On Tuesday, November 22, 2016 at 8:57:56 PM UTC+2, kev27 wrote:
> I saw this being retweeted by the Qubes account on Twitter. Can Grsec support
> still land in Qubes 4.0, or should we expect it for 4.1 or 4.2, etc?
>
> I think if Grsec would be enabled by default in Qub
I saw this being retweeted by the Qubes account on Twitter. Can Grsec support
still land in Qubes 4.0, or should we expect it for 4.1 or 4.2, etc?
I think if Grsec would be enabled by default in Qubes, it would be no question
that Qubes is the most secure operating system out there.
--
You
On Saturday, May 14, 2016 at 1:48:37 PM UTC+3, Danny Eagle wrote:
> Full error message:
> [5578494253.737246] NMI watchdog: BUG: soft lockup - CPU#2 stuck for 22s!
> [NetworkManager: 1057]
>
> After choosing "Install Qubes" option this message pops up.
> I'm installing it on desktop not laptop.
On Saturday, November 12, 2016 at 5:21:18 AM UTC+2, Sec Tester wrote:
> So Im still new to Qubes, but after going through a bit of a learning curve,
> building & customizing VM's to suit my security needs, I have a few thoughts
> on its security.
>
> Firstly I really love the direction Qubes
I know Joanna has long talked about how insecure X11 is and how the Qubes team
worked to isolate the GUI. Wouldn't it be simpler if Qubes became Wayland-only
sooner?
It seems Fedora 25 will enable Wayland by default [1], but I think it will
still have a XWayland layer for app compatibility.
On Saturday, August 20, 2016 at 6:05:39 PM UTC+3, J. Eppler wrote:
> Hello,
>
> till now the argument of Qubes OS was that there are no laptops with AMD
> CPU's or APU's which Qubes OS can run on.
>
> Qubes OS primary focus is on laptops and than on workstations.
>
> Qubes OS uses Xen to
On Friday, August 19, 2016 at 10:44:53 PM UTC+3, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-08-19 11:58, kev27 wrote:
> >> Secure Encrypted Virtualization (SEV) integrates main memory encryption
> >> capabi
> Secure Encrypted Virtualization (SEV) integrates main memory encryption
> capabilities with the existing AMD-V virtualization architecture to support
> encrypted virtual machines. Encrypting virtual machines can help protect them
> not only from physical threats but also from other virtual