On Thursday, March 15, 2018 at 5:11:17 AM UTC+1, yre...@riseup.net wrote:
> T520 for Qubes 4.0 , can I / should I boot Win7 HDD, and Qubes 4.0 from
> an SSD?
> 
> I'm looking at buying an i7 T520 that is listed as working on the HCM
> list on a website, for like $250, I see them cheaper on ebay but , the
> thing has 4GB ram , by adding a DVD tray / caddie for an SSD and an SSD
> and 4GB ram, I add another $140  or so  to the cost ....  so am
> wondering  if this technically would not have the issue where  dual
> booting is considering insecure, if I'm actually booting from 2 separate
> HDs ;  and/or  if  doing the Qubes 4.0  install  is going to be any
> tricker or easier  with 2 HD,  assuming,  I wasn't planning on  doing
> another  dual boot off  1 HD again 
> 
> 
> thanks

You're right that it's more secure to have two devices, but only very, very 
slightly. Though, it's a good idea to do even so, even if only slightly, if you 
must. I believe the partition table can be more exposed here if using the same 
drive? but I'm not sure. 

- Generally you have to look at the security exploits, i.e. it may be worth 
reading the research and articles The Qubes OS Project has made, and other 
works that is being put forward. But in general, you need to be wary of 
firmware exploits, boot-loader exploits, never access your files from an 
insecure duaƦ-boot, and weak or no encryption. Something along those lines. 
Generally firmware exploits/attacks, to my understanding, are more exotic 
today, BUT! that may change one day very quickly, and you can also risk being 
plain unlucky. There is also the consideration that it might not be possible to 
make an accurate picture of how many infected firmware's there are existing in 
the wilds, and/if possible to make research to get an idea, it might take years 
before it's detected on a large scale. So you may want to be wary of firmware 
attacks, they may some day be a threat quicker than you think, i.e. think for 
example A.I.'s that can automatically modify themselves to exploit different 
kinds of firmwares, rather than requiring a human hand to do so (intensive 
labor). 

- Use a strong password, so that your CPU's own calculation power is 
insufficient to be used to crack your encryptions. 

- Never leave anything unencrypted. While you can't protect your firmwares, at 
least you can protect all drives with encryption, except, for the bootloader, 
which is a very big weak spot. If you want to protect yourself here, (except 
you are still vulnurable to firmware attacks), then you need to move your 
boot-loader to a locked medium, preferably one that can't be editied, i.e. a 
CD/DVD. You can leave that CD/DVD in your system though, since what matters is 
that it can't be edited, it's not the fact that it can be read. 

- Also you may want to consider at least 8GB RAM. Even 8gigs can feel limited, 
4gigs will probably feel like a crap experience on Qubes. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e9907a90-3c4a-4549-85a1-14b1dcbb0436%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to