←back to thread

176 points TheFreim | 2 comments | | HN request time: 0.576s | source
Show context
legrande ◴[] No.36685913[source]
What kind of threat model requires someone to use Qubes? I know Snowden uses it and there's even a testimonial of him on the Qubes site recommending it. Is this for people on 'lists' or are high value targets because they visited the wrong site or said something the authorities didn't like and their machines are now being targeted?
replies(6): >>36685957 #>>36685977 #>>36686014 #>>36686031 #>>36686103 #>>36686127 #
Syonyk ◴[] No.36686127[source]
> What kind of threat model requires someone to use Qubes?

"Not trusting modern software to be correct nor secure" is sufficient.

I do almost all my web browsing in disposable VMs with no access to interesting things like my password manager, email, SSH keys, etc. I also run JITless (disable Javascript JIT engine), because those are a common attack point on browsers.

If you compromise my browser from a random site, you get nothing of interest. Even if you pop the kernel. You still have to get through Xen to get to anything I consider of value.

replies(2): >>36687359 #>>36687759 #
aborsy ◴[] No.36687359[source]
Browsers have built-in sandboxes, plus sometimes wrapped around stuff like snap.
replies(1): >>36687599 #
1. Syonyk ◴[] No.36687599[source]
And yet...

Browser exploits are a thing, and reliably compromise systems. Apple just released a security update yesterday for "something in WebKit," and we see regular browser security updates.

The art of escaping browser sandboxes seems to exceed the art of building browser sandboxes. The Javascript JIT engine gains you a lot of attack surface, unfortunately (one of the reasons I run JITless with Javascript).

As for snaps, they're just containers - kernel separated. Unfortunately, I consider the value of that against actively malicious code to be "about zero" - local root/kernel exploits are fairly cheap. Containers (so snaps) are great for convenience - if you want to run code you trust without worrying about dependencies, this is fine. They're not fine if you want to isolate things you don't trust - such as a browser from "everything else."

Qubes gives you a much harder boundary around your VMs than containers and sandboxes do.

replies(1): >>36688100 #
2. aborsy ◴[] No.36688100[source]
Snap uses AppArmor, while flatpak uses bubblewrap. You need to have a zero day in these sandboxes, in addition to in the browser. Not so easy!

But definitely VMs provide a much better boundary.