Subgraph (operating system): Difference between revisions

Content deleted Content added
Livecoder (talk | contribs)
m Added External Links.
No edit summary
Line 41:
* [[GNOME Shell]] integration for the OZ application-level sandbox, targeting ease-of-use by everyday users.<ref>{{cite web|title=GitHub - OZ: a sandboxing system targeting everyday workstation applications|url=https://github.com/subgraph/oz|publisher=Subgraph|accessdate=6 October 2016}}</ref>
 
== Security ==
The security of Subgraph OS (which uses [[Sandbox (computer security)|sandbox containers]]) has been questioned in comparison to [[Qubes OS|Qubes]] (which uses [[Virtual machine|virtualization]]), another security focused Linux distro. An attacker can trick a Subgraph user to run a malicious unsanboxed script via the OS's default [[GNOME Files|Nautilus]] file manager or in the terminal. It is also possible to run malicious code containing [[Shortcut (computing)#Unix|.desktop]] files (which are used to launch applications). Malware can also bypass Subgraph OS's [[application firewall]]. Also by design, Subgraph also can not isolate the [[Protocol stack|network stack]] like Qubes OS or prevent [[Firmware#Security risks|bad USB]] exploits.<ref>{{Cite web|url=https://micahflee.com/2017/04/breaking-the-security-model-of-subgraph-os/|title=Breaking the Security Model of Subgraph OS {{!}} Micah Lee's Blog|website=micahflee.com|language=en-US|access-date=2017-04-25}}</ref>
 
==References==
<references />
 
==See also==
* [[Tails (operating system)]]
* [[Qubes OS]]
[[Category:Linux distributions]]
[[Category:Operating system security]]
 
==References==
== External links ==
{{Reflist}}
* {{Official website|//www.subgraph.com/}}
 
== External links ==
* {{Official website|https://www.subgraph.com/}}
* {{DistroWatch|Subgraph}}
 
[[Category:Linux distributions]]
[[Category:Operating system security]]