Re: [qubes-devel] GSoC Student Introduction 2017

2017-03-26 Thread Jean-Philippe Ouellet
I didn't have time to write a short email... so I wrote a long one ;) I think it is important to keep in mind the value we are adding to Qubes by implementing a log subsystem: 1. integrity guarantee by immediate sending to and storage in separate VM - inability to modify previous logs - inabi

Re: [qubes-devel] GSoC Student Introduction 2017

2017-03-26 Thread Alisa Matsak
Hi! It's me again! I tried to take account of all your recent comments. So, here's what I'm thinking about the project acccording to them. > Not all the VMs are running Fedora, there are also Debian-based and some > people use also Arch. Not to mention also Windows, but I think we can > not care

Re: [qubes-devel] GSoC Anti Evil Maid improvement project

2017-03-26 Thread Patrik Hagara
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Sun, Mar 26, 2017 at 6:21 PM, Rusty Bird wrote: > When the attacker is infecting the user's computer, they could add some > code to copy the sealed encrypted keyfile into the nooks and crannies > (firmware, reserved disk sectors, ...) of that com

Re: [qubes-devel] GSoC Anti Evil Maid improvement project

2017-03-26 Thread Rusty Bird
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Patrik Hagara: > I'm thinking about applying to the GSoC program and working on > the Anti Evil Maid shoulder surfing and video surveillance > resistance project idea. Awesome! > However, I've got a question regarding the proposed > solution which

[qubes-devel] GSoC Anti Evil Maid improvement project

2017-03-26 Thread Patrik Hagara
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi! I'm thinking about applying to the GSoC program and working on the Anti Evil Maid shoulder surfing and video surveillance resistance project idea. However, I've got a question regarding the proposed solution which requires implementing both TOT