recommend bubblejail for people that want a more ouf-of-the-box experience
authorRalf Jung <post@ralfj.de>
Tue, 16 Apr 2024 08:53:39 +0000 (10:53 +0200)
committerRalf Jung <post@ralfj.de>
Tue, 16 Apr 2024 08:53:39 +0000 (10:53 +0200)
README.md

index 5d74547809ad59c46afa8fded0af14d48bee0b96..cee1e667dad961b75215959768285056cc2711a0 100644 (file)
--- a/README.md
+++ b/README.md
@@ -7,9 +7,12 @@ tool to easily sandbox Linux applications.
 
 The primary use-case for BubbleBox is running applications that you do not trust enough
 to give them full access to hour home directory, and in particular the secret keys stored there.
-In this regard it is similar to [firejail] and [bubblejail], but less powerful and in exchange hopefully easier to configure.
 BubbleBox is based on [bubblewrap] and [xdg-dbus-proxy] which do all of the heavy lifting.
 
+The goals of this project are similar to [firejail], but I found firejail's configuration to be extremely hard to maintain and debug.
+BubbleBox is meant for people that are comfortable editing its Python source code to adjust it to their needs;
+if you are looking for something with a more out-of-the-box experience, try [bubblejail].
+
 [firejail]: https://firejail.wordpress.com/
 [bubblejail]: https://github.com/igo95862/bubblejail
 [bubblewrap]: https://github.com/containers/bubblewrap