Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Ultimately, X11 opens up everything. What you suggest (WaylandX) is essentially allow-by-default.

When this is the case and there is a supply chain attack, what you think is a trusted application (and therefore not running under "WaylandX") can very well keylog you or take screenshots of your desktop without your consent.

In a deny-by-default model ala Wayland, applications will have to ask for permissions before they can do something considered to be privileged.



Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: