Gizmos Freeware Reviews  

Go Back   Gizmo's Freeware Forum > Debating Chamber > Internet, Web Apps and Networking

Reply
 
Thread Tools Display Modes
Old 14. Dec 2011, 07:20 PM   #11 (permalink)
Full Member
 
maplichen's Avatar
 
Join Date: Jun 2010
Posts: 36
Default

I checked it out George and it's like you have basically said in all your posts here, overkill. Still, many people go for that kind of paranoid setup, and anyway, having it in a nicely integrated package is a great idea.

I'd say the difference in security between this and Sandboxie is probably of little significance. The difference might be something like 99.5% of browsing threats are prevented by Sandboxie whereas 99.7% are prevented by Bitbox. Either way, unless you are purposefully exposing your computer via browser to the latest and greatest malware threats every day you are unlikely to see any issues. I honestly do just fine with Google Chrome's comparably pathetic sandbox and a few tweaked settings as my only security, and despite monthly on demand scans, I have yet to run into a problem for quite some time.
__________________
The big yellow one is the sun
maplichen is offline   Reply With Quote
Old 15. Dec 2011, 01:04 AM   #12 (permalink)
Editor
 
George.J's Avatar
 
Join Date: Oct 2010
Posts: 1,940
Default

Guys, I don't want the concept of safety to be misleading to all of you. How can we determine whether an antivirus keeps you safe? Is it just the blocking capabilities or even including the removal ability, in case you get infected? Similar is the case here.

Sandboxie is very safe. They have also said that or as bo.elam said disclaims that "from time to time, people are able to find some vulnerability in Sandboxie, an open hole through which malicious software can still infiltrate the system." (They have said "have" here, not "may have") And as you have said maplichen, that the difference may be too small like 99.5 or 99.7 etc. But the whole difference is made in the rest 0.3 % that determines the safety level.

Once Sandboxie has been compromised, there's no way even God can help you, because infiltration happens to your system. I mentioned before,
Quote:
"Also you have to know that, VirtualPC or VirtualBox is much safer than Sandboxie as it has no LINK between the host OS therefore it is impossible for the infection to spread to the host. So, all you have to do is delete the Virtual OS and create a new one. "
Even if that 0.3% turns back at you, remember that it's encased in a Virtual Machine and also at the other end you have it totally housed inside Linux not Windows still. Window's is actually having a puff on a cigaratte and relaxing. Your ass is still safe.

Finally I didn't start this topic to say how secure Sandboxie (which is a really good program) is, but to mention what other programs can do for you at the same time in a better and safer way. Just that someone likes the program so much that you don't like to switch from Sandboxie, doesn't mean that it's the only mechanism that's there in store for you to keep you safe. Hope I am a little more clear now.
__________________
If you seek for attention, do common things in life in an uncommon way!

Last edited by George.J; 15. Dec 2011 at 01:25 AM.
George.J is offline   Reply With Quote
Old 15. Dec 2011, 01:34 AM   #13 (permalink)
Senior Member
 
Join Date: Jul 2010
Location: New Zealand
Posts: 1,741
Default

Quote:
Originally Posted by George.J View Post
"Also you have to know that, VirtualPC or VirtualBox is much safer than Sandboxie as it has no LINK between the host OS therefore it is impossible for the infection to spread to the host. So, all you have to do is delete the Virtual OS and create a new one. "
George.J and others, I have a kind-of related question.

Is there no possibility of the VirtualPC or VirtualBox hypervisors being affected by software they've virtualized? I though that would require hardware virtualization?

I haven't tried either product so your views (and any references) would be useful to me.
__________________
Better to light a candle ... than to curse the darkness.
Remah is offline   Reply With Quote
Old 15. Dec 2011, 03:02 AM   #14 (permalink)
Editor
 
George.J's Avatar
 
Join Date: Oct 2010
Posts: 1,940
Default

Quote:
Originally Posted by Remah View Post
George.J and others, I have a kind-of related question.

Is there no possibility of the VirtualPC or VirtualBox hypervisors being affected by software they've virtualized? I though that would require hardware virtualization?

I haven't tried either product so your views (and any references) would be useful to me.
This needs more explanation. Am at work now, will clear things when I come back. .For now, Bitbox implements Virtual Box which is the ultimate core of virtualization. It includes "Full virtulization, desktop virtualization and application virtualization", unlike Sandboxie which is a software virtualization software/Opearting system level virtualization. Remember that in BitBox there's also a securely locked-down ("hardened") implementation of Debian 6 Linux.

http://www.sirrix.com/content/news/63037.htm
https://www.virtualbox.org/wiki/Virtualization
http://en.wikipedia.org/wiki/Virtualization
http://www.neowin.net/forum/topic/10...-browser-ever/
__________________
If you seek for attention, do common things in life in an uncommon way!
George.J is offline   Reply With Quote
Old 15. Dec 2011, 03:27 AM   #15 (permalink)
Editor
 
George.J's Avatar
 
Join Date: Oct 2010
Posts: 1,940
Default

Also everything looks quiet here too like Sandboxie. Since everything is incorporated within a browser, you feel like, you're only running a Firefox browser in Windows. Nothing complex, like VM or Linux or anything, not even an external sandbox, which is the best part
__________________
If you seek for attention, do common things in life in an uncommon way!
George.J is offline   Reply With Quote
Old 16. Dec 2011, 04:23 AM   #16 (permalink)
Senior Member
 
bo.elam's Avatar
 
Join Date: Nov 2009
Posts: 1,714
Default

Quote:
Originally Posted by George.J View Post
:
Infiltrations have been reported once in a while. If you're working in a large organisations with lots of computers interconnected or having a highly confidential information, doesn't it mean that you're compromised to a large extent? Also you have to configure it to some extent for a desired level of protection. But BitBox works straight out of the box. An armoured FF encased in a VM environment (Oracle) and housed inside a Debian Linux is enough to know how safe it can be.
George, I don't agree with your views on SBIE but I thank you for bringing BitBox to us. Personally, I love this kind of programs so I am happy that it is available. The more options the better.

I am going to make a comment about SBIE, I ll make it short so the essence of my message does not get lost is a sea of words.

No one has ever seen malware escaping a restricted sandbox. The percentage of success is 100%, not 99.5 or 99.9999%.

----------
By using the restrictions, SBIE users keep malware from starting, running, accessing confidential information and sending it out of the computer.

Can you do any of this on BitBox?

Bo
bo.elam is offline   Reply With Quote
Old 16. Dec 2011, 11:15 PM   #17 (permalink)
Full Member
 
maplichen's Avatar
 
Join Date: Jun 2010
Posts: 36
Default

Hey Bo, when I commented before I was basing a low probability of failure on some things I had read regarding sandboxie and keyloggers. Having checked up on this, I see that you are right. It seems that if you are clean to start with, and configure the program properly, It is indeed 100% at the moment. A few people claim to have bypassed the sandbox, but they are, as you say, lab tests so I take back what I said before.

Still I like the idea behind this browser in that it runs silently to get the job done without bugging the user. Much like sandboxie. It's higher on memory usage (at least in my tests) but the integration at least means I don't have to worry about keeping two or more programs up to date just for safe browsing.

I know your post wasn't meant to compare the two George but, at least in my interpretation, the functional premise behind both is too similar to not look at them side by side. Good find, it's been a while since I've played around with a new program like this.
maplichen is offline   Reply With Quote
Old 17. Dec 2011, 02:45 AM   #18 (permalink)
Senior Member
 
bo.elam's Avatar
 
Join Date: Nov 2009
Posts: 1,714
Default

maplichen, can BitBox be configured/restricted?, sort of like it can be done on SBIE.

When the Buffer Zone test is run on a restricted sandbox, the trojan demo designed to read sensitive files gets blocked by the restrictions, unfortunately this test can not be done using BitBox.
http://www.trustware.com/Free-Security-Test/

Bo
Attached Images
File Type: jpg untitled.JPG (67.4 KB, 5 views)

Last edited by bo.elam; 17. Dec 2011 at 03:10 AM.
bo.elam is offline   Reply With Quote
Old 17. Dec 2011, 07:35 AM   #19 (permalink)
Senior Member
 
eyeb's Avatar
 
Join Date: Sep 2010
Location: Planet X
Posts: 886
Default

something like this that has been around for years is hp's virtual firefox... it uses something like returnil's virtual layers system. I just found sandboxie to be as good but lighter on system and easier to configure

it's not supported and only released once so firefox version is on 3 something but you can install newer one over it

http://h20000.www2.hp.com/bizsupport...tem=vc-64504-1

or if you really want to virtualize it, use one of those sites with cloud OS like eyeos or glide then surf on the browser there. since all you do is connect to site, nothing you do in there comes to your pc unless you specifically download it
eyeb is offline   Reply With Quote
Old 17. Dec 2011, 09:50 AM   #20 (permalink)
Editor
 
George.J's Avatar
 
Join Date: Oct 2010
Posts: 1,940
Default

Quote:
Originally Posted by bo.elam View Post
maplichen, can BitBox be configured/restricted?, sort of like it can be done on SBIE.

When the Buffer Zone test is run on a restricted sandbox, the trojan demo designed to read sensitive files gets blocked by the restrictions, unfortunately this test can not be done using BitBox.

Bo
Bo, the BitBox is encapsulated and isolated and run's in a separate virtual machine(you won't know it) with it's own O.S (Linux) when you run it, so it can't read any files on the main disk, like what Sandboxie does. It runs completly independent of the main OS. You don't have to configure it, at all for anything.

Access to internet is granted through a "guest room”, in which the browser operates and this "guest room" is in isolation from the base system of the network or computer system. Thus when you connect to the internet, you don't have to fear about the danger of downloads from the Internet by spyware or actual attacks on the main operating system, because these from the outside – out of the Internet - is not visible.

Best of all, every time the browser is restarted, BitBox resets to a different certified boot image and any infections are removed, while all downloads from the Internet are checked for their safety, before storing in the main operating system (it doesn't directly store in main O.S. It can be done by means of a shared folder which is accessible through a separate user account, hence unless manually moved out of the VM you won't even have trace of it on your desktop). So any existing malware that might have come through in the previous browsing session is isolated and totally eliminated -- all without having to continually run an antivirus scan of the system to weed out each and every piece of malware.

To keep things extra secure, uploads and Internet access are disabled on the base operating system once BitBox is launched. Thus the browser functions as a secure lock data. You won't know that all these are happening, because BitBox appears on the desktop like an icon. You double click it and you won't know that you're working on a Virtual machine in a different O.S, because it's as if you're just using Mozilla Firefox.

So you can say, its Sandboxed inside another Sandbox, without configuring anything.
__________________
If you seek for attention, do common things in life in an uncommon way!

Last edited by George.J; 17. Dec 2011 at 10:26 AM.
George.J is offline   Reply With Quote
Reply

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are Off
Pingbacks are Off
Refbacks are Off



All times are GMT +1. The time now is 04:53 PM.


Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2020, vBulletin Solutions, Inc.