On Saturday, January 19, 2019 at 4:06:31 PM UTC-5, thorsten...@gmail.com wrote:
> And that's exactly what I want to make sure can not happen in Qubes. Even in 
> the worst case scenarios with HDD, filesystem, etc. it must not be possible 
> that data from VM1 ends up in VM2, even if it's just small junks. So I 
> thought if the VMs data were encrypted individually in the first place, it 
> wouldn't be a problem at all if any data blocks would end up in another VMs 
> hdd region since it wouldn't be able to read it (encrypted with different 
> key).

Agreed.

The counter argument really boils down to "well then you should have two 
air-gapped systems" and basically refutes the entire point of Qubes to begin 
with, which is hardware-enforced compartmentalization. Inserting a separation 
layer of group-encrypted VMs/domains makes sense to me: it allows for better 
run-time compartmentalization for both system security and possibly physical 
security as well (depending on OPSEC).

brendan

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-devel@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/f769e45f-d792-4a89-87d2-9da91df5866a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to