Re: [qubes-users] TVM ASLR-exploit-proof?

2016-10-17 Thread 10378213217831783789
Hello, Tails is also using ASLR security tech now... https://fossbytes.com/tails-2-6-secure-linux-os-snowden-updated-tor-and-kernel/ Kind Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop

Re: [qubes-users] TVM ASLR-exploit-proof?

2016-10-17 Thread 0923718973178347240243
Hello Rudd-O, here is an interessting concept, in some way they reach the RAM randomization by one central DLL (for Windows Plattforms only), but it works direct on the fly for all apps and libs!!! http://www.morphisec.com/how-it-works/ Wow, not bad! This will be much more robust. And in

Re: [qubes-users] TVM ASLR-exploit-proof?

2016-10-14 Thread Manuel Amador (Rudd-O)
On 10/14/2016 01:26 PM, 917832409173409178324097 wrote: > Hello, > > can ASLR tech help to build a hard template VM for Qubes? > > https://securityetalii.es/2013/02/03/how-effective-is-aslr-on-linux-systems/ > > checksec.sh: > How important it is that all libs and executables are PIE-compiled? >

[qubes-users] TVM ASLR-exploit-proof?

2016-10-14 Thread 917832409173409178324097
Hello, can ASLR tech help to build a hard template VM for Qubes? https://securityetalii.es/2013/02/03/how-effective-is-aslr-on-linux-systems/ checksec.sh: How important it is that all libs and executables are PIE-compiled? Are 100% of the TVM PIE compliant?