-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 2016-07-10 06:51, donoban wrote:
> Very fun read: 
> https://www.deepdotweb.com/2016/03/12/does-qube-os-has-a-leak-hole/
>
>  Some parts:
> 
> "According to technical documentation concerning Qubes structure, 
> domains are separated from each other  via encryption . Like the
> Dom0, the storage domain is literally protected from other domains
> via encryption to prevent viruses in other domains [ such as
> Network Vm ] from penetrating into each other."
> 

No.

> "Seemingly, Qubes OS depends on a backup system to prevent huge
> mass of data.  In default, the backup system relies on weak key
> derivation scheme . So it is recommended that users select a
> high-entropy passphrase for use with Qubes backups  ."
> 

This appears to be taken directly from what I wrote at the top of this
page:

https://www.qubes-os.org/doc/backup-restore/

> 
> "Qubes allows users not to ‘send’ or ‘transport’ but to copy and
> paste files and folders . Let’s assume users download a file or a
> program from a ‘phished’ website ( designated as an https website
> ) unknowingly . Later, the file or program downloaded from the
> phished website is copied from the App Vm to the Storage Vm.
> 
> The storage Vm is encrypted from the Network Vm to prevent
> replication of malwares ( i.e virus ) .  Can the encryption method
> employed to prevent malicious software in the programs or folders
> on the App Vm from attaching itself to the Storage Vm ?"
> 

Nonsense.

> Has some Qubes dev contacted with this guys?
> 

I doubt it. It would be a supreme waste of our developers' time to
contact this author.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-----BEGIN PGP SIGNATURE-----
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=p+cj
-----END PGP SIGNATURE-----

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bfecba29-c938-fafa-2a42-7d0a3c275510%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.

Reply via email to