Dear fans of messenger comparison sports,
How does it factor in that on #deltachat there are many apps that can be used in a chat without requiring a login or even a privacy policy ... And the apps all work like cryptpad but automatically and without requiring any server side hosting?
Editing documents and checklists and calendars are all safely end-to-end encrypted without a server and anyone can write new #webxdc apps permission free.
Which other cross-platform messenger offers this?
Risotto Bias
in reply to Delta Chat • • •now I'm curious about features to protect against malicious apps.
like it's... yet another "app store".
what keeps delta chat apps/widgets safe?
Delta Chat
in reply to Risotto Bias • • •@risottobias @ryanprior
if you like to know about all the gory details of how we isolate apps from getting at any side channels, see this discussion which also includes a security audit by Cure53 delta.chat/en/2023-05-22-webxd…
And yes, it's maybe not perfect, but it's not just yet another web view that has arbitrary access. Also, even if an app manages to break isolation, it has no access to the social graph at all. See webxdc.org/docs/spec/selfAddr_… for what is exposed to apps from the messenger side.
Delta Chat: Bringing E2E privacy to the Web: 4th security audit 😅
delta.chatDNA schedule
in reply to Delta Chat • • •Risotto Bias
in reply to DNA schedule • • •@ryanprior I don't even mean the isolation.
I mean the /app store/-ish part of this.
being phished into installing a malicious app?
being typosquatted into installing a malicious app instead of a good one?
an app being maliciously updated?
a vulnerable app not being updated?
a lack of community review?
DNA schedule
in reply to Risotto Bias • • •DNA schedule
in reply to DNA schedule • • •Delta Chat
in reply to DNA schedule • • •Risotto Bias
in reply to Delta Chat • • •@ryanprior look; I like delta chat. a lot.
but I work in cybersecurity.
I can tell you went from zero to a perfect ten on unreasonably defensive so... maybe it's good for you to take a breather, regroup...
basics (free advice):
- webxdc should include a link to the source code in each zip file (not just a minified zip) (this is part of how fdroid's repository works)
- webxdc should link to an author's website, and prove they control it (supply chain provenance)
- should check for updates vs the latest zip file
- it's a very, very (very) bad security smell to immediately dismiss a trivially obvious security concern