On 2018-04-16 01:05, Chris Laprise wrote:
On 04/15/2018 03:51 PM, Chris Laprise wrote:
Project link: https://github.com/tasket/Qubes-VM-hardening

TL;dr : This closes the obvious loopholes that malware can use in
Qubes AppVMs to escalate privileges, impersonal real apps (to steal
credentials), and persist after shutdown/restart.

VMs' own internal security has a chance to work and even shake-off
rootkits and other malware when VMs are restarted or the template
receives security updates.

--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

Awesome! Can't wait till I have some time to try this out.
Thanks Chris!!!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/24460ed9cbee3be985c4470636a31956%40posteo.net.
For more options, visit https://groups.google.com/d/optout.

Reply via email to