zlacker

[parent] [thread] 9 comments
1. SamRei+(OP)[view] [source] 2014-10-09 02:23:12
Somebody exploiting your PDF reader can't upload all your email.
replies(1): >>Touche+U4
2. Touche+U4[view] [source] 2014-10-09 04:16:52
>>SamRei+(OP)
That's not a model. What's the model that prevents this? User performs a 2-step auth every time code executes?
replies(1): >>SamRei+r5
◧◩
3. SamRei+r5[view] [source] [discussion] 2014-10-09 04:28:50
>>Touche+U4
Just pick one that gives the feature I described without being a pain to the user.
replies(1): >>Touche+k6
◧◩◪
4. Touche+k6[view] [source] [discussion] 2014-10-09 04:55:44
>>SamRei+r5
I know of no such models. Perhaps someone smarter than me has thought of them, that's why I asked the question initially.
replies(2): >>SamRei+I7 >>pjmlp+zj
◧◩◪◨
5. SamRei+I7[view] [source] [discussion] 2014-10-09 05:38:09
>>Touche+k6
Sandboxing. It's present on OS X.
replies(1): >>Touche+As
◧◩◪◨
6. pjmlp+zj[view] [source] [discussion] 2014-10-09 11:26:20
>>Touche+k6
Sandboxing, where each process is only allowed to use a precise set of system resources.

Any attempt to use anything else leads to termination.

replies(1): >>Touche+us
◧◩◪◨⬒
7. Touche+us[view] [source] [discussion] 2014-10-09 13:42:59
>>pjmlp+zj
Which resources are they allowed to use? What defines which resources they are given?
replies(1): >>pjmlp+Iz1
◧◩◪◨⬒
8. Touche+As[view] [source] [discussion] 2014-10-09 13:44:02
>>SamRei+I7
I'm confused. The original person I responded to said that no desktop OSes had good security models. On OSX I can write a script that, when run as a user, has access to everything the user has access to. So what exactly are you talking about?
replies(1): >>SamRei+GH
◧◩◪◨⬒⬓
9. SamRei+GH[view] [source] [discussion] 2014-10-09 16:02:43
>>Touche+As
I'm talking about OS X sandboxing. The hypothetical PDF reader doesn't have access to the email.
◧◩◪◨⬒⬓
10. pjmlp+Iz1[view] [source] [discussion] 2014-10-10 06:46:15
>>Touche+us
> Which resources are they allowed to use?

The system administrator at installation time.

> What defines which resources they are given?

Applications just have a request list of what they require.

If the administrator doesn't allow them for the given application modules (executable, dynamic library, function call,...), bad luck.

[go to top]