Re: [qubes-users] ANN: Split Browser (disposable Tor Browser, persistent bookmarks/logins)

2016-11-30 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-11-30 09:12, Rusty Bird wrote:
> "Everyone loves the Whonix approach of running Tor Browser and the tor
>  daemon in two separate Qubes VMs, e.g. anon-whonix and sys-whonix.
> 
>  Let's take it a step further and run Tor Browser (or other Firefox
>  versions) in a DisposableVM connecting through the tor VM (or through
>  any other NetVM/ProxyVM), while storing bookmarks and logins in a
>  persistent VM - with carefully restricted data flow.
> 
>  [...]

This looks extremely cool. Thanks, Rusty. Tracking potential
integration here:

https://github.com/QubesOS/qubes-issues/issues/2469

Also added to the community-developed feature tracker:

https://www.qubes-os.org/qubes-issues/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=WvEA
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/550797f6-137a-ac1c-d7b7-c9b6ae96dbbb%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] ANN: Split Browser (disposable Tor Browser, persistent bookmarks/logins)

2016-11-30 Thread Chris Laprise

On 11/30/2016 12:12 PM, Rusty Bird wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

"Everyone loves the Whonix approach of running Tor Browser and the tor
  daemon in two separate Qubes VMs, e.g. anon-whonix and sys-whonix.

  Let's take it a step further and run Tor Browser (or other Firefox
  versions) in a DisposableVM connecting through the tor VM (or through
  any other NetVM/ProxyVM), while storing bookmarks and logins in a
  persistent VM - with carefully restricted data flow.

  In this setup, the DisposableVM's browser can send various requests to
  the persistent VM:

- Bookmark the current page
- Let the user choose a bookmark to load
- Let the user authorize logging into the current page

  But if the browser gets exploited, it won't be able to read all your
  bookmarks or login credentials and send them to the attacker. And you
  can restart the browser DisposableVM frequently (which shouldn't take
  more than 10-15 seconds) to 'shake off' such an attack."

... continued at https://github.com/rustybird/qubes-split-browser

Rusty


This looks very interesting... will be trying it our soon. Thanks!

Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d6714e65-091a-5e4f-cd8c-95f10eabe92b%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] ANN: Split Browser (disposable Tor Browser, persistent bookmarks/logins)

2016-11-30 Thread Rusty Bird
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

"Everyone loves the Whonix approach of running Tor Browser and the tor
 daemon in two separate Qubes VMs, e.g. anon-whonix and sys-whonix.

 Let's take it a step further and run Tor Browser (or other Firefox
 versions) in a DisposableVM connecting through the tor VM (or through
 any other NetVM/ProxyVM), while storing bookmarks and logins in a
 persistent VM - with carefully restricted data flow.

 In this setup, the DisposableVM's browser can send various requests to
 the persistent VM:

   - Bookmark the current page
   - Let the user choose a bookmark to load
   - Let the user authorize logging into the current page

 But if the browser gets exploited, it won't be able to read all your
 bookmarks or login credentials and send them to the attacker. And you
 can restart the browser DisposableVM frequently (which shouldn't take
 more than 10-15 seconds) to 'shake off' such an attack."

... continued at https://github.com/rustybird/qubes-split-browser

Rusty
-BEGIN PGP SIGNATURE-
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=dZiz
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161130171254.GA6811%40mutt.
For more options, visit https://groups.google.com/d/optout.