From 2ca94a975db3f5fa76eb39fa8213a9f0b456ea22 Mon Sep 17 00:00:00 2001 From: Tommy Date: Thu, 28 Jul 2022 01:07:46 -0400 Subject: [PATCH] Grammar Fixes Signed-off-by: Tommy --- content/knowledge/Badness Enumeration.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/knowledge/Badness Enumeration.md b/content/knowledge/Badness Enumeration.md index 4a64a0d..997dbf8 100644 --- a/content/knowledge/Badness Enumeration.md +++ b/content/knowledge/Badness Enumeration.md @@ -31,7 +31,7 @@ Here are some other examples of Anviruses being attack surfaces on their own: - [Kaspersky in the Middle](https://web.archive.org/web/20210729054039/https://palant.info/2019/08/19/kaspersky-in-the-middle-what-could-possibly-go-wrong/) -The proper way to deal with untrusted applications is not to scan them with an Antivirus, but to confine them in such a way that even if they were malicious, they cannot do much damage at all. This has already been achieved on secure mobile operating systems like Android and iOS. Typically, attacks against these systems require an operating system level exploit chain, or for the user to actually mess up and grant an app access to sensitive data. On desktop operating systems, you should utilize virtualization to contain untrusted applications in their own virtual machine. This can be done with a system like Qubes OS, the [Windows Sandbox](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-sandbox/windows-sandbox-overview), or just general KVM / HyperV virtual machines. +The proper way to deal with untrusted applications is not to scan them with an Antivirus, but to confine them in such a way that even if they were malicious, they cannot do much damage at all. This has already been achieved on secure mobile operating systems like Android and iOS with their application sandbox. Typically, attacks against these systems require an exploit chain against the operating system, or for the user to actually mess up and grant an app access to sensitive data. On desktop operating systems, you should utilize virtualization to contain untrusted applications in their own virtual machine. This can be done with a system like Qubes OS, the [Windows Sandbox](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-sandbox/windows-sandbox-overview), or just general KVM / HyperV virtual machines. ## Default Permit