Desktop / Laptop privacy & security of web browsers on Linux part 1: concepts and theory
Web browsers today are everywhere, and they are a huge pile of
shitcode, full of shiny things that hide sometimes bad surprises, but, despite this fact, you want to use it daily cause oftoomany things today depend on you to visit a web site often requiring you[r] latest web technologies.Even if many vendor[s] today take browser security seriously, the fast evolution of web standards make [it] very hard to care about that on such big projects, and almost everyday in the wild appear a new method to fuck poor users using the web as a vector of evil code, using both browser vulnerability or user
stupidityinnocence.There is no 100% security, if anyone tell[s] you he has the panacea of all evil things and can show you how to be 100% protected online, it's a liar, no exception. Despite that, something can be done to be at least a little bit more secure and block the most common attack vectors, with a cost in terms of usability that is really cheap.
[Continues...]
Desktop / Laptop privacy & security of web browsers on Linux part 2: firejail based sandboxesThere are many tools in the wild to build the sandboxes using the features explained, some more user friendly, other more complex, some more complete, other more specific to one or few features.
After some tests and with the help of many friends from the Veteran Unix Admins group on facebook, the primary tool I've chosen to use is firejail.
Firejail is a great utility aiming to build sandboxes and it match almost perfectly our needs. With just a little bit of shell scripting, a little patch I have sent to firejail and a couple of other tools supported by firejail itself, we have all what is needed for our architecture.
(Score: 2) by butthurt on Thursday August 11 2016, @01:13AM
If you can get these these possibly outdated instructions to running virtualbox in windowless/headless mode to work:
http://www.thatsgeeky.com/2012/03/windowless-virtualbox-vms-windows-host/ [thatsgeeky.com]
then set up a host-only network interface on your VM, have sshd listen on that interface, and connect to that with ssh -X from your host, it should do what you have in mind.
(Score: 2) by frojack on Thursday August 11 2016, @01:39AM
Late versions of Virtualbox run headless with no drama. (at least in linux)
VBoxManage startvm "VM name" --type headless
I prefer to talk to mine with vnc, as it at least pretends to be secure.
No, you are mistaken. I've always had this sig.