[email protected]:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Restarting this thread from the Github issue.
I too am a fan of the KVM approach.
I strongly support applying for the Open Tech Fund. The next deadline is
November 1st, 2018. Personally, I think this is an incredibly high priority
project. It is near impossible to keep systems secure without running Qubes
OS, yet there is no secure platform you can yet run it on. TalosII, on the
open Power Architecture, is the answer to this, as it is the only system with
open and auditable schematics and firmware. Currently, we have to choose
between running Qubes on backdoored systems, or running open systems with
operating systems that can be taken down by a single vulnerability in the
browser.
I am more than glad to help start writing this. Does anyone have previous
experience with this?
The thread I linked in
https://github.com/QubesOS/qubes-issues/issues/4318
(https://groups.google.com/d/msg/qubes-devel/IFLyyCUbLmQ/_HtgOJK4AQAJ)
has Marek also mention KVM. No experience here, but adding the missing
pieces to KVM seemed the hardest step. I'd like to see Qubes running on
an open architecture as well, and am willing to help.
--
You received this message because you are subscribed to the Google Groups
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit
https://groups.google.com/d/msgid/qubes-devel/f58ecb3b-e597-35c5-add4-356e35a4f231%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.