Does restoring automatically verify integrity? Or are we suppose to run
an integrity check before restoring?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qube
'npdflr' via qubes-users:
Hi,
Full disk encryption is enabled by default in Qubes OS.
But what about BIOS, Bootloader and kernel (or kernels as different VMs would
have different kernels associated with them)
Coreboot (if used as a replacement for BIOS) does not have a password
verification f
'npdflr' via qubes-users:
Hi,
Full disk encryption is enabled by default in Qubes OS.
But what about BIOS, Bootloader and kernel (or kernels as different VMs would
have different kernels associated with them)
Coreboot (if used as a replacement for BIOS) does not have a password
verification f
On Tue, 18 Jun 2019, Dominique St-Pierre Boucher wrote:
> Good day Qubes user,
>
> Is qubes affected by CVE-2019-11477?
AppVMs depending on kernel (most likely yes).
But this attack is limited to DoS (triggering a BUG_ON assert that stops
the kernel) from the peers (+on-path attackers) you're
Good day Qubes user,
Is qubes affected by CVE-2019-11477?
Thanks
Dominique
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups
On 6/18/19 12:39 PM, cycle via qubes-users wrote:
> recently I logged in into dropbox with a browser from my qubes box and
> had to confirm my login. Afterwards I got a mail saying that there was
> an login attempt from:
>
> *Desktop-Client Linux 4.14.116-1.pvops.qubes.x86_64
>
> *How can I avoi
On Tue, 18 Jun 2019 04:44:04 +
ome...@firemail.cc wrote:
> Hey all,
>
> Over the last week I've noticed my laptops CPU keeps peaking @ 80-85
> every now and then, even when I'm not doing any resource intensive
> tasks.
>
> I run 11-12 VMs @ a time which barely scratches the 34GB RAM on a P
Hi,
Full disk encryption is enabled by default in Qubes OS.
But what about BIOS, Bootloader and kernel (or kernels as different VMs would
have different kernels associated with them)
Coreboot (if used as a replacement for BIOS) does not have a password
verification feature:
https://www.coreboo
Hi,
recently I logged in into dropbox with a browser from my qubes box and had to
confirm my login. Afterwards I got a mail saying that there was an login
attempt from:
Desktop-Client Linux 4.14.116-1.pvops.qubes.x86_64
How can I avoid that this information is send to servers? Is it part of th