this post was submitted on 11 Dec 2020
41 points (97.7% liked)

Open Source

30846 readers
297 users here now

All about open source! Feel free to ask questions, and share news, and interesting stuff!

Useful Links

Rules

Related Communities

Community icon from opensource.org, but we are not affiliated with them.

founded 5 years ago
MODERATORS
top 6 comments
sorted by: hot top controversial new old
[–] [email protected] 5 points 1 year ago (3 children)

As Flash was known for it having more holes than a Swiss cheese, how is Ruffle in terms of security?

[–] [email protected] 6 points 1 year ago (1 children)

To be fair it's a flash drop in replacement. It isn't supposed to be secure by design, just like flash.

[–] [email protected] 2 points 1 year ago

It is, the whole purpose of Ruffle is to play flash files, but without a security threat (which is the whole reason Flash doesn't exist anymore).

[–] [email protected] 5 points 1 year ago (1 children)

I expect it to fair much better than Flash. 808/1020 (79%) of the CVEs reported against flash were for memory errors (buffer overruns and things) that allowed remote code execution. So, assuming the Ruffle developers haven't been using "unsafe", just writing it in Rust immediately removes 80% of the security problems that were with Flash.

Also, many of the security problems with Flash were deliberate (by design). For example, Flash was designed to send your browser fingerprint to advertising sites. Ruffle obviously doesn't do that.

[–] [email protected] 2 points 1 year ago

Thanks for your explanation!

[–] [email protected] 1 points 1 year ago

It's running in a sandbox afaik, and the goal is to replace Flash but stay secure. Since it uses Web Assembly, you can't use Ruffle in any way to create any security threat, you couldn't create without using Ruffle. (Different to Flash, which created tons of new security threats, even leading to the plugin being disable).