On Thu, Sep 19, 2013 at 6:04 PM, Axon <
ax...@openmailbox.org> wrote:
> ...
> Instead of *replacing* conventional Xen domUs with app-level virtualization,
> what about *combining* the two approaches by preserving Qubes' current
> security domain structure and integrating app-level virtualization *within*
> security domains?
this is probably the most expedient and pragmatic approach to
isolating certain applications on a per app / per instance basis.
that said, the strength of Qubes strong isolation between domains is
useful to apply at this same per application and per instance
granularity, if you can make it workable.
sad reality tells us some tasks entail their own worlds of operation
with many dependencies and workflows; these are likely to remain
chimera of larger domU environments with some per application
isolation via techniques above, perhaps combined with some explicit or
training/implicit RBAC rulesets, also combined with ... [turtles all
the way down] ... you get the picture.
i am a fan of defense in depth; i will take what works. which is many
things, until more ideal isolation is in place :)
best regards,