Conversation

Replying to and
Software is written to run on Linux (desktop, server, Android) though, and a more secure OS without applications for it isn't much good. I think in the long term, the ideal would be having a robust microkernel with drivers, filesystems, etc. divided up and isolated well.
1
Replying to and
It needs a way to run existing applications though. The virtualization approach is the most realistic / pragmatic right now. Ideally, I'd like to see a Linux compatibility layer able to avoid having the Linux kernel in the guest, and virtualization could also become optional.
1
1
Replying to and
If we want the services provided by Linux, we have to run it somewhere either as host or guest. I have no basic issues with the Qubes+Xen virtual model; its robust in practice and clear-headed in concept. Feature-rich kernels are good to have if they run as guests.
1
Replying to and
A guest being compromised is still a problem even when it's isolated from the rest of the system. The security of the guests still matters and the Linux kernel is large part of their attack surface and is the weak link for sandboxes they have internally like the Chromium sandbox.
2
Replying to and
But then we're talking about sandboxes within sandboxes. Qubes focuses the user's attention on the qube/vm as the tool to manage risk. And I say this as author of a project that aims to improve Qubes guest security:
2
For the secure messaging example, it can be isolated per contact, and handling things like audio / video decoding for video calls can be isolated, as can cryptography, etc. Finer grained isolation than a group of applications for a certain identity / task is very important.
1
Show replies
Replying to and
The user doesn't need to see the internal boundaries. Security improvements not increasing complexity for the user and depending on them to go through the motions and get things right are the best ones. I can't understand the argument you're making at all.
2
Show replies