Firejail is a SUID sandbox program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces and seccomp-bpf. It includes sandbox profiles for Iceweasel/Mozilla Firefox, Chromium, Midori, Opera, Evince, Transmission, VLC, Audoacious, Clementine, Rhythmbox, Totem, Deluge and qBittorrent. Firejail also expands the restricted shell facility found in bash by adding Linux namespace support. It supports sandboxing specific users upon login. Download: http://sourceforge.net/projects/firejail/files/ Build and install: ./configure && make && sudo make install Documentation and support: http://firejail.sourceforge.net License: GPL v2 Firejail Authors: netblue30 (netblue30@yahoo.com) Patrick Toomey (http://sourceforge.net/u/ptoomey/profile/) - user namespace implementation Reiner Herrmann - a number of build patches, man page fixes, Debian integration sshirokov (http://sourceforge.net/u/yshirokov/profile/) - Patch to output "Reading profile" to stderr instead of stdout Alexey Kuznetsov (kuznet@ms2.inr.ac.ru) - src/lib/libnetlink.c extracted from iproute2 software package G4JC (http://sourceforge.net/u/gaming4jc/profile/) - ARM support dewbasaur (https://github.com/dewbasaur) - block access to history files - Firefox PDF.js exploit (CVE-2015-4495) fixes Peter Millerchip (https://github.com/pmillerchip) - memory allocation fix - --private.keep to --private-home transition - lots of other fixes Michael Haas (https://github.com/mhaas) - bugfixes mjudtmann (https://github.com/mjudtmann) - lock firejail configuration in disable-mgmt.inc Copyright (C) 2014, 2015 Firejail Authors