On 01/31/2017 10:47 PM, Gaiko Kyofusho wrote:
I keep reading examples where people are using something like mobile routers between thier phone/computer and public wifi spots, example like the blackholecloud <https://blackholecloud.com/>device or apparently Mike Perry of the tor project told arstechnica <https://arstechnica.com/security/2016/11/tor-phone-prototype-google-hostility-android-open-source/>that "He suggests leaving the prototype in airplane mode and connecting to the Internet through a second, less-trusted phone, or a cheap Wi-Fi cell router."

This is pretty dubious advice. What is to stop an attacker from breaking into the mobile router and using that as an attack platform to break into your main device? A few minutes...?


Are Qubes separate firewall and net (and whonix gw) VMs serving the same purpose? If not how is what blackholecloud and what MP are doing improving thier priv/sec?

Basically, yes. But the NIC is isolated in sys-net and there is no where else (internally) for anti-NIC attacks to go (except to other machines on the LAN).


Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/050bca64-e23a-ea17-181c-617549d40470%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.

Reply via email to