• Possibly linux@lemmy.zip
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    13 days ago

    To add on:

    • There is no transparency about who is behind it. It just a Github account called “Rustdesk.” It could be a real company in Singapore or it could be some guy in China as people have speculated.

    • The Rustdesk software needs way more permissions than necessary. This became evident with the flatpak as they did sandbox escapes which prevented them from being on flathub

    • The Rustdesk distribution is entirely centralize release server run by Rustdesk. They could easily push out malware to lots of devices.

    • They have done some sketchy things in the past. One of the things they did was quietly switch Linux desktops back to X11.

    • The Rustdesk system is not terribly resistant to brute forcing. The weak password means they someone could try every combination.

    • Rustdesk docker deployment docker compose exposes all ports on the host. This is minor but it could lead to a sandbox excape.

    • Rustdesk servers keep getting hosted in countries that have freedom problems such as China and Russia.

    • bluetoque@lemmy.ca
      link
      fedilink
      English
      arrow-up
      1
      ·
      13 days ago

      Wow, I’m wondering how anyone would trust this software. It literally exposes your desktop. To me that requires top-tier trust level, i.e. nothing sketchy at all.