On 2018-04-16 01:05, Chris Laprise wrote:
On 04/15/2018 03:51 PM, Chris Laprise wrote:
Project link: https://github.com/tasket/Qubes-VM-hardening
TL;dr : This closes the obvious loopholes that malware can use in
Qubes AppVMs to escalate privileges, impersonal real apps (to steal
credentials), and persist after shutdown/restart.
VMs' own internal security has a chance to work and even shake-off
rootkits and other malware when VMs are restarted or the template
receives security updates.
Chris Laprise, tas...@posteo.net
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
Awesome! Can't wait till I have some time to try this out.
You received this message because you are subscribed to the Google Groups
To unsubscribe from this group and stop receiving emails from it, send an email
To post to this group, send email to email@example.com.
To view this discussion on the web visit
For more options, visit https://groups.google.com/d/optout.