[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Popek and Goldberg virtualization requirements
- Subject: Popek and Goldberg virtualization requirements
- From: ryacko at gmail.com (Ryan Carboni)
- Date: Sat, 2 Sep 2017 17:28:56 -0700
https://en.wikipedia.org/wiki/Popek_and_Goldberg_virtualization_requirements
43 years ago, virtual machines were first envisioned.
Now there are more malicious versions of the Morris worm.
I'm not sure if this essay is still accurate:
http://theinvisiblethings.blogspot.com/2011/04/linux-security-circus-on-gui-isolation.html
but Micah Lee clearly doesn't understand it:
If that attacker gets the ability to run programs of their choice on your
> computer, as they often aim to do, they have access to all of your files.
> They can start logging your keystrokes, taking screenshots, and even
> listening to your microphone and watching through your webcam.
There appears to be a widespread failure in communicating current
vulnerabilities as a result of current features, thus preventing people
from making informed decisions on various topics.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 1333 bytes
Desc: not available
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20170902/83c4973b/attachment.txt>