Re: [qubes-users] ANN: Split Browser (disposable Tor Browser, persistent bookmarks/logins)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-11-30 09:12, Rusty Bird wrote: > "Everyone loves the Whonix approach of running Tor Browser and the tor > daemon in two separate Qubes VMs, e.g. anon-whonix and sys-whonix. > > Let's take it a step further and run Tor Browser (or other Firefox > versions) in a DisposableVM connecting through the tor VM (or through > any other NetVM/ProxyVM), while storing bookmarks and logins in a > persistent VM - with carefully restricted data flow. > > [...] This looks extremely cool. Thanks, Rusty. Tracking potential integration here: https://github.com/QubesOS/qubes-issues/issues/2469 Also added to the community-developed feature tracker: https://www.qubes-os.org/qubes-issues/ - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYP6vyAAoJENtN07w5UDAwmt0P+wQnb13rNf6aiFOmtCHJuB6N cWRKh9hGGWHCzOUoxS90YAED+mM5S8NjbPJNe5s73B81pBBQY7Pt9/DN2cO3A6jB wUtpE/01YhNaKYssnrqOamnbk8+w5hefeUeOfIW+CVzvAqAlkoUn+N9NSbSMjOT4 yDIgLnUDg7s38/EtSOiwPzr1rQmBSKAx3LzjqSzWAHRTQqQUXcgK6/XEuTevZcbF CsXxOMzqCLB4CBg4ZosPuFyUDAhIZSKT93FDh2eq1LElmpAXbtFm+BhAY/+Xj27v NxO0gINpWflTivi58hmL0lmh5oCx82xosW7A1Pe//0Dk8lHuNRk5OMGED3ZSY07B kX1ffU/8pkzbQuBd+dOffU2C9XU1gBYPnMdEwUZ+AWFIpTPgjQb3ZhbCuPzuK1fG aYa902S7oAW5M2E2WhU8u5s/SShXC2DjvELAFlWiEfPXnWOzkuwbLFmd9NGNTFj0 8q1iypp9f9JTCg7FbhUiD9Xxve1NxmOxBJPzjoC46s2K6ecSuDuztTcK5VaEtKcv q9ayojyAEaZjqJwfki/+QBzwCS+QRY8olTF6gjJkcw7qEI2cAlM6F4M0VqGuhL1p b/8UGIcSoxbirZvIqJwez6JWRF7oQ5iUuPZE4U4oQvS85+VVV3d3VMd7mil+uneT j0xWYBuGr/87vNSAD8wZ =WvEA -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/550797f6-137a-ac1c-d7b7-c9b6ae96dbbb%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] ANN: Split Browser (disposable Tor Browser, persistent bookmarks/logins)
On 11/30/2016 12:12 PM, Rusty Bird wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 "Everyone loves the Whonix approach of running Tor Browser and the tor daemon in two separate Qubes VMs, e.g. anon-whonix and sys-whonix. Let's take it a step further and run Tor Browser (or other Firefox versions) in a DisposableVM connecting through the tor VM (or through any other NetVM/ProxyVM), while storing bookmarks and logins in a persistent VM - with carefully restricted data flow. In this setup, the DisposableVM's browser can send various requests to the persistent VM: - Bookmark the current page - Let the user choose a bookmark to load - Let the user authorize logging into the current page But if the browser gets exploited, it won't be able to read all your bookmarks or login credentials and send them to the attacker. And you can restart the browser DisposableVM frequently (which shouldn't take more than 10-15 seconds) to 'shake off' such an attack." ... continued at https://github.com/rustybird/qubes-split-browser Rusty This looks very interesting... will be trying it our soon. Thanks! Chris -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d6714e65-091a-5e4f-cd8c-95f10eabe92b%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] ANN: Split Browser (disposable Tor Browser, persistent bookmarks/logins)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 "Everyone loves the Whonix approach of running Tor Browser and the tor daemon in two separate Qubes VMs, e.g. anon-whonix and sys-whonix. Let's take it a step further and run Tor Browser (or other Firefox versions) in a DisposableVM connecting through the tor VM (or through any other NetVM/ProxyVM), while storing bookmarks and logins in a persistent VM - with carefully restricted data flow. In this setup, the DisposableVM's browser can send various requests to the persistent VM: - Bookmark the current page - Let the user choose a bookmark to load - Let the user authorize logging into the current page But if the browser gets exploited, it won't be able to read all your bookmarks or login credentials and send them to the attacker. And you can restart the browser DisposableVM frequently (which shouldn't take more than 10-15 seconds) to 'shake off' such an attack." ... continued at https://github.com/rustybird/qubes-split-browser Rusty -BEGIN PGP SIGNATURE- iQJ8BAEBCgBmBQJYPwiVXxSAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ4NEI1OUJDRkM2MkIxMjlGRTFCMDZEMDQ0 NjlENzhGNDdBQUYyQURGAAoJEEadePR6ryrfz40P/iunQJo+8jsG1XrM+nlB66Bd D7y/fZnx8MhZi28058XvQzlyEqEIZz9T/rzbXuB67ERHkWHoHuYaYufeMG7fCrRz wTpAwX+5F4N50Cfbleq0EDYnGgdey83k7e4QqYV6mgBU/vBNLYIi8gSl0Jld9by2 /q6XP1ywGmD/qg7Quf94tgEGHPsg1CssiX6TjgcUynsC37ouChB5XLwsNJ6c72Xf YktYd+KqXfX7kCt1B1EgMa1udjvybeS4oLCh4UEC+X3bcQaaN3c5PXc3lphdzkbv Xa4qP/6sDt/Vb216zR8xuRa6TORs7YEM3Bz19ydSwcHpL2vQzwAhsajczmkW0F38 n0BSEerpyB9pOhAEL7lETqoYe8fEBJBF/h5oy7dFf5yTp5gAp4EIs4eOsxHOxwjG nJAxlYZ8gBmXg00Ed8o5AlKhBY3X1vY8wE3e54p7jXcdDaaHKOfIpafCfhhaM8CF aiCZWk6lzU3ptyzsXsCv8bESQvoDNRiKPQP4z5d5NiCTxb6kWxwhM/NTn7MfA8oq aqQwC/uuHpnHzzdv9PMSFDdeuKIIodYSzFm9FutDsXg6VyCX/04KurMjDZJF4lTL PnS3S/sP7meIMvs4xPOUXjN7HMhT7spxKAYOfOYgA+UYpvTz/gNFdNY0MZW1HCkv d5Oaet39i+NGXvDLwCo3 =dZiz -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161130171254.GA6811%40mutt. For more options, visit https://groups.google.com/d/optout.