And if there is some kind of exploaitaion so the secure system should not been
build on the same topology as its qubes bcs of chain exploits.So this system
under security measures dont have any value ... bcs its build on the same linux
topology ... someone brake 1 pcs brake on chain logic whole environment.
better way for secure environment is mix topology than duplicate or clone them.
You received this message because you are subscribed to the Google Groups
To unsubscribe from this group and stop receiving emails from it, send an email
To post to this group, send email to email@example.com.
To view this discussion on the web visit
For more options, visit https://groups.google.com/d/optout.