Virtual machines are treated as a security boundary despite the fact that with enough R&D they are not. Hosting minecraft servers in virtual machines is fine, but not a great idea if they’re cohosted on a machine that has billions of dollars in crypto or military secrets.
Docker is pretty much the same but supposedly more flimsy.
Both have non-obvious configuration weaknesses that can lead to escapes.
> Virtual machines are treated as a security boundary despite the fact that with enough R&D they are not. Hosting minecraft servers in virtual machines is fine, but not a great idea if they’re cohosted on a machine that has billions of dollars in crypto or military secrets.
While I generally agree with the technical argument, I fail to see the threat model here. Is it that some external threat would have prior knowledge that an important target is in close proximity to a less hardened one? It doesn't seem viable to me for nation states to spend the expensive R&D to compromise hobbyist-adjacent services in a hope that they can discover more valuable data on the host hypervisor.
Once such expensive malware is deployed, there's a huge risk that all the R&D money is spent on potentially just reconnaissance.
I think you’re missing the point, which was that high value targets adjacent to soft targets make escapes a legitimate target, but in low value scenarios vm escapes aren’t worth the R&D
I’m not sure why you think it’s the researchers responsibility to verify patches. It would be nice, especially if they’re knowledgeable in the code, but Microsoft have the resources to put someone else in that position too.
That’s different. I’m not here to mark your work but if you publish your work, I’m happy to publicly point out that you’re wrong, especially if you’re Microsoft size and should have work checkers internally and are continually doing the wrong think and putting people at risk as a result.
What’s the expectation for responsible disclosure when it comes to ineffective patches? Does that normally reset the counter to 90 days, or only if the patch was reasonable and in good faith?
I’d happily pay $100 a year for Firefox WITH an adblocker as long as part of the money is put towards ongoing internet freedom and preventing attestation
As with all the comments about "I'd pay X dollars to not be the product", it's been shown over and over again that paying money is not going to void corporate desire to simply double dip by raising prices while also showing ads.
Or for a similar point, it's been shown over and over that attempting to crowdsource the revenue is a staggeringly unrealistic response with no real world precedent in the history either of browsers or online crowdsourced funding. You would think that would matter to people who point to that as a possible panacea.
Actual attempts to get users to pay for the browser itself, like what Opera did, simply didn't work and led to the insolvency of the browser and having to sell it off to someone harvesting its users as data.
I just don't think one can seriously say "Orion browser is a thing" if it is definitely not a thing for 95% desktops out there (the exact % may be different depending on the source of data, etc.). And Windows (around 70% of the market share) version is not expected until late 2026.
reply