 98,420
- 30
- 267
- 572
8
votes
4 answers
Same-origin policy for desktop application?
The same-origin policy is one of the most important security feature in our browser.
It basically provides sandboxing for our applications which is protecting our users.
Desktop application can read anything on your computer. If you install a…
Gudradain
- 6,921
- 2
- 26
- 43
8
votes
1 answer
Do any non-GNU/Linux display managers provide the same isolation as Wayland?
In discussions around the ongoing transition from X.org to Wayland, I regularly come across comments along the lines of "Linux security is not there yet". This refers to Wayland's promise of better (but not perfect) desktop isolation (e.g.…
lofidevops
- 3,550
- 6
- 23
- 32
6
votes
3 answers
Virtualization as a layer of security for desktop computers?
Given the amount of 3rd party plugins required to browse the web, I've been compelled to virtualize my online habits to gain an additional layer of security.
There is of course some obvious drawbacks:
1) Need to have a shared folder between the host…
Dog eat cat world
- 5,759
- 1
- 27
- 46
6
votes
2 answers
Luks+Sleep: Login screen security?
Situation: A Desktop Linux (eg. Debian, Xfce desktop, Lightdm login) with LUKS-encrypted partitions (as far as possible, eg. Efi files are not encrypted of course).
The computer is in sleep mode (not hibernate, ie. Luks in unlocked and key in RAM). …
DoeDoe
- 61
- 2
5
votes
3 answers
Security Scanning for Desktop Applications
Our company develops Windows desktop applications. We offer off the shelf solutions - not custom development. A potential new customer wants to add a section to our standard contract that requires us to use an "Application Scanning" Tool. They…
Mark Elder
- 151
- 1
- 4