NET VM -------------------------------------- - - - WiFi device - - - - Ethernet device - - - - Tor ethernet hotspot script - - - -------------------------------------- - - - Ethernet crossover cable - - LAPTOP 2 - --------------------------------------- - - - - - - - Web browser, apps etc - - - - - - - - - ---------------------------------------
Question: Could a DMA attack on WiFi device or Ethernet device then take over the entire Net VM, modify my Tor script, and then do whatever, like, leak my real IP, pass all data to the hacker, etc? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c53c0456-5878-43d3-93cf-3fc692cd5ea8%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.