There is a similar concept coming to Windows: <a href="http://www.bromium.com/innovations/micro-virtualization.html" rel="nofollow">http://www.bromium.com/innovations/micro-virtualization.html</a>
I think I've seen this before, in a post somewhere by one of their developers. I think it was about how insecure X11 is, because any X11 app can listen for all keystrokes made by the user. AFAIK people jumped on that post as "it's a known property of X11, stop making drama about it."
This article [1] is a good overview.<p>[1] <a href="http://www.invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf" rel="nofollow">http://www.invisiblethingslab.com/resources/2014/Software_co...</a>
> The Qubes Windows Tools are proprietary but we distribute the binaries for free with current Qubes OS releases.<p>Out of curiosity: What's the reason for them being proprietary while the rest of the system seems to be free software?
So... my question is: How does this work with things like games or other hardware-acceleration-intensive programs?<p>If there's no performance loss, great.
While I am all for virtualizing, it doesn't help security. It just moves the exploit from your OS into your hypervisor. Even worse, you add a whole new level of exploitable code.