Back to Home / #uml / 2011 / 12 / Prev Day | Next Day
#uml IRC Logs for 2011-12-10

---Logopened Sat Dec 10 00:00:03 2011
04:51-!-shadowdaemon [~shadowdae@araminta.gangsta-paradise.org] has quit [Ping timeout: 480 seconds]
05:44-!-tchan [~tchan@c-69-243-144-187.hsd1.il.comcast.net] has quit [Read error: Operation timed out]
05:47-!-tchan [~tchan@c-69-243-144-187.hsd1.il.comcast.net] has joined #uml
12:16-!-todd [d1ac62d3@ircip1.mibbit.com] has joined #uml
12:16<todd:#uml>Hi, I'm new to UML, what a cool idea! What I'm interested in is sandboxing code, but I'm interested also in protecting the running code from an attacker on the host node. If you run code under UML can the host capture RAM etc to look at the data and being programs being run under UML? It may not be possible to have real protection under any system where root
12:16<todd:#uml>powers exist, but I'm not sure. Any thoughts on that? Thanks.
14:06-!-avinashhm [~avinash-h@192.94.92.14] has joined #uml
14:26<adiblol:#uml>it is impossible to make root have less powers
14:27<adiblol:#uml>however, there TPM gives such a misfeatures but they are misconception. server owner must have superuser powers!
14:28<adiblol:#uml>s/there //
16:25<todd:#uml>Thanks, so there's no way to keep code running on a machine, say even on a browser, secure. That's unfortunate.
21:27-!-avinashhm [~avinash-h@192.94.92.14] has quit [Read error: Connection reset by peer]
23:00-!-mixi_ [~mixi@pass-4d0d426b.pool.mediaWays.net] has joined #uml
23:07-!-mixi [~mixi@pass-4d0d426b.pool.mediaWays.net] has quit [Ping timeout: 480 seconds]
23:59-!-VS_ChanLog [~stats@ns.theshore.net] has left #uml [Rotating Logs]
23:59-!-VS_ChanLog [~stats@ns.theshore.net] has joined #uml
---Logclosed Sun Dec 11 00:00:09 2011