madaidan / sandbox-app-launcher
An app launcher to start apps in a restrictive sandbox
☆15Updated 3 years ago
Alternatives and similar repositories for sandbox-app-launcher:
Users that are interested in sandbox-app-launcher are comparing it to the libraries listed below
- An app launcher to start apps in a restrictive sandbox https://www.kicksecure.com/wiki/sandbox-app-launcher☆38Updated 3 weeks ago
- deprecated - maybe replaced by: `apparmor.d`☆87Updated last year
- Secure Distributed Web Date; privacy, anonymity and Tor friendly; console time fetcher and daemon; optional graphical user interface etc.…☆54Updated this week
- This browser extension, designed for Qubes OS, blocks and/or redirects non whitelisted URLs to another qube of your choice.☆35Updated 2 years ago
- qubes rpm for i3☆31Updated 2 weeks ago
- Privacy research on Matrix.org☆113Updated last year
- Native JACK support for Qubes OS (experimental)☆10Updated 7 years ago
- Tirdad kernel module for random ISN generation☆26Updated 4 months ago
- SaltStack formula to set up my personal Qubes OS configuration☆20Updated 5 years ago
- Obscurix is a live operating system based on Arch Linux that is heavily configured for privacy, security and anonymity. It safely force…☆115Updated 4 years ago
- Tor traffic whitelisting gateway☆69Updated 3 weeks ago
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆46Updated 3 weeks ago
- Hardened kernel configuration optimized for virtual machines. - https://www.kicksecure.com/wiki/Hardened-kernel☆41Updated 3 weeks ago
- Isolate secondary storage dm-crypt and LUKS1 header processing to Qubes DisposableVMs☆23Updated 3 years ago
- AppArmor profile for The Tor Browser Bundle (TBB) - https://www.whonix.org/wiki/AppArmor - for better security (hardening).☆18Updated 3 weeks ago
- Tor Browser (or Firefox) in a Qubes OS disposable, with persistent bookmarks and login credentials☆45Updated last month
- Repository is intended to provide patches and rpm specs with experimental features to run under the Qubes OS.☆24Updated 3 years ago
- Fend off malware at Qubes VM startup☆75Updated last year
- execute commands as another user☆39Updated 7 years ago
- Integration of vpn tunnels for Qubes OS☆16Updated 6 years ago
- Linux-hardened deny_new_usb control☆21Updated 4 years ago
- Open a file via the specified application within a private Firejail sandbox.☆75Updated 2 years ago
- Two Bash scripts making signal-cli convenient for interactive use☆34Updated 5 years ago
- Turn your Qubes OS machine into a network server☆108Updated 11 months ago
- download, verify & run torbrowser in a sandbox☆18Updated last year
- USB keyboard where keystrokes are end-to-end encrypted between the keyboard and dom0☆9Updated 6 years ago
- Cryptsetup with Deniable LUKS header crypto extension 🇺🇦 SUPPORT UKRAINE! 🇺🇦☆64Updated 5 years ago
- Squid-based package update cache for Qubes, transparently rewriting URLs to .onion or HTTPS☆13Updated 3 years ago
- Cables Communication, secure and anonymous communication using email-like addresses.☆58Updated 10 years ago
- Imagine the information security compliance guideline says you need an antivirus but you run Arch Linux☆122Updated 11 months ago