Popek and Goldberg virtualization requirements

grarpamp grarpamp at gmail.com
Sat Sep 2 18:16:03 PDT 2017


On Sat, Sep 2, 2017 at 8:28 PM, Ryan Carboni <ryacko at gmail.com> wrote:
> https://en.wikipedia.org/wiki/Popek_and_Goldberg_virtualization_requirements
> 43 years ago, virtual machines were first envisioned.
>
> Now there are more malicious versions of the Morris worm.
>
> I'm not sure if this essay is still accurate:
> http://theinvisiblethings.blogspot.com/2011/04/linux-security-circus-on-gui-isolation.html
>
> but Micah Lee clearly doesn't understand it:
>
>> If that attacker gets the ability to run programs of their choice on your
>> computer, as they often aim to do, they have access to all of your files.
>> They can start logging your keystrokes, taking screenshots, and even
>> listening to your microphone and watching through your webcam.
>
>
> There appears to be a widespread failure in communicating current
> vulnerabilities as a result of current features, thus preventing people from
> making informed decisions on various topics.

What is this subject? Investigate Xnest or separate VT's displays for
isolation...?



More information about the cypherpunks mailing list