There is no transparency about who is behind it. It just a Github account called “Rustdesk.” It could be a real company in Singapore or it could be some guy in China as people have speculated.
The Rustdesk software needs way more permissions than necessary. This became evident with the flatpak as they did sandbox escapes which prevented them from being on flathub
The Rustdesk distribution is entirely centralize release server run by Rustdesk. They could easily push out malware to lots of devices.
They have done some sketchy things in the past. One of the things they did was quietly switch Linux desktops back to X11.
The Rustdesk system is not terribly resistant to brute forcing. The weak password means they someone could try every combination.
Rustdesk docker deployment docker compose exposes all ports on the host. This is minor but it could lead to a sandbox excape.
Rustdesk servers keep getting hosted in countries that have freedom problems such as China and Russia.
Wow, I’m wondering how anyone would trust this software. It literally exposes your desktop. To me that requires top-tier trust level, i.e. nothing sketchy at all.
I don’t see how that’s a problem, it’s not like it’s by a Chinese run company or like the Chinese government is spying on you; in the case you described it’d just be a rando with a hobby/vision.
The fact that it keeps getting hosted in countries that have freedom problems, such as China and Russia, does concern me, though.
I can’t find much on tech impeding laws online, whatever search terms I enter related to China and privacy just leads me to articles about their data protection law.
To add on:
There is no transparency about who is behind it. It just a Github account called “Rustdesk.” It could be a real company in Singapore or it could be some guy in China as people have speculated.
The Rustdesk software needs way more permissions than necessary. This became evident with the flatpak as they did sandbox escapes which prevented them from being on flathub
The Rustdesk distribution is entirely centralize release server run by Rustdesk. They could easily push out malware to lots of devices.
They have done some sketchy things in the past. One of the things they did was quietly switch Linux desktops back to X11.
The Rustdesk system is not terribly resistant to brute forcing. The weak password means they someone could try every combination.
Rustdesk docker deployment docker compose exposes all ports on the host. This is minor but it could lead to a sandbox excape.
Rustdesk servers keep getting hosted in countries that have freedom problems such as China and Russia.
Wow, I’m wondering how anyone would trust this software. It literally exposes your desktop. To me that requires top-tier trust level, i.e. nothing sketchy at all.
We need an alternative
Mesh central works well.
Not for all cases. It doesn’t allow for two way connections and privacy controls
I don’t see how that’s a problem, it’s not like it’s by a Chinese run company or like the Chinese government is spying on you; in the case you described it’d just be a rando with a hobby/vision.
The fact that it keeps getting hosted in countries that have freedom problems, such as China and Russia, does concern me, though.
The problem is that China makes developing privacy and freedom friendly tech illegal. You won’t find many Tor devs in China
How do they make that illegal?
I can’t find much on tech impeding laws online, whatever search terms I enter related to China and privacy just leads me to articles about their data protection law.