Popek and Goldberg virtualization requirements
https://en.wikipedia.org/wiki/Popek_and_Goldberg_virtualization_requirements 43 years ago, virtual machines were first envisioned. Now there are more malicious versions of the Morris worm. I'm not sure if this essay is still accurate: http://theinvisiblethings.blogspot.com/2011/04/linux-security-circus-on-gui-... but Micah Lee clearly doesn't understand it: If that attacker gets the ability to run programs of their choice on your
computer, as they often aim to do, they have access to all of your files. They can start logging your keystrokes, taking screenshots, and even listening to your microphone and watching through your webcam.
There appears to be a widespread failure in communicating current vulnerabilities as a result of current features, thus preventing people from making informed decisions on various topics.
On Sat, Sep 2, 2017 at 8:28 PM, Ryan Carboni <ryacko@gmail.com> wrote:
https://en.wikipedia.org/wiki/Popek_and_Goldberg_virtualization_requirements 43 years ago, virtual machines were first envisioned.
Now there are more malicious versions of the Morris worm.
I'm not sure if this essay is still accurate: http://theinvisiblethings.blogspot.com/2011/04/linux-security-circus-on-gui-...
but Micah Lee clearly doesn't understand it:
If that attacker gets the ability to run programs of their choice on your computer, as they often aim to do, they have access to all of your files. They can start logging your keystrokes, taking screenshots, and even listening to your microphone and watching through your webcam.
There appears to be a widespread failure in communicating current vulnerabilities as a result of current features, thus preventing people from making informed decisions on various topics.
What is this subject? Investigate Xnest or separate VT's displays for isolation...?
participants (2)
-
grarpamp
-
Ryan Carboni