From 073f55da60c4afd7fa5744f89159e0ded324051b Mon Sep 17 00:00:00 2001 From: Michael Carbone Date: Sun, 28 Jan 2018 09:01:28 -0500 Subject: [PATCH] various fixes fixed formatting, pushed all mentor="inquire qubes-devel" to the bottom. --- basics_dev/gsoc.md | 29 +++++++++++++++-------------- 1 file changed, 15 insertions(+), 14 deletions(-) diff --git a/basics_dev/gsoc.md b/basics_dev/gsoc.md index f285fcf8..19d4deff 100644 --- a/basics_dev/gsoc.md +++ b/basics_dev/gsoc.md @@ -480,6 +480,18 @@ details in [#2618](https://github.com/QubesOS/qubes-issues/issues/2618). **Mentor**: [Marek Marczykowski-Górecki](/team/) +### Generalize the Qubes PDF Converter to other types of files + +**Project**: Qubes Converters + +**Brief explanation**: One of the pioneering ideas of Qubes is to use disposable virtual machines to convert untrustworthy files (such as documents given to journalists by unknown and potentially malicious whistleblowers) into trusthworhty files. See [Joanna's blog on the Qubes PDF Convert](http://theinvisiblethings.blogspot.co.uk/2013/02/converting-untrusted-pdfs-into-trusted.html) for details of the idea. Joanna has implemented a prototype for PDF documents. The goal of this project would be to generalize beyond the simple prototype to accommodate a wide variety of file formats, including Word documents, audio files, video files, spreadsheets, and so on. The converters should prioritise safety over faithful conversion. For example the Qubes PDF converter typically leads to lower quality PDFs (e.g. cut and paste is no longer possible), because this makes the conversion process safer. + +**Expected results**: We expect that in the timeframe, it will be possible to implement many converters for many file formats. However, if any unexpected difficulties arise, we would prioritise a small number of safe and high quality converters over a large number of unsafe or unuseful converters. + +**Knowledge prerequisite**: Most of the coding will probably be implemented as shell scripts to interface with pre-existing converts (such as ImageMagick in the Qubes PDF converter). However, shell scripts are not safe for processing untrusted data, so any extra processing will need to be implemented in another language -- probably Python. + +**Mentors**: Andrew Clausen and Jean-Philippe Ouellet + ### Mitigate focus-stealing attacks **Project**: Mitigate focus-stealing attacks @@ -489,7 +501,7 @@ details in [#2618](https://github.com/QubesOS/qubes-issues/issues/2618). **Knoledge prerequisite**: X APIs, Qubes GUI protocol, familiarity with the targeted window manager. -**Mentor**: +**Mentor**: Inquire on [qubes-devel][ml-devel]. ### Progress towards reproducible builds **Project**: Progress towards reproducible builds @@ -506,7 +518,7 @@ for more information and qubes-specific background. **Knoledge prerequisite**: qubes-builder [[1]](https://www.qubes-os.org/doc/qubes-builder/) [[2]](https://www.qubes-os.org/doc/qubes-builder-details/) [[3]](https://github.com/QubesOS/qubes-builder/tree/master/doc), and efficient at introspecting complex systems: comfortable with tracing and debugging tools, ability to quickly identify and locate issues within a large codebase (upstream build tools), etc. -**Mentor**: +**Mentor**: Inquire on [qubes-devel][ml-devel]. ### Android development in Qubes @@ -521,19 +533,8 @@ Details, reference: [#2233](https://github.com/QubesOS/qubes-issues/issues/2233) **Knowledge prerequisite**: -**Mentor**: +**Mentor**: Inquire on [qubes-devel][ml-devel]. -### Generalize the Qubes PDF Converter to other types of files - -**Project**: Qubes Converters - -**Brief explanation**: One of the pioneering ideas of Qubes is to use disposable virtual machines to convert untrustworthy files (such as documents given to journalists by unknown and potentially malicious whistleblowers) into trusthworhty files. See [Joanna's blog on the Qubes PDF Convert](http://theinvisiblethings.blogspot.co.uk/2013/02/converting-untrusted-pdfs-into-trusted.html) for details of the idea. Joanna has implemented a prototype for PDF documents. The goal of this project would be to generalize beyond the simple prototype to accommodate a wide variety of file formats, including Word documents, audio files, video files, spreadsheets, and so on. The converters should prioritise safety over faithful conversion. For example the Qubes PDF converter typically leads to lower quality PDFs (e.g. cut and paste is no longer possible), because this makes the conversion process safer. - -**Expected results**: We expect that in the timeframe, it will be possible to implement many converters for many file formats. However, if any unexpected difficulties arise, we would prioritise a small number of safe and high quality converters over a large number of unsafe or unuseful converters. - -**Knowledge prerequisite**: Most of the coding will probably be implemented as shell scripts to interface with pre-existing converts (such as ImageMagick in the Qubes PDF converter). However, shell scripts are not safe for processing untrusted data, so any extra processing will need to be implemented in another language -- probably Python. - -**Mentors**: Andrew Clausen and Jean-Philippe Ouellet ---- We adapted some of the language here about GSoC from the [KDE GSoC page](https://community.kde.org/GSoC).