On Sun, April 15, 2018 8:41 pm, Chris Laprise wrote: > On 04/15/2018 04:05 PM, Chris Laprise wrote: > >> On 04/15/2018 03:51 PM, Chris Laprise wrote: >> >>> Project link: https://github.com/tasket/Qubes-VM-hardening >>> >> >> TL;dr : This closes the obvious loopholes that malware can use in Qubes >> AppVMs to escalate privileges, _impersonate_ real apps (to steal >> credentials), and persist after shutdown/restart. > > ^FIXED :) > > >> >> VMs' own internal security has a chance to work and even shake-off >> rootkits and other malware when VMs are restarted or the template >> receives security updates.
Thanks, tasket! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to email@example.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e0fb6f8b28e55bbde18824f44c1a57a9.squirrel%40tt3j2x4k5ycaa5zt.onion. For more options, visit https://groups.google.com/d/optout.