Is podman adapted (like singularity) to let untrusted users run untrusted code?

Singularity explicitly say that it is designed to let untrusted users run untrusted code safely: https://docs.sylabs.io/guides/2.6/admin-guide/security.html:

Untrusted users running untrusted containers!
This simple phrase describes the s… Continue reading Is podman adapted (like singularity) to let untrusted users run untrusted code?

Is it possible to distinguish the binary content of a gpg-encrypted file from a random blob of data?

I have encrypted the file some_file to be decipherable by some_recipient with:
gpg –encrypt –recipient some_recipient some_file

Which results in a file some_file.gpg.
My question is: is the content of some_file.gpg distringuishable from… Continue reading Is it possible to distinguish the binary content of a gpg-encrypted file from a random blob of data?

Is using a singularity sandbox an effective way to increase security through isolation / compartmentalization?

I am using singularity sandboxes in my workflow for several reasons unrelated to security. However, after using it a bit, I am now wondering: is using a singularity sandbox an effective way to increase security by enforcing isolation / com… Continue reading Is using a singularity sandbox an effective way to increase security through isolation / compartmentalization?