this post was submitted on 02 Mar 2025
864 points (97.2% liked)

memes

12239 readers
3220 users here now

Community rules

1. Be civilNo trolling, bigotry or other insulting / annoying behaviour

2. No politicsThis is non-politics community. For political memes please go to !politicalmemes@lemmy.world

3. No recent repostsCheck for reposts when posting a meme, you can only repost after 1 month

4. No botsNo bots without the express approval of the mods or the admins

5. No Spam/AdsNo advertisements or spam. This is an instance rule and the only way to live.

A collection of some classic Lemmy memes for your enjoyment

Sister communities

founded 2 years ago
MODERATORS
 

you are viewing a single comment's thread
view the rest of the comments
[โ€“] far_university190@feddit.org 0 points 22 hours ago (1 children)

Not for firefox, critical firefox security feature not available in flatpak: https://bugzilla.mozilla.org/show_bug.cgi?id=1756236

[โ€“] gamer@lemm.ee 1 points 21 hours ago

This is FUD. It definitely is not a "critical" security feature. Firefox flatpak can't currently do its own internal sandboxing of subprocesses via namespaces, but it does do seccomp bpf filtering. That's in addition to the standard sandboxing of flatpak itself, which is implemented using namespaces anyways.

If you are extra paranoid, you can tweak the flatpak's permissions to harden the sandboxing via your distro's flatpak settings app.