[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Popek and Goldberg virtualization requirements
- Subject: Popek and Goldberg virtualization requirements
- From: grarpamp at gmail.com (grarpamp)
- Date: Sat, 2 Sep 2017 21:16:03 -0400
- In-reply-to: <CAO7N=i2Ai66B4Gckx0-2NtYXbz=UEqjLQd9+WJ78_GLizchJ3g@mail.gmail.com>
- References: <CAO7N=i2Ai66B4Gckx0-2NtYXbz=UEqjLQd9+WJ78_GLizchJ3g@mail.gmail.com>
On Sat, Sep 2, 2017 at 8:28 PM, Ryan Carboni <ryacko at gmail.com> wrote:
> https://en.wikipedia.org/wiki/Popek_and_Goldberg_virtualization_requirements
> 43 years ago, virtual machines were first envisioned.
>
> Now there are more malicious versions of the Morris worm.
>
> I'm not sure if this essay is still accurate:
> http://theinvisiblethings.blogspot.com/2011/04/linux-security-circus-on-gui-isolation.html
>
> but Micah Lee clearly doesn't understand it:
>
>> If that attacker gets the ability to run programs of their choice on your
>> computer, as they often aim to do, they have access to all of your files.
>> They can start logging your keystrokes, taking screenshots, and even
>> listening to your microphone and watching through your webcam.
>
>
> There appears to be a widespread failure in communicating current
> vulnerabilities as a result of current features, thus preventing people from
> making informed decisions on various topics.
What is this subject? Investigate Xnest or separate VT's displays for
isolation...?