Re: [qubes-users] Question about Whonix / Tor Browser / exploits

2016-08-03 Thread Jeremy Rand
neilhard...@gmail.com: > So you're saying that you can run an entire Xen exploit without installing > anything to the hard drive at all... Just purely run it in the RAM itself. Well, most GNU/Linux systems have a /tmp/ partition, which acts like a hard drive but is backed by RAM. So even if you

Re: [qubes-users] Question about Whonix / Tor Browser / exploits

2016-08-03 Thread neilhardley
So you're saying that you can run an entire Xen exploit without installing anything to the hard drive at all... Just purely run it in the RAM itself. Wow. And what do you think about Selfrando..? Is this going to fix browser exploits once and for all, or will it just fall to hackers..? https:

Re: [qubes-users] Question about Whonix / Tor Browser / exploits

2016-08-02 Thread Jeremy Rand
neilhard...@gmail.com: > I have a question about Whonix/Tor Browser exploits. > > I have played around a bit with Metasploit to see how browser exploits work. > > They basically rig a web page with exploits, and then it does what's known as > "arbitrary code execution", to open up a "remote shel

[qubes-users] Question about Whonix / Tor Browser / exploits

2016-08-02 Thread neilhardley
I have a question about Whonix/Tor Browser exploits. I have played around a bit with Metasploit to see how browser exploits work. They basically rig a web page with exploits, and then it does what's known as "arbitrary code execution", to open up a "remote shell". As far as I can tell.. the rem