Server components of the snap packaging system remain closed which gives Canonical control over the tech. Avoiding the support and proliferation of their lock-in format is a good move IMO.
Related:
They do little oversight of package safety/maintenance. A hidden cryptocurrency miner was slipped thru in uploads.
Quote Snap (software) - Wikipedia
All apps uploaded to the Snap Store undergo automatic testing, including a malware scan. However, Snap apps do not receive the same level of verification as software in the regular Ubuntu archives. In one case in May 2018, two applications by the same developer were found to contain a cryptocurrency miner which ran in the background during application execution. When this issue was found, Canonical removed the applications from the Snap Store and transferred ownership of the Snaps to a trusted third-party which re-published the Snaps without the miner present.[10][11][12] Although the Snap sandbox reduces the impact of a malicious app, Canonical recommends users only install Snaps from publishers trusted by the user.[13][14]
That disqualifies it as a general recommendation.
At time of writing, chromium
in snapstore was from publisher Canonical
with a green arrow standing for verified account.
Therefore in context of Chromium Browser for Kicksecure Discussions (not Whonix) - #56 by HulaHoop it could still be good enough.
Major apps lacked updates for a long time.
Also in context of Chromium Browser for Kicksecure Discussions (not Whonix) - #58 by Patrick the chromium package seems up to date.
Installation of snap
by default in Whonix and/or Kicksecure might encourage installation of packages using snap
. Would be hard to educate users “but please only use snap for chromium or other applications from trusted publishers”.
Probably best to find a more solid all around choice.
Related: https://forums.whonix.org/t/flathub-as-a-source-of-software/10706
Created a dedicated forum thread for it:
https://forums.whonix.org/t/flathub-as-a-source-of-software/10706