Hello! We are running our annual fundraising. Please consider making a donation if you value this freely available service or want to support people around the world working towards liberatory social change - https://riseup.net/donate
-[QubesOS](https://www.qubes-os.org/) has some downsides such as computational power required to run every single process as a VM and it throttles the host. Outdated templates are a huge issue with qubes. Not to mention the difficulty of routing xen via tor on the main host. For these reasons, Whonix even started [Whonix-Host](https://www.whonix.org/wiki/Whonix-Host) which is the same idea of this project. Albeit, they've been slow with their implementation.
-[QubesOS](https://www.qubes-os.org/) has some downsides such as computational power required to run the majority of processes as a VM, and thus throttles the host. Keeping templates updated is not a trivial task with Qubes. Not to mention the difficulty of routing Xen via TOR on the main host. For these reasons, Whonix even started [Whonix-Host](https://www.whonix.org/wiki/Whonix-Host) which is the same idea of this project. Albeit, they've been slow with their implementation.
- How would someone compromise PlagueOS?
- How would someone compromise PlagueOS?
- To fully compromise the host, one would have to find a way to exploit the running VM, perform a sandbox escape from libvirt, find a way to exploit some running process or create a reverse shell from the unprivileged user, then break credentials for the admin account, which requires the use of doas for privilege escalation. We have stringent apparmor profile on libvirt (kvm). We also have developed a bwrap sandbox for libvirt, however process execution of the VMs took a substantial performance hit.
- To fully compromise the host, one would have to find a way to exploit the running VM, perform a sandbox escape from libvirt, find a way to exploit some running process or create a reverse shell from the unprivileged user, then break credentials for the admin account, which requires the use of doas for privilege escalation. We have a stringent apparmor profile on libvirt (kvm). We also have developed a bwrap sandbox for libvirt, however process execution of the VMs took a substantial performance hit. This performance issue is likely due to our implementation of GrapheneOS's hardened_malloc.
- Can regular GNU/Linux applications be installed?
- Can regular GNU/Linux applications be installed?
- Applications are heavily restricted with this build and must be installed with `doas` privilege escalation with the `admin` account. The security of this OS follows a strict hypervisor usage model; installing applications breaks the [usage model](https://0xacab.org/optout/plagueOS/wiki/Home#proper-usage) and should be conducted at the user's own risk.
- Applications are heavily restricted with this build and must be installed with `doas` privilege escalation with the `admin` account. The security of this OS follows a strict hypervisor usage model; installing applications breaks the [usage model](https://0xacab.org/optout/plagueOS/wiki/Home#proper-usage) and should be conducted at the user's own risk.