Package Details: iridium-deb 73.0-1

Git Clone URL: https://aur.archlinux.org/iridium-deb.git (read-only, click to copy)
Package Base: iridium-deb
Description: An attempt at creating a safer, faster, and more stable browser (Stable Channel)
Upstream URL: https://iridiumbrowser.de/
Licenses: BSD
Submitter: necklace
Maintainer: necklace
Last Packager: necklace
Votes: 13
Popularity: 0.33
First Submitted: 2018-04-07 21:56
Last Updated: 2019-08-01 16:47

Dependencies (21)

Required by (0)

Sources (1)

Pinned Comments

HellishINC commented on 2018-06-08 01:50

sudo echo kernel.unprivileged_userns_clone=1 > /etc/sysctl.d/00-local-userns.conf

sudo sysctl --system

To fix sandboxing issues.

Latest Comments

necklace commented on 2020-01-28 06:58

So, there's been a release but they haven't made a .deb build yet.

Only flag this as out of date if there's an actual .deb build, check deb/ and ubuntu/ in their downloads: https://downloads.iridiumbrowser.de/

In the meantime you could test out https://aur.archlinux.org/packages/iridium-rpm/

gcala commented on 2019-08-01 15:44

version 73 is out: https://downloads.iridiumbrowser.de/deb/pool/main/i/iridium-browser/iridium-chromedriver_2019.04.73-1iridium0_amd64.deb

CommodoreCrunch commented on 2019-01-01 22:49

For the record, I think a better workaround is starting Iridium with the "--no-sandbox" option and using it with firejail to make up for the lack of sandboxing.

jayftn commented on 2018-11-24 08:37

The Iridium project is active again after a hiatus. Could you update the package to match the newest release?

svein83 commented on 2018-08-27 01:25

There's a reason why unprivileged user namespaces are disabled in the kernel. Enabling them will create a larger attack-surface for attackers, and with the amount of bugs in the implementation, it is a BAD idea. This could give the entire internet access to your KERNEL.

If someone doesn't know how dangerous that is, they'd be better off waiting for better sandboxing, than opening their system to even more threats.

HellishINC commented on 2018-06-08 01:50

sudo echo kernel.unprivileged_userns_clone=1 > /etc/sysctl.d/00-local-userns.conf

sudo sysctl --system

To fix sandboxing issues.