| ▲ | zahlman 9 hours ago | ||||||||||||||||||||||
> Runtime-level sandboxing is always very weak. Relying on OS-level sandboxing or VMs (firecracker & co) is the right way for this. ... Isn't the web browser's sandboxing runtime-level? | |||||||||||||||||||||||
| ▲ | arbll 9 hours ago | parent | next [-] | ||||||||||||||||||||||
It used to be 100% runtime-level and it was the golden age of browser exploits. Each of your tabs are now a separate process that the OS sandboxes. They can only access a specific API over IPC for anything that goes beyond js/rendering (cookie management, etc...). An exploit in V8 today only gives access to this API. A second exploit is needed in this API to escape the sandbox and do anything meaningful on the target system. | |||||||||||||||||||||||
| ▲ | franga2000 9 hours ago | parent | prev [-] | ||||||||||||||||||||||
Yes, and it's only reasonably secure because of years of exploits being found and fixed by some of the best (and very well-funded) software security engineers out there. | |||||||||||||||||||||||
| |||||||||||||||||||||||