Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

README: Compare with Qubes OS? #11

Open
roberth opened this issue Dec 31, 2019 · 1 comment
Open

README: Compare with Qubes OS? #11

roberth opened this issue Dec 31, 2019 · 1 comment

Comments

@roberth
Copy link

roberth commented Dec 31, 2019

Thank you for publishing this really cool project.
It seems to be inspired on the AppVMs in Qubes OS.
I would like to know what are the differences between this implementation of the idea and Qubes OS, and what is the maturity status of this project? (Or, similarly, why did you reimplement it?)
How would I recognize a spoofed window from a compromised appvm?

@cab404
Copy link
Collaborator

cab404 commented Dec 31, 2019

Hello!

Current implementation does not support integration into hosts' display manager, so we don't need colorful window decorations for each frame (as in Qubes) just yet.
We would gladly make it support both colors and dm integration, but we don't yet know an easy way to make it work with different guest compositors.

About the maturity — it is far from being a mature project. That being said, whole thing is so naïve and simple right now, that you can safely use it to do compartmentalisation*.

* as long as you trust your FS implementation to keep it's bind mount isolated.
* and as long as you believe in QEMU.

Repository owner deleted a comment from github-actions bot Dec 16, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants