-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
> AFAIU SELinux still provides no GUI-level isolation (X-level
> isolation if you wish), so for this to make any sense within one
> AppVM you would need to also make sure to run each of your browsers
> with a different Xorg instance (in this same AppVM), each (X
> server) running as non-root and a different user.
there seems to be at least some difference to default X without Xephyr
as one mentioned on your blog a while ago [1]
but it is not all black and white. I would be already be happy if the
cookie in sandbox 1 doesn't get propagated to a website visited in
sandbox 2 and everything gets deleted on window closure.
After all I understand that in-AppVM-stuff is not really in scope of
the Qubes OS project - I was just wondering if SELinux would be
possible without much hassle, but now I know.
Thanks for your answers.
> Plus it would make no sense with the Qubes default suborders file
Has sudo any impact on a default sandbox_web_t domain?
[1]
http://theinvisiblethings.blogspot.fr/2011/04/linux-security-circus-on-gui-isolation.html?showComment=1303574236988#c7925540745482403781
-----BEGIN PGP SIGNATURE-----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=XL7f
-----END PGP SIGNATURE-----