AppArmor for Complete System - Including init, PID1, Systemd, Everything! - Full System MAC policy

Yes, we shouldn’t make this a usability mess.
There is even recovery mode (already, standard feature of any/most linux distribution).

That even root cannot escalate to kernel space. Therefore cannot (or harder) to attack the virtualizer or install a rootkit. This might break various malware or exclude classes of exploits.

related: Untrusted Root - improve Security by Restricting Root

Makes sense as per above. apt dist-upgradeing the system while preventing third party repositories.

Yes, aka “full admin mode”. Just as Whonix works right now.

I don’t see what the latter would be good for.

live+noroot: Install software to home folder and execute it?
live+root: could install software from repository. Test upgrades. (The test’s usefulness is limited but non-zero.)
Tails has an optional root mode for live sessions too.
But indeed, I am not sure a live+root option is important enough to have it easily accessible through grub boot menu as our space there is limited. Could be accessible in custom configurations / grub manual boot kernel parameter.

noroot: install to home folder?
noroot meaning: “sudo apt” cannot be used.

Ok.

Since you’re implementing this, that’s fair. Also indeed too many options may be confusing. We can’t perfect this in every aspect for every use case.

Yes. Any file can be remounted with any other file. Another file can be mounted “on top” of another file. The file “below” will be no longer accessible (as much as I know).

2 Likes