Qubes OS – Wikipedia, the free encyclopedia

Qubes implements a Security by Isolation approach.[10] The assumption is that there can be no perfect, bug-free desktop environment. Such an environment counts millions of lines of code, billions of software/hardware interactions. One critical bug in any of these interactions may be enough for malicious software to take control over a machine.[11][12]In order to secure a desktop, a Qubes user should take care of isolating various environments, so that if one of the components get compromised, the malicious software would get access to only the data inside that environment.[13]In Qubes, the isolation is provided in two dimensions: hardware controllers are isolated into functional domains (GUI, network and storage domains), whereas the user’s digital life is decided in domains with different levels of trust. For instance: work domain (most trusted), shopping domain, random domain (less trusted).[14] Each of those domains is run in a separate virtual machine.Qubes is not a multiuser system.

Source: Qubes OS – Wikipedia, the free encyclopedia


Inside the economics of hacking – The Washington Post

The questionable: The ‘zero-day’ market Then there’s the “zero-day market” that trades on the private sale of previously unknown vulnerabilities, but generally to governments who look to exploit them for surveillance capabilities. These private sales can offer a heftier price tag than traditional bug bounty programs because the clientele includes intelligence agencies with practically unlimited budgets.This is where Zerodium’s iOS competition comes in. The company is set up to be a middleman that pays independent hackers for new ways to break the security of major software products, and then sells that information to government agencies and major corporations at a premium.Spy agencies value this sort of information because they can use it to get around security measures put in place by software makers to perform digital surveillance. Government hacking is becoming increasingly sophisticated as tech companies, and Apple in particular, have expanded their offerings of strong forms of encryption that prevent even the companies themselves from being able to unlock devices and the content of communications, even when served with a warrant.

Source: Inside the economics of hacking – The Washington Post