You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Thank you for publishing this really cool project.
It seems to be inspired on the AppVMs in Qubes OS.
I would like to know what are the differences between this implementation of the idea and Qubes OS, and what is the maturity status of this project? (Or, similarly, why did you reimplement it?)
How would I recognize a spoofed window from a compromised appvm?
The text was updated successfully, but these errors were encountered:
Current implementation does not support integration into hosts' display manager, so we don't need colorful window decorations for each frame (as in Qubes) just yet.
We would gladly make it support both colors and dm integration, but we don't yet know an easy way to make it work with different guest compositors.
About the maturity — it is far from being a mature project. That being said, whole thing is so naïve and simple right now, that you can safely use it to do compartmentalisation*.
* as long as you trust your FS implementation to keep it's bind mount isolated. * and as long as you believe in QEMU.
Thank you for publishing this really cool project.
It seems to be inspired on the AppVMs in Qubes OS.
I would like to know what are the differences between this implementation of the idea and Qubes OS, and what is the maturity status of this project? (Or, similarly, why did you reimplement it?)
How would I recognize a spoofed window from a compromised appvm?
The text was updated successfully, but these errors were encountered: