How "quick" any of available super PCs (10,649,60 cores, 125,435. TFLOP/S )  
can find the password (e.g 8-16 chars) encrypted with Qubes default settings 
cryptsetup?

How can we improve security to prevent this? 
Is it a good idea to install some 3th party software tat dom0 to make crypto 
container to store some VMs and mount it before VM start?
Will Qubes Manager work fine if VMs will not be available at the boot time or 
some time after that, before user will not mount container?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160620161234.42100D8507%40emkei.cz.
For more options, visit https://groups.google.com/d/optout.

Reply via email to