1 files changed, 11 insertions, 26 deletions
@@ -1,4 +1,4 @@
@@ -9,6 +9,14 @@ Firectl is a tool to integrate [Firejail](https://firejail.wordpress.com/)
sandboxing in the Linux desktop. Enable Firejail for an application and enjoy a
more secure desktop.
+# Deprecated: use firecfg
+Firectl was made before Firejail had its own tool for desktop integration.
+Firejail 0.9.40+ ships with a tool called `firecfg`. Look at
+the [Linux Mint Sandboxing Guide] and the manual: `man firecfg`.
+[Linux Mint Sandboxing Guide]: https://firejail.wordpress.com/2017/05/15/linux-mint-sandboxing-guide/#launchers
To see which applications you can enable:
@@ -40,28 +48,6 @@ sudo firectl enable chromium dropbox evince firefox thunderbird
and for all programs: `sudo firectl enable --all`.
-# Alternative: firecfg
-Firectl was made before Firejail had its own tool for desktop integration.
-Firejail 0.9.40+ ships with a tool called `firecfg`. Look at
-the [Linux Mint Sandboxing Guide] and the manual: `man firecfg` and decide if
-you still need firectl or if firecfg is enough.
-Firectl uses two methods for desktop integration: by modifying the desktop files
-to run with Firejail and by linking programs to Firejail in `/usr/local/bin`.
-This second method is also employed by firecfg. Thats why firecfg and firectl
-offer similar desktop integrations. There are only very [rare] cases where
-the integration is better with firectl.
-The main difference is in the interface. Running `sudo firecfg` enables Firejail
-for all programs, individual programs can then be disabled by removing them from
-`/usr/local/bin`. Firectl provides a nice interface to enable/disable individual
-[Linux Mint Sandboxing Guide]: https://firejail.wordpress.com/2017/05/15/linux-mint-sandboxing-guide/#launchers
For Debian and Ubuntu systems install the deb at
@@ -102,8 +88,7 @@ sudo rm /etc/firejail/firectl.conf
# More security
If you require even more security, the next sensible step is to use an operating
-system that is built from the ground-up with security in mind. Notable examples
-are [Subgraph OS] and [Qubes OS].
+system that is built from the ground-up with security in mind, for example
-[Subgraph OS]: https://subgraph.com/sgos/index.en.html
[Qubes OS]: https://www.qubes-os.org/