It has a different certificate now. Or I'm being MITM'ed. [ATTACH] Is this company trying to hide something? Such as being owned by the Chinese...
Needs the VirtualBox Extension Pack. Definitely not open-source and it gets worse: big-brother red flags too: "Be careful downloading the...
Shadow Defender's site https://www.shadowdefender.com has a self-signed certificate. Is this a man-in-the-middle attack? How do we know we're...
Tried installing virt-manager while booted off the Tails live CD and it worked like a breeze. Except one thing: networking. The VM's you make...
Is USB still supported if we go for pure open-source virtualbox?
Was trying to convince friends to switch to Linux Mint or Peppermint for whatever they do on the internet, and run Big-Brother malware Windows in...
When you start or resume a VM in VMware workstation, a specific USB device can automatically be connected to this VM if there a line like this in...
Hard drive is of interest.
Either of the following two options revert back to a clean initial state in every reboot. Which is the most secure against tampering by...
Thanks. Any information in support of your assessment?
With TOR exit nodes, you are completely exposed if you use HTTP and potentially exposed if you use HTTPS, if the exit node is running MITM schemes...
Security and anonymity conscious people must have thought of something like this. A VPS where a browser runs and you control it with a Remote...
There will be a whitelist of names and wildcards that will be parsed whenever a DNS request is intercepted and the DNS request will be allowed to...
Many names like youtube.com and s.yimg.com are common all over the place, you only whitelist them once. Also *.yahoo.com and *.oath.com and...
The proposed gateway has an extremely limited attack surface by virtue of its extreme simplicity. By the way, did you say that you're...
What does it matter if IPFire runs in a VM or a netbook, the compromised Windows client where gatekeeper runs can tell IPFire to open up.
Whereas the following works, it does the bidirectional communication but no prompting: rm -f /home/user/pipe1 mkfifo /home/user/pipe1 socat -x...
"IPFire drops all traffic to and from the windows system*. An application (lets call it gatekeeper) on the windows system monitors all outgoing...
They're all sandboxes for the browser function. Maybe some for p2p filesharing too.
A script generates identical ubuntu VM's. They all have access to a ubuntu file server VM. We want them to only be able to see their own files on...
Windows 7 is a major drawback. Especially if updated, which makes it more and more like spyware. Wondering if that gatekeeper can distinguish...
Could enforce the use of a proxy by firefox where the proxy runs in the gateway so the latter knows you're dealing with firefox connections and...
We'd run only the browser in one VM. A gateway VM could be devoted to this VM so you knows it's firefox that attempts the connections. Could run...
Do we have a business opportunity here? Software that people will pay for if someone develops it?
Anyone seen a network IDS (intrusion detection system) in action, does it prompt for anything?
Separate names with a comma.