In termini di sicurezza, sandboxie ha il sopravvento.
Per citare wikipedia
Sandboxie is a sandbox-based isolation program developed by Ronen
Tzur, for 32- and 64-bit Windows NT-based operating systems.It creates
a sandbox-like isolated operating environment in which applications
can be run or installed without permanently modifying the local or
mapped drive.An isolated virtual environment allows controlled testing
of untrusted programs and web surfing.
Fonte: wiki
Vino d'altra parte:
Wine is a compatibility layer. It duplicates functions of Windows by
providing alternative implementations of the DLLs that Windows
programs call, and a process to substitute for the Windows NT kernel.
This method of duplication differs from other methods that might also
be considered emulation, where Windows programs run in a virtual
machine.
Inoltre
Because of Wine's ability to run Windows binary code, concerns have
been raised over native Windows viruses and malware affecting
Unix-like operating systems. Wine can run most malware, but programs
running in Wine are confined to the current user's privileges,
restricting some undesirable consequences. For this reason the
developers of Wine recommend never running it as the superuser.
Malware research software such as ZeroWine runs Wine on Linux in a
virtual machine, to keep the malware completely isolated from the host
system. Another security concern is when the implemented
specifications are ill-designed and allow for security compromise.
Because Wine implements these specs, it will also implement any
security vulnerabilities they contain.
Fonte: Wiki
In sintesi, sì, Sandboxie è (teoricamente comunque) più sicuro di Wine.
Inoltre, Wine non è un emulatore, anche se condivide le caratteristiche dell'emulatore.
Fatto divertente:
The name Wine initially was an acronym for WINdows Emulator. Its
meaning later shifted to the recursive backronym, Wine Is Not an
Emulator in order to differentiate the software from other emulators
Modifica:
Sembra che manchino le informazioni riguardanti l'utilizzo della memoria e le protezioni attorno ad esso. Sulla base di quanto segue ho letto sulle loro domande frequenti
The following classes of system objects are supervised by Sandboxie:
Files, Disk Devices, Registry Keys, Process and Thread objects, Driver
objects, and objects used for Inter-process communication: Named Pipes
and Mailbox Objects, Events, Mutexs (Mutants in NT speak), Semaphores,
Sections and LPC Ports. For some more information on this, see Sandbox
Hierarchy.
Sandboxie also takes measures to prevent programs executing inside the
sandbox from hijacking non-sandboxed programs and using them as a
vehicle to operate outside the sandbox.
Sandboxie also prevents programs executing inside the sandbox from
loading drivers directly. It also prevents programs from asking a
central system component, known as the Service Control Manager, to
load drivers on their behalf. In this way, drivers, and more
importantly, rootkits, cannot be installed by a sandboxed program.
Sembra che:
L'accesso alla memoria non è limitato in alcun modo extra ordinario e i programmi vengono eseguiti e viene data la possibilità di leggere la maggior parte dei dati sul sistema. Potresti non essere in grado di installare malware persistente su un sistema, ma credo che il malware possa essere eseguito dalla memoria ed eseguire azioni dannose (ad esempio, inviare email dal browser, rubare cookie, ecc.)
Spero che ti aiuti!