FoxInABox: Difference between revisions

From MozillaWiki
Jump to navigation Jump to search
Line 16: Line 16:
* {{bug|742434}} - seccomp-bpf (Desktop Linux)
* {{bug|742434}} - seccomp-bpf (Desktop Linux)
* {{bug|790923}} - [[B2G/Architecture/System_Security/Seccomp|seccomp sandboxing]] (B2G Linux)
* {{bug|790923}} - [[B2G/Architecture/System_Security/Seccomp|seccomp sandboxing]] (B2G Linux)
* {{bug|tbd}} - [http://www.chromium.org/developers/design-documents/sandbox chromium sandbox] (Windows)
* {{bug|922756}} - [http://www.chromium.org/developers/design-documents/sandbox chromium sandbox] (Windows)
* {{bug|387248}} - Mac OS X ([http://reverse.put.as/wp-content/uploads/2011/09/Apple-Sandbox-Guide-v1.0.pdf Apple's Sandbox guide])
* {{bug|387248}} - Mac OS X ([http://reverse.put.as/wp-content/uploads/2011/09/Apple-Sandbox-Guide-v1.0.pdf Apple's Sandbox guide])
* {{bug|730956}} - [[Features/Security/Low_rights_Firefox|Low rights Firefox]] (whole app sandbox)
* {{bug|730956}} - [[Features/Security/Low_rights_Firefox|Low rights Firefox]] (whole app sandbox)

Revision as of 18:50, 1 October 2013

The fox cannot escape the box.
The fox is safe in the sandbox. The fox cannot escape.

Documentation

Status

We have a plan. Take the e10s code, slap the Chromium sandbox around the content process, and get AdBlockPlus working with it.

FoxInABox/ThingsThatShouldWork

Tracking:

Resources

Sandboxing

Related projects

How things work

Who we are

Some folks from the SecurityEngineering team: briansmith, mmc, keeler, grobinson, ckerschb, sid.

  • Mailing list: boxing@lists.mozilla.org
  • IRC: irc.mozilla.org #boxing