What I am really excited and curious about with regards to this technology is how it will be used in malware.<p>As Linux increases in usage (year of the desktop jokes aside), I think this will be clever to host an application or stack the user has experience with, but is in fact ghosting malware underneath. I have not seen a lot of information on how system administrators can control it.<p>I am not saying such mechanisms do not exist, but with such non-admin install tools (Flatpak is but one), I see little mention of security controls and the development pace is faced.<p>I would not be surprised to see limited (and that's not meant to be a snipe or criticism, I understand there are limits to what is possible as a large mooch consumer of F/LOSS tools), but that worries me.<p>It will be so useful to exploit; I brought it up at security training with far more experienced people than I and many infosec people are completely unaware of these very recent developments and when white hats and black hats catch, I expect the wonderment of the reinvented wheel to greet us always on HN.