Users browsing this thread: 2 Guest(s)
venam
Administrators
I mentioned it in the podcast about Browsers.

Quote:* paranoid:
web sites i know to be evil, or just i think probably can be malicious,
or just i want to be reasonabily sure it’s hard for them to trace me
and my identity.

https://firejail.wordpress.com/
https://www.nexlab.net/2016/08/06/deskto...nd-theory/

He builds a sanboxed webbrowser using firejail:

The paranoid version runs in a jail, with a different user with different
permissions.
It will not access to sound, mic or cam at all. It will access network
only through tor, and it will run on a separate networking namespace.
Also, it will NOT share clipboard with the X11 session, as it will run
on a completely separate session using xpra.
It also passes through a proxy or tor.
Saves all the download to a temporary file system to make it more volatile.
Sagitarius also mentioned it in the "help secure your OS" thread: https://nixers.net/showthread.php?tid=17...8#pid14658

So overall we didn't have any in depth talk about it yet.
It would be fruitful if you could log/note whatever you learn along the way and share it.


Messages In This Thread
firejail - by robotchaos - 02-09-2016, 02:08 PM
RE: firejail - by venam - 02-09-2016, 02:32 PM
RE: firejail - by robotchaos - 13-09-2016, 06:43 PM
RE: firejail - by robotchaos - 11-10-2016, 03:05 PM
RE: firejail - by josuah - 17-10-2016, 05:06 PM
RE: firejail - by oldnix - 03-02-2017, 10:05 AM