[qubes-devel] Qubes 4.0 development status update

2016-12-04 Thread Vít Šesták
I am interested about the implications of using HVMs. I know about the introduced need of some CPU features, some changes under-the-hood and potentiially better compatibility. But I am interested in some others: 1. What will change about performance and memory-usage characteristics? I believe

Re: [qubes-devel] Qubes vm.swappiness=0

2016-12-04 Thread Vít Šesták
My experience with swapiness (on non-Qubes): When having high swapiness, it uses swap more than actually needed, sligtly slowing the system down. OTOH, when having swapiness=0, it runs smoothly until RAM limit is reached. Then, it suddenly freezes for few minutes. Qubes doesn't look like

Re: [qubes-devel] Qubes 4.0 development status update

2016-12-04 Thread Manuel Amador (Rudd-O)
On 12/05/2016 02:50 AM, Marek Marczykowski-Górecki wrote: > > There are also still a couple of rough edges during installation/first > run. For > example "LVM thin" storage should be used, but currently it needs to be > selected manually (using custom partitioning option). And depending on > the

[qubes-devel] Qubes 4.0 development status update

2016-12-04 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, Most of the features of Qubes 4.0 are done, but there are few more things to do be fully useable. Below is (not so) quick summary. 0. (Mostly) rewrite of Qubes core management scripts. Over time, our codebase grew significantly, and the focus

[qubes-devel] Re: Announcement: Qubes OS Begins Commercialization and Community Funding Efforts

2016-12-04 Thread Patrick Bouldin
On Wednesday, November 30, 2016 at 6:56:11 PM UTC-5, Andrew David Wong wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > Dear Qubes Community, > > Since the initial launch [01] of Qubes OS back in April 2010, work on Qubes > has been funded in several different ways. Originally a

Re: [qubes-devel] Thoughts about persistent exploit in AppVM

2016-12-04 Thread Chris Laprise
On 12/04/2016 06:18 AM, hopefulf...@tuta.io wrote: 2. Dec 2016 00:17 by tas...@openmailbox.org : On 12/01/2016 06:00 PM, hopefulf...@tuta.io wrote: Hi Chris, I agree with you. It is strange to me that Qubes

Re: [qubes-devel] Re: Announcement: Qubes OS Begins Commercialization and Community Funding Efforts

2016-12-04 Thread Matteo
Il 02/12/2016 20:17, Kopimi Security ha scritto: > On Thursday, December 1, 2016 at 12:56:11 AM UTC+1, Andrew David Wong wrote: >> Unfortunately, the financial necessity of shifting our priorities to >> commercial >> clients will mean that we have less time to work on features that benefit the

Re: [qubes-devel] Thoughts about persistent exploit in AppVM

2016-12-04 Thread Chris Laprise
On 12/04/2016 08:23 AM, hopefulf...@tuta.io wrote: 2. Dec 2016 00:28 by tas...@openmailbox.org : On 12/01/2016 06:00 PM, hopefulf...@tuta.io wrote: IMO, restoring user and root users in the VMs won't help with

Re: [qubes-devel] Announcement: Qubes OS Begins Commercialization and Community Funding Efforts

2016-12-04 Thread Chris Laprise
On 12/04/2016 03:41 AM, Andrew David Wong wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-12-03 13:20, Chris Laprise wrote: On 12/03/2016 03:54 AM, Andrew David Wong wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-12-01 15:43, Chris Laprise wrote: On 12/01/2016

Re: [qubes-devel] Thoughts about persistent exploit in AppVM

2016-12-04 Thread hopefulfork
2. Dec 2016 00:28 by tas...@openmailbox.org: > On 12/01/2016 06:00 PM, > hopefulf...@tuta.io> wrote: >> IMO, restoring user and root users in the VMs won't help with preventing >> persistent exploits - only removing the persistent storage will (and taking >> measures to prevent code execution