So you're saying that you can run an entire Xen exploit without installing 
anything to the hard drive at all... Just purely run it in the RAM itself.

Wow.

And what do you think about Selfrando..?

Is this going to fix browser exploits once and for all, or will it just fall to 
hackers..?

https://blog.torproject.org/blog/selfrando-q-and-georg-koppen

"Selfrando randomizes Tor browser code to ensure that an attacker doesn't know 
where the code is on your computer. This makes it much harder for someone to 
construct a reliable attack--and harder for them to use a flaw in your Tor 
Browser to de-anonymize you."

http://news.softpedia.com/news/tor-browser-integrates-tool-to-fend-off-deanonymization-exploits-505418.shtml

"While ASLR takes code and shifts the memory location in which it runs, 
Selfrando works by taking each code function separately and randomizing the 
memory address at which it runs.

If the attacker cannot predict the memory position at which pieces of code 
execute, then they cannot trigger memory corruption bugs that usually allow 
them to run rogue code inside the Tor Browser"

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d402e4ba-03b6-45b8-a0e8-381198bedbfd%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to