Browser in the Box

Status
Not open for further replies.

Cch123

Level 7
Thread author
Verified
May 6, 2014
335
Hi guys, has anyone tried this offering from Sirrix? It was designed with funding from the German government to be used to secure their systems. Basically, it runs a broswer in SELinux through the use of virtualbox, so an attacker would have to exploit your browser (Chrome is a lot stronger on linux), exploit the linux system and then exploit virtualbox in order to get to your main windows system. And not to mention that it blocks all data exfiltration by blocking all data uploads.

Any thoughts on this? The only thing putting me off is the resource requirement.

Posted in "other security software" as it does far more than a browser.
 

Ink

Administrator
Verified
Jan 8, 2011
22,490
More Information: http://www.sirrix.com/content/pages/BitBox_en.htm
FAQ: http://www.sirrix.com/content/pages/BitBox_faq_en.htm

Download: http://download.sirrix.com/content/pages/bbdl-en.htm
>> No support for Windows XP since v3.3.0.
Changelog: http://download.sirrix.com/content/pages/63677.htm
>> New In Version 3.5.0 (July 2014)
General
  • Support for Google Chrome as alternative to Firefox
  • Support for VirtualBox 4.2.24
  • Improved stability
Browser
  • Firefox 24.6.0 ESR
  • Google Chrome 34
Hope this helps others.
 
  • Like
Reactions: Jack
I

illumination

Can not say i have heard of it until now, but can say you could achieve this same effect just by running a linux distro with SElinux such as Fedora Flavors, and installing virtualbox, and another distro in virtualbox.

You can customize the Policy set in SElinux.
 
  • Like
Reactions: Ink
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top