-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 2016-12-06 18:44, Ben Wika wrote: > On Thursday, 11 August 2016 22:38:27 UTC+10:30, ama...@riseup.net wrote: >> My understanding is that by default Qubes Dom0 is protected from USB >> attacks by disallowing access to USB's. >> To the contrary,on my system, USB's have direct access to Dom0 - I plug >> in a usb -popup shows it's connected to dom0 - i have direct access via >> dom0 to the files on the usb. >> >> Is it just me? or it it a system failure? > > so to be clear, having no usb qube makes dom0 vulnerable? (i had the same > setup until i got myself ps2 splitter) >
Correct. If you're not using a USB qube (i.e., your USB controllers are left in dom0), then a malicious USB device plugged into a USB port can compromise dom0. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJYR5dTAAoJENtN07w5UDAwhcoQAI6Qn3ECdHlOMZ+WlSC+mUfN LXjIzETlOuNNpfKwXb7YbBfpilldj0IwncXqWfwWVfRlTqi2oa8cmi3RbZbhi+j/ vamVGhAvKP/2B2b31tLFZiLkALxnT7sRw0A2a1ARvS2PWVujyZQKBH+9z5tDbSZq t0rTco73v3/KZqFbJtK/LyoDrhLE6AmGMstwLhTxN9AaeAr7lkYFKZetgwOiNqsb mQJCZiqJkxsrfAA3u5RxawwDxsE4c3R0a6ehfFaAEf0PCi9XXtDCLYuk9KX2FMz1 n3NshknLKTK3+mrGIgTNGPgY4wvDANorX1gvBafdWh+UVjgC1J6jZ42FO7AeudPc lGuvf3GUwc3pooSix65fYtkiVWJMeNSHdfbuMGnRzDRx36IjQpLQJ6qBpAHb7QBn G2roorRt1GujvQEwen40NOqgO3p4RhMpZra9mVPU34a6E5PcBjRl0Is3gBQgPeU9 a6p9IO+QIIT/exbB0MPguVBYYVbH9crHrJK+crzlyxNdnnFtH5Q2t96digr5rCaW c57yExsWKRVai8ijP1C22Ta+jF4l3qcta2SXwveXu8eTQZD4oR74q136qOCpbPmw EDt3HAsJaq8FwlyDVkkNL1I8RpSqYELCdEHBVCNdtH6PlEjmxeyGGGEbdOTJbXlS oUqq+RZ6xAXtaWbZZZGQ =MxBx -----END PGP SIGNATURE----- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/afcacc50-7cf1-4532-6c5a-ea020491211b%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.