I think for a while leading up to the recent session stealing hack, there has been a massive amount of positivity from Lemmy users around all kinds of new Lemmy apps, frontends, and tools that have been popping up lately.

Positivity is great, but please be aware that basically all of these things work by asking for complete access to your account. When you enter your Lemmy password into any third party tool, they are not just getting access to your session (which is what was stolen from some users during the recent hack), they also get the ability to generate more sessions in the future without your knowledge. This means that even if an admin resets all sessions and kicks all users out, anybody with your password can of course still take over your account!

This isn’t to say that any current Lemmy app developers are for sure out to get you, but at this point, it’s quite clear that there are malicious folks out there. Creating a Lemmy app seems like a completely easy vector to attack users right now, considering how trusting everybody has been. So please be careful about what code you run on your devices, and who you trust with your credentials!

  • @starman@programming.dev
    link
    fedilink
    English
    38
    edit-2
    11 months ago

    Using open source apps, especially with more than one contributor, is currently the best option to be safe from this kind of attack.

    Edit: I’m not saying that FOSS is 100% secure because it’s FOSS. I’m just saying it’s the best option we currently have.

    • @sunaurusOPA
      link
      English
      4811 months ago

      It helps, but it’s still not a silver bullet. For example, a Lemmy app could contain no malicious code in its open source repository, but malicious code could still be added to a binary release in an app store.

      • @similideano@sopuli.xyz
        link
        fedilink
        English
        811 months ago

        Voyager (formerly wefwef) is a self-hostable web app, so it doesn’t have this problem. Of course this only means you can inspect the code you’re running. You still have to able to understand the code to be sure it’s not doing anything malicious.

        • @Zeth0s@lemmy.world
          link
          fedilink
          English
          311 months ago

          Vojager can be easily modified and deployed. It is actually quite riskier than others if you don’t use trusted deployments

          • @similideano@sopuli.xyz
            link
            fedilink
            English
            311 months ago

            A random deployment is certainly risky, but no riskier than a random apk. I’d argue the random deployment is less risky because it’s easier to inspect it in the browser and see what it’s doing with your password. But of course both are to avoid. Self-hosting or compiling your own clients if you can, official deployments or releases otherwise.

      • @grue@lemmy.ml
        link
        fedilink
        English
        611 months ago

        That’s why F-Droid is the safest Android app repository. If I’m not mistaken, every app they offer is rebuilt from the public source code by the repo package maintainer.

        • ShittyKopper [they/them]
          link
          fedilink
          English
          511 months ago

          Izzy directly sends over the APKs from GitHub releases. F-Droid does their own builds which is partly why they’re so slow to update.

      • @didnt_readit@lemmy.world
        link
        fedilink
        English
        211 months ago

        Also if it’s a desktop app they could just put the malicious code in the binary download 99% of people will use, or if it’s a web app, they just put it in their hosted version, etc.

    • Dark Arc
      link
      fedilink
      English
      2911 months ago

      The safest option would be for Lemmy to implement OAuth and apps that aren’t in some “official front end for xyz website mode” to authorize via OAuth with the backend instead of via credentials.

      • Carlos Solís
        link
        fedilink
        English
        1011 months ago

        Most if not all Mastodon/Pleroma apps already use OAuth by default. I’m surprised that Lemmy hasn’t implemented it yet. I wonder if KBin does already?

    • @Aurix@lemmy.world
      link
      fedilink
      English
      2211 months ago

      No, because open source apps need to have enough eyes on them to spot malicious code. And highly complex ones need proper audits and even that might not be enough to catch every fancy vulnerability.

        • TheSaneWriter
          link
          English
          811 months ago

          That’s fair, but sometimes a malicious actor will attempt to covertly contribute code that introduces a security vulnerability.

        • @WhoRoger@lemmy.world
          link
          fedilink
          English
          211 months ago

          It has happened before. Or somewhat more likely, a contributor provides code that the maintainer merges without looking too hard.

    • @PeleSpirit@lemmy.world
      link
      fedilink
      English
      611 months ago

      How can an idiot like me tell though, everything is pretty new. I just assume every account I make is a throwaway for now.

      • @JoeKrogan@lemmy.world
        link
        fedilink
        English
        211 months ago

        Well I recommend to stay away from any closed source apps. Also make sure your password is unique to lemmy and use an email address that is not your primary email.

        Be careful of clicking links and DMs. If using the browser use noscript and block scripts by default.

      • @JoeKrogan@lemmy.world
        link
        fedilink
        English
        111 months ago

        Well I recommend to stay away from any closed source apps. Also make sure your password is unique to lemmy and use an email address that is not your primary email.

        Be careful of clicking links and DMs.

    • @iegod
      link
      English
      411 months ago

      OSS does not guarantee security, ever. Please let’s not fall into false sense of security.I

      • @starman@programming.dev
        link
        fedilink
        English
        311 months ago

        But in this case, if an app is open source, there is a higher chance of discovering that it sends your credentials somewhere else than in closed source app

        • @iegod
          link
          English
          111 months ago

          That assumes people are looking at that and know what they’re doing and aren’t malicious actors. None of this is guaranteed. Famous examples of major OSS security vulnerabilities have already shown this.