top | item 41781216

(no title)

ianlevesque | 1 year ago

I think it's relevant that Transmit is a local native app. There's no hosted app exposed to the internet to hack here. Google made one lengthy process that doesn't fit this use case.

discuss

order

mikeocool|1 year ago

Panic runs a cloud-hosted sync service that syncs your credentials and connection info between different instances of Transmit you may have.

No idea if that's what google is targeting here, but that is a cloud service, that presumably gets a copy of people's Google Drive OAuth keys if they use Google Drive with Transmit and the sync service.

bigfatkitten|1 year ago

That isn't a factor in Google's decision making. An app is an app as far as they're concerned, whether it's a local client or some sort of hosted service.

StarterPro|1 year ago

If they are connecting to Google Drive, is that not connected to the internet?

acdha|1 year ago

There’s no way for someone on the internet to reach into your Transmit app and make it do something.

MobiusHorizons|1 year ago

exposed to the internet and connected to the internet are different. Exposed implies that traffic originating from the internet reaches the app. You still do have to worry about things like parsing malicious files, but the class of relevant attacks is much smaller and generally easier to defend against.

dreadlordbone|1 year ago

Everything's connected to the internet, what the OP was talking about was attack vectors and since Transmit is a local app it really isn't one unless your whole machine is compromised, which in that case you're screwed.