this is an old thread but I wanted to add the insight I had today: if you use ReHIPS as intended, which means that all vulnerable apps are isolated by default, it creates a fool-proof environment.
It doesn't matter anymore if the user makes all the wrong decisions and gets infected, because the isolated environment is a disposable one. So no damage done.
This is different from a standard default/deny solution, which depends on the user making the right decisions.
In default-deny, what is not allowed is blocked. There is very little, if any, decision-making required of the user once default-deny is enabled.
All that default-deny requires of a user is to start with a verified clean system, install base-line software using verified safe\clean installers, and then enable system protection (default-deny\lock down).
Technically, everyone should follow the above procedure no matter what security solution they employ, but very few do.
* * * * *
Actually, the HIPS module of ReHIPS is default-deny with user input required. If some process without an existing allow rule attempts to launch inside an isolated environment, then ReHIPS will generate a HIPS alert outside the isolated environment. They user will have to switch to the desktop and respond (make a decision) to the HIPS alert (Allow or Block).
I recently requested fixer to consider implementing a user opt-in setting to disable HIPS alerts for any processes running in an isolated environment. The isolated environment is quite safe (user-dependent) without those alerts. Last time I checked he is considering it.
The ReHIPS isolated environment is not completely fool-proof. Ask fixer and he will be forthright about the potential risks.
The ReHIPS isolated environment risks (the first one on the list is probably the most relevant day-to-day):
- Whatever is running in the isolated environment has access to whatever data is input into that isolated user profile (user-dependent)
- Inter-process communication if an isolated environment is configured to allow multiple programs to run in it (user-dependent)
- Set Windows hooks (user-dependent)
- Operating System vulnerability
With the way that ReHIPS is designed and works, all the risk numbers are small. In my estimation very small indeed.
Plus, like you said, the user has the option of deleting an infected isolated environment.
Don't confuse physical system protection with data protection. While they are typically connected, at the same time they are also not the same.