-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 2016-07-10 06:51, donoban wrote: > Very fun read: > https://www.deepdotweb.com/2016/03/12/does-qube-os-has-a-leak-hole/ > > Some parts: > > "According to technical documentation concerning Qubes structure, > domains are separated from each other via encryption . Like the > Dom0, the storage domain is literally protected from other domains > via encryption to prevent viruses in other domains [ such as > Network Vm ] from penetrating into each other." >
No. > "Seemingly, Qubes OS depends on a backup system to prevent huge > mass of data. In default, the backup system relies on weak key > derivation scheme . So it is recommended that users select a > high-entropy passphrase for use with Qubes backups ." > This appears to be taken directly from what I wrote at the top of this page: https://www.qubes-os.org/doc/backup-restore/ > > "Qubes allows users not to ‘send’ or ‘transport’ but to copy and > paste files and folders . Let’s assume users download a file or a > program from a ‘phished’ website ( designated as an https website > ) unknowingly . Later, the file or program downloaded from the > phished website is copied from the App Vm to the Storage Vm. > > The storage Vm is encrypted from the Network Vm to prevent > replication of malwares ( i.e virus ) . Can the encryption method > employed to prevent malicious software in the programs or folders > on the App Vm from attaching itself to the Storage Vm ?" > Nonsense. > Has some Qubes dev contacted with this guys? > I doubt it. It would be a supreme waste of our developers' time to contact this author. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJXglc8AAoJENtN07w5UDAwEPEQALX5hf+7RnTlH0P2aFK8S2Ue 4FaSfnvfCztO5sDWfr5/dRab7LfGSfaE3YhIEB8xi+7FLqC2BZPUvI9pvn76tfJZ MnmHzxt9bVWB2nO7uMUJy3P93BMZlrZe7eWz4dr8GRMOrWvzZJd9zcy5Mi6PlQ8n ahRLaCorMvQjIrAdGdbbnvD6k+YvaLKefQ1uuyCoLslX2fzvIXGfLTFr8tGQ9WvN RUJobWk5dyF6EZ/QPw2zPZg14oWNqZZu1B99jJ+F1dYCVjZhO3EM7wkxPebYC2+6 Dd0pX6uTwlYmPzwarGq6b98QCk0c7lOVJfv30EnYavJQobELPV0pgp2GUV3T+Tb7 l3MJt7LKubXHD0Pbw5rAeOWyCgbx+UHa3G3mjcpP1DPo0Td8fJtF78N1z7fanMGU JEr0z3tJzj8DCc46Cwj3GyRCEx/HjUpBKxxszeW+f8xNtFaVjm5gq0BdsaSibSea oNjZdARTz5NnJBp6vZIQguWYHjbpcM+ny6LBwdZcle0WS3b1/LXRfh/wcITafB9s LICDI1t0Atnx6JmWudmH7eMT+G5RQK7JzpjZf22fMLKZkk5o0V3XSTJbcQXNNNO5 jWIf9CMbBuMNYEinIBA4mJO1fPmUFyqxIFtUtvHn3jkoqKVincRvmTYZcOZF3GHc uljM557dU2fVLwhsDNzB =p+cj -----END PGP SIGNATURE----- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/bfecba29-c938-fafa-2a42-7d0a3c275510%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
