Open
Bug 1287797
Opened 8 years ago
Updated 2 years ago
Document strategy for securing platform specifics resources with sandboxing enabled
Categories
(Core :: Security: Process Sandboxing, defect)
Core
Security: Process Sandboxing
Tracking
()
NEW
People
(Reporter: arroway, Unassigned)
References
Details
(Whiteboard: sb+)
Have a look at resources such as Windows registry, OS X KeyChains, etc
Reporter | ||
Updated•8 years ago
|
Blocks: sandbox-sa
Reporter | ||
Updated•8 years ago
|
Blocks: sandbox-sec-strategy
Reporter | ||
Updated•8 years ago
|
No longer blocks: sandbox-sa
Updated•8 years ago
|
Whiteboard: sb+
Initially test performed manually, and moving towards developing automated tests (for windows). Ive not looked at OSX or Linux.
See also https://github.com/pauljt/arewesandboxedyet
Assignee: nobody → ptheriault
Update: we've engaged a third party group to help with review/testing here.
Updated•5 years ago
|
Assignee: ptheriault → nobody
Updated•2 years ago
|
Severity: normal → S3
You need to log in
before you can comment on or make changes to this bug.
Description
•