Elementary OS 8 has been released with a significant focus on privacy, security, and user consent. The new Secure Session feature is a cornerstone of this update, designed to ensure that applications respect user privacy and require explicit consent for various actions
The Secure Session in elementary OS 8 is powered by Wayland, a modern and secure method for apps to render themselves and accept user input. When using the Secure Session:
. Users must explicitly permit apps to perform actions such as:
To access the Secure Session, users can select it from a gear menu next to the password field on the lock screen
The Secure Session also introduces:
Elementary OS 8 implements four new Portals to support the Secure Session:
These Portals are crucial for enabling modern apps to function in the Secure Session without direct access to display pixels
It’s important to note that elementary OS 8 will use the Classic Session by default to ensure compatibility with existing apps.
In the Classic Session, apps will behave as they did in previous versions, maintaining the same level of system access as in OS 7
The System Settings → Applications section has been expanded to give users more control over app permissions. New features include:
The introduction of the Secure Session, along with expanded permissions settings and new Portals, demonstrates elementary OS’s commitment to enhancing user privacy and security while maintaining a user-friendly experience
Introduction Google Dorking is a technique where advanced search operators are used to uncover information…
Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…
What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…
Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…
Introduction As cyber threats grow more sophisticated, organizations need more than just firewalls and antivirus…
Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways…