• 8 Posts
  • 259 Comments
Joined 2 years ago
cake
Cake day: August 10th, 2023

help-circle






  • Syd3, and gvisor, a similar project in go aren’t really sandboxes but instead user mode emulation of the linux kernel. I consider them more secure than virtual machines because code that programs run is not directly executed on your cpu.

    Although syd3 doesn’t seem to emulate every syscall, only some, I know rhat gvisor does emulate every syscall.

    If you compare CVE’s for gvisor and CVE’s for xen/kvm, you’ll see that they are worlds apart.

    Xen has 25 pages: https://app.opencve.io/cve/?vendor=xen

    Gvisor has 1: https://app.opencve.io/cve/?q=gvisor

    Now, gvisor is a much newer product, but it is still a full 7 years old compared to xen’s 22 years of history. For something that is a third of the age, it has 1/25th of the cve’s.

    There is a very real argument to be made that the hardened openbsd kernel, when combined with openbsd’s sandboxing, is more secure than xen, which you brought up.






    1. Corporations really, really love being admin on everybody elses devices. See kernel level anticheat.

    2. I feel like people have gotten zero trust (I don’t need to trust anybody) confused with “I don’t trust anybody”.

    3. I was listening to a podcast by packet pushers and they were like “So you meet a vendor, and they are like, ‘So what do you think zero trust means? We can work with that’”.