[email protected]:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Restarting this thread from the Github issue.

I too am a fan of the KVM approach.

I strongly support applying for the Open Tech Fund.  The next deadline is 
November 1st, 2018.  Personally, I think this is an incredibly high priority 
project.  It is near impossible to keep systems secure without running Qubes 
OS, yet there is no secure platform you can yet run it on.  TalosII, on the 
open Power Architecture, is the answer to this, as it is the only system with 
open and auditable schematics and firmware.  Currently, we have to choose 
between running Qubes on backdoored systems, or running open systems with 
operating systems that can be taken down by a single vulnerability in the 
browser.

I am more than glad to help start writing this.  Does anyone have previous 
experience with this?

The thread I linked in https://github.com/QubesOS/qubes-issues/issues/4318 (https://groups.google.com/d/msg/qubes-devel/IFLyyCUbLmQ/_HtgOJK4AQAJ) has Marek also mention KVM. No experience here, but adding the missing pieces to KVM seemed the hardest step. I'd like to see Qubes running on an open architecture as well, and am willing to help.

--
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/f58ecb3b-e597-35c5-add4-356e35a4f231%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.

Reply via email to