On 07/11/2016 05:24 PM, Duncan Guthrie wrote:
> On 11/07/16 15:14, neilhard...@gmail.com wrote:
>> Is it possible that someone who compromised QUBES, could re-write
>> the AppVM in a way that whenever it is loaded up, it re-infects the
>> entire system all over again...?
>
>
> If someone
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 11/07/16 15:14, neilhard...@gmail.com wrote:
> Is it possible that someone who compromised QUBES, could re-write
> the AppVM in a way that whenever it is loaded up, it re-infects
> the entire system all over again...?
>
> In that case, the only
Is it possible that someone who compromised QUBES, could re-write the AppVM in
a way that whenever it is loaded up, it re-infects the entire system all over
again...?
In that case, the only safe thing would be to manually back up the files within
the AppVM with some sort of Fedora backup tool.
I have a question about the security of backing up QUBES.
I see that the VM backup procedure lets you back up both template VMs and App
VMs, as well as dom0.
The question is... let's say that we find out about another Xen escape, like
the one from October 2015.
At this point, surely we now