> On 2016-08-30 01:16, johnyju...@sigaint.org wrote:
>> Say someone compromises the dom0 encrypted drive password, and
>> then goes shuffling through the private.img file of the AppVM's to
>> get at Firefox's passwords...? The VM itself wouldn't have to be
>> running corrupt code for that, and kee
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-30 01:16, johnyju...@sigaint.org wrote:
> Say someone compromises the dom0 encrypted drive password, and
> then goes shuffling through the private.img file of the AppVM's to
> get at Firefox's passwords...? The VM itself wouldn't have to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Fri, Aug 19, 2016 at 08:56:38PM -, johnyju...@sigaint.org wrote:
> > On 2016-08-19 05:11, johnyju...@sigaint.org wrote:
> >> When I try to run qvm-run from within an AppVM, I get "Request refused."
> >>
> >> Is this by design, for security rea
> On 2016-08-19 05:11, johnyju...@sigaint.org wrote:
>> When I try to run qvm-run from within an AppVM, I get "Request refused."
>>
>> Is this by design, for security reasons? If so, I guess that's
>> perfectly
>> reasonable. I just don't see that fact documented anywhere.
>>
>
> Yes, but it's co
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-19 05:11, johnyju...@sigaint.org wrote:
> When I try to run qvm-run from within an AppVM, I get "Request refused."
>
> Is this by design, for security reasons? If so, I guess that's perfectly
> reasonable. I just don't see that fact do
When I try to run qvm-run from within an AppVM, I get "Request refused."
Is this by design, for security reasons? If so, I guess that's perfectly
reasonable. I just don't see that fact documented anywhere.
(The demonstration of one of the Xen exploits executes a qvm-run of xcalc
in dom0 from an