Conversation

Replying to and
But then we're talking about sandboxes within sandboxes. Qubes focuses the user's attention on the qube/vm as the tool to manage risk. And I say this as author of a project that aims to improve Qubes guest security:
2
Replying to and
That doesn't resolve the issue of an application being compromised and an attacker gaining access to everything in that environment. Security against remote compromise and fine-grained containment certainly matters despite coarse-grained isolation chosen by the user higher up.
2
For the secure messaging example, it can be isolated per contact, and handling things like audio / video decoding for video calls can be isolated, as can cryptography, etc. Finer grained isolation than a group of applications for a certain identity / task is very important.
1
Replying to and
It's fine-grained isolation of different components. Improving that involves having minimal attack surface exposed between the components, simple data formats and a focus on hardening the code most exposed at the boundaries with safe tools, etc.
1
Isolating per-contact in a messaging client, per-site in a browser, etc. is applying the same principle of QubesOS at a fine-grained level using existing privacy/security boundaries. Since they're existing boundaries, it doesn't require the user to do anything or be aware of it.
2
Replying to and
There are implementations of fine-grained isolation within applications using different mechanisms than OS sandboxing. Architecture-level virtualization is one possible approach and has pros / cons, as do other approaches like a higher-level virtual machine, etc.
1
1
It makes sense to use hardware-supported virtualization for reinforcing those boundaries. I'm just saying there's more to isolation / containment than having the user divide things up at a high level, and there's a lot more to security than isolation / containment too.
Replying to and
IDK if that's literally true. The move to https was itself a form of site isolation & industry was tinkering with hiding URLs altogether when they did about-face out of necessity. We might not have Chrome internal isolation today if not for trend reinforcing site identity in UI.
3
Replying to and
The domain is the site identity. Marking EV identity is on the way out because it isn't actually truly meaningful / helpful for users. They don't know where companies are registered and those names aren't unique while domain names are unique.
2
Show replies