Has there been any progress with this? Researchers managed to bypass the
encryption, but afaik this is fixed with SEV-ES(Secure Encrypted
Virtualization-Encrypted State).
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Fri, Aug 19, 2016 at 11:58:18AM -0700, kev27 wrote:
> > Secure Encrypted Virtualization (SEV) integrates main memory encryption
> > capabilities with the existing AMD-V virtualization architecture to support
> > encrypted virtual machines.
On Saturday, August 20, 2016 at 6:05:39 PM UTC+3, J. Eppler wrote:
> Hello,
>
> till now the argument of Qubes OS was that there are no laptops with AMD
> CPU's or APU's which Qubes OS can run on.
>
> Qubes OS primary focus is on laptops and than on workstations.
>
> Qubes OS uses Xen to
Hello,
till now the argument of Qubes OS was that there are no laptops with AMD CPU's
or APU's which Qubes OS can run on.
Qubes OS primary focus is on laptops and than on workstations.
Qubes OS uses Xen to isolate "qubes" (vms) from each other. Xen can run on AMD,
Intel, ARM and other
On Friday, August 19, 2016 at 10:44:53 PM UTC+3, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-08-19 11:58, kev27 wrote:
> >> Secure Encrypted Virtualization (SEV) integrates main memory encryption
> >> capabilities with the existing AMD-V
> Secure Encrypted Virtualization (SEV) integrates main memory encryption
> capabilities with the existing AMD-V virtualization architecture to support
> encrypted virtual machines. Encrypting virtual machines can help protect them
> not only from physical threats but also from other virtual