Content deleted Content added
m Added External Links. |
No edit summary |
||
Line 41:
* [[GNOME Shell]] integration for the OZ application-level sandbox, targeting ease-of-use by everyday users.<ref>{{cite web|title=GitHub - OZ: a sandboxing system targeting everyday workstation applications|url=https://github.com/subgraph/oz|publisher=Subgraph|accessdate=6 October 2016}}</ref>
==
The security of Subgraph OS (which uses [[Sandbox (computer security)|sandbox containers]]) has been questioned in comparison to [[Qubes OS|Qubes]] (which uses [[Virtual machine|virtualization]]), another security focused Linux distro. An attacker can trick a Subgraph user to run a malicious unsanboxed script via the OS's default [[GNOME Files|Nautilus]] file manager or in the terminal. It is also possible to run malicious code containing [[Shortcut (computing)#Unix|.desktop]] files (which are used to launch applications). Malware can also bypass Subgraph OS's [[application firewall]]. Also by design, Subgraph also can not isolate the [[Protocol stack|network stack]] like Qubes OS or prevent [[Firmware#Security risks|bad USB]] exploits.<ref>{{Cite web|url=https://micahflee.com/2017/04/breaking-the-security-model-of-subgraph-os/|title=Breaking the Security Model of Subgraph OS {{!}} Micah Lee's Blog|website=micahflee.com|language=en-US|access-date=2017-04-25}}</ref>
==References==▼
==See also==
* [[Tails (operating system)]]
* [[Qubes OS]]
[[Category:Linux distributions]]▼
[[Category:Operating system security]]▼
▲==References==
== External links ==▼
{{Reflist}}
* {{Official website|//www.subgraph.com/}}▼
* {{DistroWatch|Subgraph}}
▲[[Category:Linux distributions]]
▲[[Category:Operating system security]]
|