Popek and Goldberg virtualization requirements

Ryan Carboni ryacko at gmail.com
Sat Sep 2 17:28:56 PDT 2017


https://en.wikipedia.org/wiki/Popek_and_Goldberg_virtualization_requirements
43 years ago, virtual machines were first envisioned.

Now there are more malicious versions of the Morris worm.

I'm not sure if this essay is still accurate:
http://theinvisiblethings.blogspot.com/2011/04/linux-security-circus-on-gui-isolation.html

but Micah Lee clearly doesn't understand it:

If that attacker gets the ability to run programs of their choice on your
> computer, as they often aim to do, they have access to all of your files.
> They can start logging your keystrokes, taking screenshots, and even
> listening to your microphone and watching through your webcam.



There appears to be a widespread failure in communicating current
vulnerabilities as a result of current features, thus preventing people
from making informed decisions on various topics.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 1333 bytes
Desc: not available
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20170902/83c4973b/attachment.txt>


More information about the cypherpunks mailing list