How "quick" any of available super PCs (10,649,60 cores, 125,435. TFLOP/S ) can find the password (e.g 8-16 chars) encrypted with Qubes default settings cryptsetup?
How can we improve security to prevent this? Is it a good idea to install some 3th party software tat dom0 to make crypto container to store some VMs and mount it before VM start? Will Qubes Manager work fine if VMs will not be available at the boot time or some time after that, before user will not mount container? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20160620161234.42100D8507%40emkei.cz. For more options, visit https://groups.google.com/d/optout.