Conversation

Replying to and
A guest being compromised is still a problem even when it's isolated from the rest of the system. The security of the guests still matters and the Linux kernel is large part of their attack surface and is the weak link for sandboxes they have internally like the Chromium sandbox.
2
Replying to and
But then we're talking about sandboxes within sandboxes. Qubes focuses the user's attention on the qube/vm as the tool to manage risk. And I say this as author of a project that aims to improve Qubes guest security:
2
Replying to and
That doesn't resolve the issue of an application being compromised and an attacker gaining access to everything in that environment. Security against remote compromise and fine-grained containment certainly matters despite coarse-grained isolation chosen by the user higher up.
2
Replying to and
The user doesn't need to see the internal boundaries. Security improvements not increasing complexity for the user and depending on them to go through the motions and get things right are the best ones. I can't understand the argument you're making at all.
2
Replying to and
UI complexity has to be increased by some minimal amount to improve security, which Qubes handles rather well. Its true for anything, like messaging clients that require a verification "ritual", etc. OTOH, simplification sometimes compromises security (browsers offer examples).
1
Replying to and
No, it doesn't. There are plenty of security features not requiring any increase in complexity of the UI. There are many existing security boundaries that can be reinforced with no added complexity and doing that is quite valuable. It has huge benefits for large numbers of users.
1
Some security improvements require increasing complexity for users, others don't. Using a memory safe language, exploit mitigations, fine-grained sandboxing within applications, better cryptographic primitives etc. doesn't increase UI complexity and improves security.
1