this post was submitted on 12 Mar 2024
521 points (93.8% liked)

Linux

48404 readers
794 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
 

A little admiration of how easy UI customization is on Firefox, and how shitty Chromium looks.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 1 points 8 months ago

If you're referencing an isolatedProccess implementation, the benefit is that each site is isolated in its own process, and any exploit would only have access to its own process (the data that the site sees anyways) without further escape (kernel exploit or meltdown, for instance). Without this isolation flag, sites are not sandboxed from each other or from the browser's process itself, meaning an exploit could access any data from any other active site or from the browser's process (such as accessing browser settings, bookmarks, history, or the built-in browser password manager). This has a massive implication on security. I'm unaware of the sandboxing you mentioned before Chrome, so I can't comment on that, but you gain a lot of security from proper per-site process isolation. Yes, the app lives inside its own sandbox, but there's plenty of data within that sandbox that you may not want a site to access, hence the importance of the isolatedProcess flag.