On 2017-03-28 at 08:33 -0400, 'Blacklight447' via qubes-devel wrote:
> The basic idea was that you have to provide a password to decrypt the
> vms data, so you can boot and use it, allowing you to be sure only you
> can access its data. This could even be potentially combined with an
> option to export the encrypted vm, to later boot it in a clean version
> of qubes os. 
> 
> Im not looking for just a password prompt, since those do not provide
> any real security, unless your threat model is preventing someone to
> access your vm"s when you forgot to shutdown or lock your machine. 
> 
You can use a HVM with LUKS disk. The password will be asked on boot,
just as when booting a physical OS with an encrypted disk.

However, being a HVM there will be less integration with other qubes
(maybe the support tools can be installed -and work- on HVM, too?).

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-devel@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/1490745879.925.22.camel%4016bits.net.
For more options, visit https://groups.google.com/d/optout.

Reply via email to