brl | 8 years ago | on: The Google memo isn’t sexist or anti-diversity, it’s science
brl's comments
brl | 9 years ago | on: When ‘he’ll be kept on payroll, somewhere’ is where you are
Some of his side of the story has been told in the leaked emails:
brl | 9 years ago | on: Subgraph OS: Adversary resistant computing platform
I wasn't talking about AppVMs at all, but you can of course persistently backdoor Qubes AppVMs in numerous ways by writing to the user home directory. In Subgraph OS we design our application sandboxes to prevent exactly this.
brl | 9 years ago | on: Subgraph OS: Adversary resistant computing platform
Subgraph sandboxes run in a network namespace with no direct access to the network or ability to view any of the physical network interfaces on the system. There is no way for an attacker to send network traffic directly or to discover the real IP address of the system without breaking out of the sandbox.
brl | 9 years ago | on: Subgraph OS: Adversary resistant computing platform
On Qubes OS the networking VM runs a standard Linux kernel with no special security hardening at all apart from the simple fact that it runs in a separate Xen VM. If an attacker is able to compromise NetVM, they may not have direct access to user data, but they have dangerous access to perform further attacks:
- Attacks against hypervisor to break isolation
- Side channel attacks against other Qubes VMs to steal cryptographic keys
- Interception and tampering with networking traffic
- Attacks against any internal network this Qubes OS computer connects to.
So if you assume that remote attacks against the Linux kernel networking stack are an important threat, the consequences of a successful attack even against Qubes are pretty bad.Subgraph OS hardens the Linux kernel with grsecurity, which includes many defenses against exploitation which have historically prevented local exploitation of most security vulnerabilities against the kernel. Exploiting kernel vulnerabilities locally is so much easier, probably never less than an order of magnitude easier. It's so rare to reliably exploit kernel vulnerabilities remotely even against an unhardened kernel that teams present papers at top security conferences about a single exploit:
https://www.blackhat.com/presentations/bh-usa-07/Ortega/Whit...
I know it's contentious to say so, but I don't believe that anybody will ever remotely exploit a kernel vulnerability against a grsecurity hardened Linux kernel, especially since RAP was introduced:
https://grsecurity.net/rap_announce.php
The threat of remotely attacking the Linux kernel through the networking or USB stack was always low in my opinion, but as the threat approaches zero it raises some questions about how justifiable the system VMs are in Qubes OS considering the system complexity and usability impairment they introduce.
brl | 9 years ago | on: Subgraph OS: Adversary resistant computing platform
I don't know what you base that opinion on since it's not an easy comparison to reason about. One metric you could use would be actual vulnerabilities. In the last year there have been several hypervisor escape vulnerabilites that compromised Qubes OS VM isolation completely, most (all?) of which have been present in Xen for the entire lifetime of the Qubes project.
By contrast during the same period only one Linux kernel vulnerability (DirtyCow) affected Subgraph sandboxed applications, and it would only have been exploitable using techniques which have not been disclosed in any public exploit so far.
brl | 9 years ago | on: Jacob Appelbaum: What Has This Man Done?
brl | 10 years ago | on: Show HN: Subgraph OS, the secure os
brl | 10 years ago | on: Refugees Welcome
https://en.wikipedia.org/wiki/Syrian_presidential_election,_...
Also surveyed at that time were the million Syrian refugees living in Lebanon:
https://www.washingtonpost.com/news/worldviews/wp/2014/05/28...
brl | 10 years ago | on: Let Snowden Come Home
brl | 11 years ago | on: Bad Notes on Venture Capital
brl | 11 years ago | on: Debian Security Advisory: DSA-3025-1 apt
brl | 11 years ago | on: Email encryption in transit
brl | 11 years ago | on: Notch programming a Doom-like in Dart
brl | 11 years ago | on: Nyms Identity Directory
brl | 11 years ago | on: Nyms Identity Directory
Private keys don't need maintenance after generation since they are simply stored on the user's computer.
brl | 11 years ago | on: Nyms Identity Directory
Registration and maintenance of keys is entirely automated. Making everything as easy as possible for users without compromising on strong guarantees about key authenticity is the whole point of this project.
brl | 11 years ago | on: Nyms Identity Directory
brl | 11 years ago | on: Nyms Identity Directory
Sometime soon we're going to improve the website with a friendlier high-level description of the goals of the project and the problems that it solves. For now, I apologize that this rather dense document is the only information available.
It might be easier to understand what I'm trying to achieve by reading a post I made yesterday to the modern crypto mailing list which summarized the important features of Nyms:
https://moderncrypto.org/mail-archive/messaging/2014/000602....
brl | 11 years ago | on: How to take over the computer of a Maven Central user