-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Thu, Jul 28, 2016 at 03:05:59PM -0700, neilhard...@gmail.com wrote:
> Based on 2 Xen exploits in just the last 1 year, QUBES 4.0 is moving over to
> using SLAT / EPT for memory isolation, and to using HVM/PVH rather than PV.
>
> Certainly, in
Based on 2 Xen exploits in just the last 1 year, QUBES 4.0 is moving over to
using SLAT / EPT for memory isolation, and to using HVM/PVH rather than PV.
Certainly, in the last 2 Xen exploits, it has only affected PV and not HVM.
However, is it possible that using Intel's EPT is even riskier..?