On 07/08/2024 11:40, to...@tuxteam.de wrote:
In my threat model, if I already have an application running under
my own user ID, I call XKCD 1200 [1] on it.

Browser JavaScript API allows to read and write clipboard. It is protected to some extent by user prompts. On the other hand in ChromeOS most of applications are running in browser, so I will not be surprised if policy becomes more permissive some day despite developers are aware of related security issues.

Are you sure that you have never accidentally granted clipboard read permission to some frequently used web site?

So a threat may be outside of "traditional" local processes.

As to X11 protocol, it allows to grab focus, e.g. xterm supports it. Several years ago GNOME designers decided that their password prompt must be full screen modal dialogue that does not allow even mouse interaction with other applications (e.g. 3rd party password managers). On the other hand it does not protect against xinput debug tools running at lower level.

Reply via email to