mirror of
https://github.com/tasket/Qubes-VM-hardening.git
synced 2025-06-06 13:39:08 -04:00
Readme updates pending...
This commit is contained in:
parent
d0c2519a2a
commit
05f4e30a22
1 changed files with 1 additions and 3 deletions
|
@ -58,8 +58,6 @@ The `vm-boot-protect` concept relies mostly on the guest operating system's own
|
|||
|
||||
Repeated running of some apps such as Firefox, Chrome, LibreOffice, PDF viewers, online games, etc. may allow malware to persist in a VM; this is not only because of the complexity of the formats handled by such apps, but also because of settings contained in javascript or which specify shell commands to be executed by the app.
|
||||
|
||||
Further, if the user configures a vulnerable app to run at startup, this introduces a malware persistence risk -- although not to the VM's whole execution environment if no privilege escalation is available to the attacker.
|
||||
|
||||
### Notes
|
||||
|
||||
* The service name has been changed from `vm-sudo-protect` in pre-release to `vm-boot-protect`. The install script will automatically try to disable the old service.
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue