There’s this fancy word called “Mandatory Access Control” or MAC. Don’t be fooled by how big a word it is, it’s simple. It just decides what a file or program can access on the system with clearly defined rules and labels.
Think of the analogy of a nightclub. The bouncer at the front is like the firewall rules or you deciding to download it. But then once it’s inside the club, where can it go? Can it go into VIP? That badge you’d wear for VIP is like MAC, it’s labels that define what stuff can do or access.
There’s two main MACs, SELinux and AppArmor.
SELinux is stronger security, but it’s made by the NSA.
AppArmor is less strong, but easier to use.
What has SELinux by default?
All Android phones
What has AppArmor?
Ok so the NSA made SELinux, and it scores higher on security audits and has more fine-grained control. But can you trust it? I’ll present some pros & cons, but keep in mind that this article is heavily biased against authority and not neutral.
Con: Most vocal anti-government groups aren’t well-funded. I question how many independent non-American influenced audits it’s had. You’d need massive expertise and money to do this. Do Russian hackers trust it? Doubt it.
The NSA backdoored into OpenSSL, which had MANY people review it.  This proves both that its possible to deceive rigorous inspection in the real world, and the NSA has a history of doing so.
It’s also been proven in academic study that malicious code can be inserted even into inspected open source. The contest nicknamed “The Underhanded C Contest” from Binghamton University had contestants purposefully create malicious code to pass open source inspection. Some entries were able to not only pass even strict scrutiny and win, but did so with very low amounts of characters maliciously used.  And these are academic students, so if they can do it, then so can the NSA.
Con: Support for it is not the same as actively using it with it enabled.
That’s like saying owning a gun is the same as shooting your balls off
Con: Security expert Bruce Schneier has pointed out the NSA has put backdoors in encryption standards in the past , and when he posted about the NSA making SELinux on his own website, he didn’t comment . Which I interpret in my personal subjective analysis that he doesn’t trust it, suspects a backdoor, but can’t prove it.
Con: True, that’s valid. But keep in mind SELinux is complex, so you’re wasting hours/days learning something to save a second?
Con:, True. But SELinux is more complex and requires newer users to debug errors. So it’s only more secure if you actually know what you’re doing. Otherwise, you may be allowing malicious software higher access than it needs, just to get rid of confusing errors.
Con: If SELinux is so complex, how can we trust these open source audits?
In conclusion, many academic and corporate researchers praise SELinux over AppArmor for security, and it’s easy to see why large organizations use it. However, for a lone wolf individual with an extreme distrust of the NSA, it’s easy to see why they wouldn’t, even if it’s open source. And if you are bugging out bro, consider subscribing on Session messenger with the Session ID: Simple.
The sources for this article can be found here.