Skip to content

madaidan/sandbox-app-launcher

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

application launcher to start apps in a restrictive sandbox

sandbox-app-launcher runs each app as its own user, in a bubblewrap sandbox and confined by apparmor.

The directory, /shared, is shared across all app sandboxes to transfer files across.

This implements a permissions system to configure what apps can access. There are currently 5 available permissions:

  • Network access

  • Webcam access

  • Microphone access

  • Shared storage access (read-only or read-write)

  • Dynamic native code execution

All apps the user installs will be automatically configured to run in the sandbox and a prompt will ask the user which permissions they wish to grant the application (not implemented yet).

Currently a WIP and not for actual use.

How to install sandbox-app-launcher using apt-get

1. Download Whonix's Signing Key.

wget https://www.whonix.org/patrick.asc

Users can check Whonix Signing Key for better security.

2. Add Whonix's signing key.

sudo apt-key --keyring /etc/apt/trusted.gpg.d/derivative.gpg add ~/patrick.asc

3. Add Whonix's APT repository.

echo "deb https://deb.whonix.org buster main contrib non-free" | sudo tee /etc/apt/sources.list.d/derivative.list

4. Update your package lists.

sudo apt-get update

5. Install sandbox-app-launcher.

sudo apt-get install sandbox-app-launcher

How to Build deb Package from Source Code

Can be build using standard Debian package build tools such as:

dpkg-buildpackage -b

See instructions. (Replace generic-package with the actual name of this package sandbox-app-launcher.)

Contact

Donate

sandbox-app-launcher requires donations to stay alive!

About

An app launcher to start apps in a restrictive sandbox

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published