zlacker

[parent] [thread] 10 comments
1. Touche+(OP)[view] [source] 2014-10-09 01:33:21
What would be the better security model?
replies(1): >>SamRei+42
2. SamRei+42[view] [source] 2014-10-09 02:23:12
>>Touche+(OP)
Somebody exploiting your PDF reader can't upload all your email.
replies(1): >>Touche+Y6
◧◩
3. Touche+Y6[view] [source] [discussion] 2014-10-09 04:16:52
>>SamRei+42
That's not a model. What's the model that prevents this? User performs a 2-step auth every time code executes?
replies(1): >>SamRei+v7
◧◩◪
4. SamRei+v7[view] [source] [discussion] 2014-10-09 04:28:50
>>Touche+Y6
Just pick one that gives the feature I described without being a pain to the user.
replies(1): >>Touche+o8
◧◩◪◨
5. Touche+o8[view] [source] [discussion] 2014-10-09 04:55:44
>>SamRei+v7
I know of no such models. Perhaps someone smarter than me has thought of them, that's why I asked the question initially.
replies(2): >>SamRei+M9 >>pjmlp+Dl
◧◩◪◨⬒
6. SamRei+M9[view] [source] [discussion] 2014-10-09 05:38:09
>>Touche+o8
Sandboxing. It's present on OS X.
replies(1): >>Touche+Eu
◧◩◪◨⬒
7. pjmlp+Dl[view] [source] [discussion] 2014-10-09 11:26:20
>>Touche+o8
Sandboxing, where each process is only allowed to use a precise set of system resources.

Any attempt to use anything else leads to termination.

replies(1): >>Touche+yu
◧◩◪◨⬒⬓
8. Touche+yu[view] [source] [discussion] 2014-10-09 13:42:59
>>pjmlp+Dl
Which resources are they allowed to use? What defines which resources they are given?
replies(1): >>pjmlp+MB1
◧◩◪◨⬒⬓
9. Touche+Eu[view] [source] [discussion] 2014-10-09 13:44:02
>>SamRei+M9
I'm confused. The original person I responded to said that no desktop OSes had good security models. On OSX I can write a script that, when run as a user, has access to everything the user has access to. So what exactly are you talking about?
replies(1): >>SamRei+KJ
◧◩◪◨⬒⬓⬔
10. SamRei+KJ[view] [source] [discussion] 2014-10-09 16:02:43
>>Touche+Eu
I'm talking about OS X sandboxing. The hypothetical PDF reader doesn't have access to the email.
◧◩◪◨⬒⬓⬔
11. pjmlp+MB1[view] [source] [discussion] 2014-10-10 06:46:15
>>Touche+yu
> Which resources are they allowed to use?

The system administrator at installation time.

> What defines which resources they are given?

Applications just have a request list of what they require.

If the administrator doesn't allow them for the given application modules (executable, dynamic library, function call,...), bad luck.

[go to top]