Package - sandbox-app-launcher
Package: sandbox-app-launcher
apt-get install sandbox-app-launcher
apt-get install sandbox-app-launcher
Manuals in package:
Documentations in package:
Primary informations
Download package: https://deb.kicksecure.com/pool/main/s/sandbox-app-launcher/sandbox-app-launcher_7.4-1_all.deb (Size: 48.1KiB)| Property | Value |
|---|---|
| Package | sandbox-app-launcher |
| Version | 0:7.4-1 |
| Architecture | all |
| Maintainer | Patrick Schleizer |
| Installed-Size | 132 |
| Depends | sudo, bubblewrap, apparmor, libseccomp-dev, helper-scripts, dbus-x11 |
| Homepage | https://www.kicksecure.com/wiki/Sandbox-app-launcher |
| Priority | optional |
| Section | misc |
| Filename | pool/main/s/sandbox-app-launcher/sandbox-app-launcher_7.4-1_all.deb |
| Size | 49216 |
| SHA256 | 1ebefe283af0c7cccfd28249f7412c715cdd3d2fc16fe80540a2ce7a8913cee8 |
| SHA1 | 4db416b326048d19d3162e842cba75d58b2c3c85 |
| MD5sum | 3d66b876d552ddd4d1ac537db73acb05 |
| Description | application launcher to start apps in a restrictive sandbox sandbox-app-launcher runs each app as its own user, in a bubblewrap sandbox and confined by apparmor. . The directory, `/shared`, is shared across all app sandboxes to transfer files across. . This implements a permissions system to configure what apps can access. There are currently 5 available permissions: . * Network access . * Webcam access . * Microphone access . * Shared storage access (read-only or read-write) . * Dynamic native code execution . All apps the user installs will be automatically configured to run in the sandbox and a prompt will ask the user which permissions they wish to grant the application (not implemented yet). . Currently a WIP and not for actual use. |
| Description-md5 |
Files in package
- /etc/apparmor.d/abstractions/sandbox-app-launcher
- /etc/apparmor.d/sandbox-app-launcher
- /etc/sandbox-app-launcher/chromium.conf
- /etc/sandbox-app-launcher/firefox.conf
- /etc/sandbox-app-launcher/hexchat.conf
- /etc/sandbox-app-launcher/keepassxc.conf
- /etc/sandbox-app-launcher/libreoffice.conf
- /etc/sandbox-app-launcher/mousepad.conf
- /etc/sandbox-app-launcher/onionshare.conf
- /etc/sandbox-app-launcher/qtox.conf
- /etc/sandbox-app-launcher/ristretto.conf
- /etc/sandbox-app-launcher/thunderbird.conf
- /etc/sandbox-app-launcher/torbrowser.conf
- /etc/sandbox-app-launcher/vlc.conf
- /etc/sandbox-app-launcher/xpdf.conf
- /shared
- /usr/bin/sandbox-app-launcher
- /usr/share/doc/sandbox-app-launcher/changelog.Debian.gz
- /usr/share/doc/sandbox-app-launcher/changelog.gz
- /usr/share/doc/sandbox-app-launcher/copyright
- /usr/share/man/man8/sandbox-app-launcher.8.gz
- /usr/share/sandbox-app-launcher/autogen-seccomp
- /usr/share/sandbox-app-launcher/bwrap-wrapper
- /usr/share/sandbox-app-launcher/machine-id
- /usr/share/sandbox-app-launcher/seccomp-whitelist
- /usr/share/sandbox-app-launcher/seccomp-whitelist-wx
- /usr/share/sandbox-app-launcher/wrapper-script