TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: How can I security-sandbox email attachment opening?

12 点作者 gusfoo超过 1 年前
What I want is to have a service open all of my email attachments before I do. If it&#x27;s a RAR, ZIP, PDF, DOCX etc. then it gets opened in the normal applications, as do the archive contents. And this takes place in a similar environment to our desktop environment which is undetectable as a sandbox.<p>Then I get a report of any unusual disk or network activity that occurred. For example I don&#x27;t expect opening a RAR file to cause network activity[1]<p>We&#x27;re happy to pay what it takes for this kind of thing, and I suspect a lot of people are. Is there such a service out there?<p>[1] https:&#x2F;&#x2F;digital.nhs.uk&#x2F;cyber-alerts&#x2F;2023&#x2F;cc-4370

7 条评论

LinuxBender超过 1 年前
I know of a few companies that front-end their email with ProofPoint [1] but I have no idea how much it costs, probably a lot. It can quarantine anything suspicious. It also lets the admin know who clicked on what links in emails. <i>It rewrites links to its own tracking endpoint</i> It also doubles as a DLP <i>Data Loss Prevention</i> meaning it can be taught to look for organization specific data that should not be in email. It can also give you reports on who is receiving the most abusive emails <i>meaning they may be targeted by attackers.</i><p>[1] - <a href="https:&#x2F;&#x2F;www.proofpoint.com&#x2F;us" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.proofpoint.com&#x2F;us</a>
评论 #37564541 未加载
ObscureScience超过 1 年前
Are we talking a Windows environment? I&#x27;m sure there are commercial solutions, but I think sandboxie could achieve something similar (don&#x27;t know how secure it is considered).<p>If you can chose your system QubesOS may be interesting. It would be interesting if Qubes developed the capability to have non local VMs transparently (they wouldn&#x27;t necessarily need to be virtualized).
aspenmayer超过 1 年前
I use VirusTotal’s sandboxing tools&#x2F;reports and graphs for this kind of thing, and their free API limits are suitable for many needs, although there are limits to individual upload size in the tens of MB on the web, which are somewhat higher if using CLI iirc, but not by much. I think their paid offerings may raise these upload size limits.
jiveturkey超过 1 年前
start here: <a href="https:&#x2F;&#x2F;github.com&#x2F;freedomofpress&#x2F;dangerzone">https:&#x2F;&#x2F;github.com&#x2F;freedomofpress&#x2F;dangerzone</a><p>i&#x27;ve never used it, but i&#x27;ve been meaning to check it out. at least it should give you a jumping off point for further investigation.<p>if that is insufficient, use proofpoint.<p>for archives that are tickling bugs, you have to use a similar technique. it&#x27;s not enough to analyze them and send them on as-is. you have to unpack in a sandbox (which will be detectable, no 2 ways about it, but the question is will anyone expend enough effort to detect -- no, not for your use case, seeing as how you&#x27;re asking the question at all), process with dangerzone or dangerzone-like tool, then re-archive it and let the user see only that new archive.
fellowniusmonk超过 1 年前
I&#x27;d love something that would do this locally in browser using WASM. Like a OSX build with little snitch pre-installed.
screechingbagel超过 1 年前
theoretically you could spin your own program that sends all attachments to VirusTotal? i think they have a premium API, and they open&#x2F;run files in a sandbox (or multiple) on top of just virus scan (see &quot;Behavior&quot; tab)
aborsy超过 1 年前
I also have this question, on Linux.<p>You can use a VM, but that’s a pain.