On 10.4.2014 15:20, Carsten Haitzler (The Rasterman) wrote:
and what do you do when kernel is malicious (compromised) ? :) or hypervisor?
again - you have to trust at some point. my point here is the display server is
an element of a trusted system. and to the original topic - if a user can do
it, it has access too.

Idea is to split things such way, that compromising component A or B doesn't expose A*B=C. You would need to compromise A and B simultaneously. And restrict the number, interface and size of the components where exploit would grant access to protected data.

Have you seen many malicious exploits out there for IBM's LPAR / z/VM?


Btw, why the heck display server has any access to input methods anyway? It's _DISPLAY_ server and not keyboard or mouse server...

_______________________________________________
Dev mailing list
[email protected]
https://lists.tizen.org/listinfo/dev

Reply via email to