-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 2016-06-30 18:20, Andrew wrote: > Andrew: >> J.M. Porup: >>> On Wed, Jun 29, 2016 at 02:30:34PM -0700, flux wrote: >>>> My thoughts were more along the lines of mitigative travel >>>> protection crossing borders and such. Like, you can boot to >>>> decryption but if the device is seized, no valid decryption >>>> can actually be performed. But as you say, depending on your >>>> situation that could be disadvantageous. I additionally just >>>> enjoy the idea of separating keys from locks regardless of >>>> the encrypted state of those keys. >>> >>> FWIW, I support this feature request as well. Search the >>> archives for previous discussion early 2015 (Caspar Bowden >>> indicated his support for the feature, before he passed.) >>> >>> Overreliance on a boot nuke feature would, as pointed out, be >>> unwise. But as a journalist, I can easily imagine a scenario >>> where I am crossing a border, am asked/ordered to decrypt my >>> laptop, and I prefer to nuke the hard drive rather than >>> comply. >>> >>> Sure, border officials might image the disk first, but how >>> many laptop users have such a feature? >>> >>> I think of it like TLS. Arguing that X.509 certificate >>> infrastructure is broken and not (very) trustworthy doesn't >>> mean we should insist Qubes return to a non-HTTPS website. >>> It's a layer of protection, one of many. >>> >>> So I support this feature request, while noting the priority >>> is low. >>> >>> jmp >>> >> >> [bullshit] >> >> Andrew >> > > Actually, I think I get it now. Tell me if I'm wrong. > > You want this to be a readily-accessible feature of Qubes. It's > not that you want to prepare to cross borders: you cross borders > in the course of your work. It's not even that you cross borders: > you're generally mobile, and you're a potential target. It makes > sense to have the ability to provide a quick failsafe if and when > the need strikes. > > Still, I think the better solution is to implement > plausibly-deniable per-VM encryption/hiding, as suggested when > this topic came up back in 2015. Search for the qubes-users thread > "Re: [qubes-users] feature request: luksAddNuke". > > Caspar actually supported this idea: > >> I would really like to see this implemented >> >> -- Caspar Bowden Qubes Policy Adviser" > > Does this, or do these, already have a tracking ticket? > > Andrew >
Hi Andrew, Not sure if you received my message (immediately prior to your last one in this thread). We've had a ticket open for the nuke option for quite a while now: https://github.com/QubesOS/qubes-issues/issues/921 As for the per-VM encryption option, see here: https://github.com/QubesOS/qubes-issues/issues/1293#issuecomment- 229028321 - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJXdgB0AAoJENtN07w5UDAwT20QANCGKu4rL3BcSkcfn42+5+Ml XHY6GAVRrQ8+RWu3GDdfu0hbCrzKkDXWZFSECM1v5CQm30hOFq1agaY8ANjmwvOP gQ2x24VmtXXqLDIKnnf85h5MPYJgsYYMTESr2hq3h5l/RCgfphJsbhrZblv9YfJs bwG5diwcwCcXFmF25QmgxfHWNmrFH/dVs8d++I9jDg/T0jCHBhzqO9g9SXtNRa2x E6mfKWuzU58xEE0ZoRUu6+PC8fPOyt9L0vUkM+VgZsyYcsLOCzd3qkNNuF02ViaM VsfqzALWhWgbmV3vxy5Lt+YchcO/XGcN010i9DADQEiXBh5GcJtNAazKIX4vCkhp AIfhPGjyDYaGETj351/nAf/vUJRivPR+TJ8cvWKciJSHOjY/UImzF48SnLT3MJYl zEj6qFsjvbmo7kjOsxDZkKcimvNjYjA9OqLEiOh/P8TDtZPqZeJOegeg97MftDml 0tOQXYk6e4CZKW09WJn3h2BMK/hbhFjZXTHXw8CLcdHfOc8cfF2RRbnSylrGJFun WKFVZ7EavlkcapDYLdq2TLiT8g7SmLH9gpe4kYNOaGftQ5lAApGYlsS78EayL9et Wq5c6rd52f0yGwLBu7D6TeRrwXkRjrlJc9bB7Yc3WQdMqa0TqieVoV2qPg8gjhU8 iHpwhjjU633zI6M0k8Lg =xYUA -----END PGP SIGNATURE----- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/dacf71ca-4352-107c-5886-7a318683ec29%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.