UBports Robot Logo UBports Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Groups
    • Search
    • Register
    • Login

    App security (new KeepassRX app)

    Scheduled Pinned Locked Moved App Development
    6 Posts 5 Posters 83 Views 2 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
      Reply
      • Reply as topic
      Log in to reply
      This topic has been deleted. Only users with topic management privileges can see it.
      • R Offline
        RandomUser
        last edited by

        I saw the new KeepassRX app pop up in the app store and I'm very interested to try it. Normally I'm not that that strict with security and trust the systems and people in place. However, this app will have access to all my passwords and made me wonder. Are there any security checks before an app is added to the app store? Can we for example be sure the package is built from the linked source code?

        1 Reply Last reply Reply Quote 1
        • CiberSheepC CiberSheep moved this topic from General
        • t12392nT Offline
          t12392n
          last edited by

          This has been on my mind too.

          I wish there was an strict firewall native in Ubuntu Touch so that we would see and control what is allowed to talk. A local Keepass should not talk to the internet.

          Samsung Fold5
          will switch to
          Volla Quintus UT 24.04-1

          arubislanderA 1 Reply Last reply Reply Quote 0
          • arubislanderA Offline
            arubislander @t12392n
            last edited by arubislander

            @t12392n said in App security (new KeepassRX app):

            I wish there was an strict firewall native in Ubuntu Touch so that we would see and control what is allowed to talk. A local Keepass should not talk to the internet.

            If the app is confined (as this one is) you don't need to blindly trust that the package in the open store was compiled by the code that is linked, to be sure it doesn't phone home. If you know what to look for, you can download the .click package and examine the contents. The most important is the .apparmor file, which describes what permissions the packages requests from the system.

            732885a2-8440-475d-8a28-83329bca5c5b-image.png

            Here we see that this app is indeed confined, and it only declares the content_exchange policy group. This means that the app will not be able to access the network at all, because the networking policy group is not included in the apparmor.

            πŸ‡¦πŸ‡Ό πŸ‡³πŸ‡± πŸ‡ΊπŸ‡Έ πŸ‡ͺπŸ‡Έ
            Happily running Ubuntu Touch
            JingPad (24.04-1.x daily)
            OnePlus Nord N10 5G (24.04-2.x daily)
            PinePhone OG (20.04)
            Meizu Pro 5 (16.04 DEV)
            Google Pixel 3a

            R 1 Reply Last reply Reply Quote 4
            • R Offline
              RandomUser @arubislander
              last edited by

              @arubislander Thanks for the information, something like this is what I was looking for.

              Vlad NirkyV 1 Reply Last reply Reply Quote 0
              • Vlad NirkyV Offline
                Vlad Nirky @RandomUser
                last edited by

                @RandomUser
                The guy is super motivated and the app is evolving very quickly. It has already caught up with Focal and promises to evolve even further.
                Really great!

                1 Reply Last reply Reply Quote 0
                • K Online
                  kugiigi
                  last edited by

                  To be fair, this is a valid concern. I wonder if it's a good idea to notify users when an app update changes or adds new apparmor policy in the new version.

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post