Package - sandbox-app-launcher

Package:  sandbox-app-launcher
apt-get install sandbox-app-launcher
Manuals in package:
Documentations in package:

Primary informations

Download package: https://deb.kicksecure.com/pool/main/s/sandbox-app-launcher/sandbox-app-launcher_7.4-1_all.deb (Size: 48.1KiB)

PropertyValue
Packagesandbox-app-launcher
Version0:7.4-1
Architectureall
MaintainerPatrick Schleizer
Installed-Size132
Dependssudo, bubblewrap, apparmor, libseccomp-dev, helper-scripts, dbus-x11
Homepagehttps://www.kicksecure.com/wiki/Sandbox-app-launcher
Priorityoptional
Sectionmisc
Filenamepool/main/s/sandbox-app-launcher/sandbox-app-launcher_7.4-1_all.deb
Size49216
SHA2561ebefe283af0c7cccfd28249f7412c715cdd3d2fc16fe80540a2ce7a8913cee8
SHA14db416b326048d19d3162e842cba75d58b2c3c85
MD5sum3d66b876d552ddd4d1ac537db73acb05
Descriptionapplication launcher to start apps in a restrictive sandbox sandbox-app-launcher runs each app as its own user, in a bubblewrap sandbox and confined by apparmor. . The directory, `/shared`, is shared across all app sandboxes to transfer files across. . This implements a permissions system to configure what apps can access. There are currently 5 available permissions: . * Network access . * Webcam access . * Microphone access . * Shared storage access (read-only or read-write) . * Dynamic native code execution . All apps the user installs will be automatically configured to run in the sandbox and a prompt will ask the user which permissions they wish to grant the application (not implemented yet). . Currently a WIP and not for actual use.
Description-md5

Files in package

  • /etc/apparmor.d/abstractions/sandbox-app-launcher
  • /etc/apparmor.d/sandbox-app-launcher
  • /etc/sandbox-app-launcher/chromium.conf
  • /etc/sandbox-app-launcher/firefox.conf
  • /etc/sandbox-app-launcher/hexchat.conf
  • /etc/sandbox-app-launcher/keepassxc.conf
  • /etc/sandbox-app-launcher/libreoffice.conf
  • /etc/sandbox-app-launcher/mousepad.conf
  • /etc/sandbox-app-launcher/onionshare.conf
  • /etc/sandbox-app-launcher/qtox.conf
  • /etc/sandbox-app-launcher/ristretto.conf
  • /etc/sandbox-app-launcher/thunderbird.conf
  • /etc/sandbox-app-launcher/torbrowser.conf
  • /etc/sandbox-app-launcher/vlc.conf
  • /etc/sandbox-app-launcher/xpdf.conf
  • /shared
  • /usr/bin/sandbox-app-launcher
  • /usr/share/doc/sandbox-app-launcher/changelog.Debian.gz
  • /usr/share/doc/sandbox-app-launcher/changelog.gz
  • /usr/share/doc/sandbox-app-launcher/copyright
  • /usr/share/man/man8/sandbox-app-launcher.8.gz
  • /usr/share/sandbox-app-launcher/autogen-seccomp
  • /usr/share/sandbox-app-launcher/bwrap-wrapper
  • /usr/share/sandbox-app-launcher/machine-id
  • /usr/share/sandbox-app-launcher/seccomp-whitelist
  • /usr/share/sandbox-app-launcher/seccomp-whitelist-wx
  • /usr/share/sandbox-app-launcher/wrapper-script