Hi Joe,

I'm interested!  Maybe you could publish them on a public git repository
(e.g. github).

Kind regards,
Andrew


On 8 June 2017 at 15:24, Joe <j...@celo.io> wrote:

> On 03/29/2017 02:04 AM, Ángel wrote:
>
>> On 2017-03-28 at 08:33 -0400, 'Blacklight447' via qubes-devel wrote:
>>
>>> The basic idea was that you have to provide a password to decrypt the
>>> vms data, so you can boot and use it, allowing you to be sure only you
>>> can access its data. This could even be potentially combined with an
>>> option to export the encrypted vm, to later boot it in a clean version
>>> of qubes os.
>>>
>>> Im not looking for just a password prompt, since those do not provide
>>> any real security, unless your threat model is preventing someone to
>>> access your vm"s when you forgot to shutdown or lock your machine.
>>>
>>> You can use a HVM with LUKS disk. The password will be asked on boot,
>> just as when booting a physical OS with an encrypted disk.
>>
>> However, being a HVM there will be less integration with other qubes
>> (maybe the support tools can be installed -and work- on HVM, too?).
>>
>>
> I posted some scripts to this list on 15th of December 2015 with the
> subject "Individually encrypting domains" that implements groups of
> encrypted VMs (you can have groups of one if you so wish, of course).
>
> I still maintain these scripts privately, and have been using them for
> ~two years now without problems.
>
> I also have a Python ctypes oneline to call posix_fallocate() on root.img
> to get rid of the thin provisioning stuff using sparse files that upstream
> Qubes applies to make sure your data gets fucked up when you run out of
> disk space in dom0.
>
> (Works for the other .img, too, where a similar problem presents itself,
> of course, but I have disabled volatile.img in my setup because I consider
> the feature insane.)
>
> If someone wants a copy I'd be happy to share.
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-devel" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-devel+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-devel@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/ms
> gid/qubes-devel/9060248f-c11d-22ad-8074-4cf8097d18f6%40celo.io.
>
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-devel@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/CAAXZBWKHVCtQdtOTWYMa5W1QnJGjfN_TAsgjRaxrb10H-UGruw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to