Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs.
Would it be more convenient to use Dangerzone than using pdf.js with a sandboxed browser (such as Chromium (Brave doesn’t use it) or Firefox) in a virtual machine without network access? Because this method is an overkill for the average user.
Even I wanted to know if opening pdf in Firefox is good as it has all the features which I use in SumatraPDF.
This would help me in reducing one more software for just pdf docs.
Assuming the payload isnt in the PDF itself (that VirusTotal would /should find), would temporarily disconnecting from the internet be sufficient or is there something more?
I dont think we should be opening PDFs directly into browsers as well?
I think opening a PDF in a (Chromium) browser is still the safest place* because all tabs are sandboxed. You would need an exploit chain to break out of there and considering the speed in which Chromium CVEs get fixed bad actors usually don’t burn these expensive exploits on common people.
*a step up for this is opening the pdf in chromium in a Linux VM with no network access, deleting the VM snapshot afterwards
If I understand correctly Firefox per site isolation is essentially the same as Chromium’s per tab isolation. Therefore Firefox should be suitable for this use.
Firefox (for desktop) has had per tab isolation since 2020. On android per tab isolation exists, but it is disabled by default. The only way I know of to enable per tab isolation on android is through about:config
Unfortunately about:config is only available on Firefox forks and Firefox nightly. I don’t know if there is a roadmap for enabling Per tab isolation on android, however I have heard that it causes significant battery drain.
I was linked to Dangerzone from https://www.techlore.tech/resources which appears to be a pdf or file converter? Something like that? I wanted to check here before looking too far into the website. Can I trust this site?
Thanks, read through it.
I’m going to be so honest with you, I don’t know enough about sandboxxing, virtual machines, or tab isolation for that thread to make much sense to me.
I love learning, and I am perpetually learning, but “computer stuff” has never came easily to me. The closest I’ve ever gotten to learning anything even vaguely in this realm was learning rudementary coding on Scratch in like 2013. I just put my focus elsewhere.
Can you… translate(?) it for me? Like the jist of what the conclusions people are coming to in the comments are? Sorry, I feel bad for asking and this is a bit embarrassing.
EDIT:
This post and the one above it were merged into this topic over from the questions tab where it was its own topic. Sorry.
It is still possible to be hacked using Dangerzone, if the malware in the PDF is designed to target Dangerzone specifically. There is also more detail about this in the link above.
If you’re worried about viewing potentially malicious pdfs or docs then viewing them in peergos is an easy solution. The sandbox in peergos is designed to prevent exfiltration, even if the pdf or doc viewer code is compromised.