Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

software and privacy features #18

Open
GyomeiHimejima9906 opened this issue Nov 30, 2024 · 8 comments
Open

software and privacy features #18

GyomeiHimejima9906 opened this issue Nov 30, 2024 · 8 comments

Comments

@GyomeiHimejima9906
Copy link

GyomeiHimejima9906 commented Nov 30, 2024

example: if an unauthorized malware/user requests access to protected files before MP starts the file in question will not be protected and the program folder is not protected in any way
(I suggest for folder protection to add a user named MPman who is the owner of the folder, and then make it readable by all but not editable and add a utility for the update that runs as MPman and can then update the MP installation files)

possibility to set file and folders access to a enclave only

@GyomeiHimejima9906 GyomeiHimejima9906 changed the title software and protection software and privacy protection Nov 30, 2024
@GyomeiHimejima9906 GyomeiHimejima9906 changed the title software and privacy protection software and privacy features Nov 30, 2024
@DavidXanatos
Copy link
Contributor

The plan is to have MP driver start first, currently this is not done as for testing its provided as a portable installation, once there will be a version with an installer the driver will start early and provide always protection, including a mechanism to prevent the driver from being unloaded.

Also any malware with admin privileges can read the entire volume as a block device and access this way the content of any file, this can not be blocked on the OS volume, hence to keep data really secure they need to be on a separate volume where any access can be moderated, for example an encrypted volume like provided by MP.

@GyomeiHimejima9906
Copy link
Author

i mean that MP instalation are not protected and a malware can delate it with windows reboot function or similar ways

@DavidXanatos
Copy link
Contributor

Driver protection will be added, also any reboot will automatically unmount any encrypted volume.

The problem is as described that if you have a malware with admin privileges you can not prevent it from reading the OS volume as a block device and bypassing any ACLs that may be set on the filesystem level.

@Miademora
Copy link

The problem is as described that if you have a malware with admin privileges you can not prevent it from reading the OS volume as a block device and bypassing any ACLs that may be set on the filesystem level.

would the addition of drive-encryption like bitlocker/veracrypt prevent that?

@DavidXanatos
Copy link
Contributor

would the addition of drive-encryption like bitlocker/veracrypt prevent that?

Addition LOL, haven't you watched the demo video linked in every release: https://youtu.be/NkVR5ktvqBc?t=1674 ? I know its awfully long and my video is not very YouTube worthy,
Anyhow container based volume encryption is already in included for exact this purpose.

Also it demonstrates how to access a file on disk using a disk editor: https://youtu.be/NkVR5ktvqBc?t=1609

@GyomeiHimejima9906
Copy link
Author

GyomeiHimejima9906 commented Dec 1, 2024

The problem is as described that if you have a malware with admin privileges you can not prevent it from reading the OS volume as a block device and bypassing any ACLs that may be set on the filesystem level

a possible solutions is: while installing randomizing folder and main executuble file name

@GyomeiHimejima9906
Copy link
Author

for example "urnvbkldxmpvca" instead "Major Rpivacy" NOTE: the nme should be generated when installing on pc not on source code or packed folder

@Proposer233
Copy link

The plan is to have MP driver start first,

See #20

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants