Thank you! I have been reading the documentation and searched it quite a bit on duckduckgo, but I weren't successful so far, so thank you for this
Best regards, Blacklight447 -------- Original Message -------- On Mar 28, 2017, 12:28 PM, Andrew David Wong wrote: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 2017-03-28 03:25, 'Blacklight447' via qubes-devel wrote: > Hello qubes developers! > > I have a question about qubes vm's. Would it make sense to > implement a method for password protecting(and maybe even > encrypting it with that password) individual vm's? > > Correct me if I am wrong, but it seems that by doing so, vm's are > harder to access in case of a compromise. > > For example, if someone were to break out of the xen hypervisor and > gained access to dom 0, although this would be a fatal compromise, > having some specific vm's encrypted when turned off(like the vault > vm for example) should protect the content of those vm's since it's > content is encrypted. > > You could see it as full disk encryption, but only for specific > vms, and needing the encryption password the even boot the vm and > see its content. > > I think this could potentially a nice feature to have in a future > qubes release, what do you all think off this? All suggestions and > comments on this idea is welcome. > > P. S. I wasn't sure were to poste this question, since it seems to > be related to development to me, please point out where I should > ask this if I got this wrong :) > > Best regards, Blacklight447 > Per-VM encryption is currently being tracked here: https://github.com/QubesOS/qubes-issues/issues/1293 There are also prior discussions about this in the mailing list archives, which you may find interesting. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJY2jrZAAoJENtN07w5UDAwnz0P/iJNqS6XQsJIxKt6FzcqsPDJ e2CkPJaDUIb7pFyNB4wgXIkIvsHsVfV22Kja1DP2MEXX7GyE5UI5ncYSEr80ZN08 +T4Uc9fqEkknracdFZVk/mdKqJLsjOHqBTOIi/5KWpZCXKJLzWcwXUHX0/j/4f/i rOLTQ0CcCba07A82i4iLlJx/+hpiPMBnhixwlYvPnccRaLEGhxRWYr9JnyprmXpZ rRmUYae/UK2sTflqL6hbEiCGuBn7rNCsXFNGsrO9cSneD7kdwRO8eKxsYbTEhCOY Tm/VFvblN6VL5nRCgG0mlEeuQDpKIBlm0eS1AnIcOgoxDz1mqQ/tWm6dDrtOr+NL N5Csfbt4xynAJn+FQ/R8hvjPozeuHGckGAVsUuoik1shitVU5C8TedInqTSbMyA6 EwsreYysY3Y6d401ZXl+1pJaN0NXti0BeB8JYhzqB6CQTbAOpOoM9DE/2sYJGsxT MJZpeyBAU324tXig8C3hsugWxRqXMXKh90YgkeSJ+FbrH2KAmdmXsNR3i6E9m4m/ kjn6uUcc0IgYY2LJWLMckPqYhvv7YvdLxAo1gk/6CoY0PRal+htT28+oVHdC5fvv seR/D1MEJkdabZx1+Lf2fUKm7Z0ZsCqm85HTx4CL3mCUDsy1Bw235olTB1sdufRC /ADWCVRn82lq+/Ht1Yic =QBr5 -----END PGP SIGNATURE----- -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To post to this group, send email to qubes-devel@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-devel/K-veEsit-cnkSyBusc7J13wLYOY42XiYzad6vgPenklji8j0sPONm_NG-fwtkGEDap_Ro-g565tVV6W3PtvtN2DhFB2_mKGEvnr8I_23MZk%3D%40protonmail.com. For more options, visit https://groups.google.com/d/optout.