zlacker

[return to "QubesOS – A reasonably secure operating system"]
1. flashb+jc[view] [source] 2023-07-11 18:59:45
>>TheFre+(OP)
I really like QubesOS, but you cannot run VMs inside a qube, or other things that require VMs like Docker Desktop for Linux, because the xen hypervisor does not support nested virtualization.
◧◩
2. hiatus+Yh[view] [source] 2023-07-11 19:25:57
>>flashb+jc
A qube _is_ a VM though, no? So if you wanted to create a VM, you can create a QubesOS template and instantiate that?
◧◩◪
3. flashb+nj[view] [source] 2023-07-11 19:32:23
>>hiatus+Yh
Let me know how it works for you
◧◩◪◨
4. haswel+To[view] [source] 2023-07-11 19:59:00
>>flashb+nj
Not a Qubes user, just a curious reader; what is the issue with this? It sounds like you’re implying that what parent said isn’t practical. I’m curious why?
◧◩◪◨⬒
5. flashb+iq[view] [source] 2023-07-11 20:08:59
>>haswel+To
The issue with trying to hack Docker Desktop and similar tools to boot a qube instead of a VM and somehow hack QubesOS to not isolate those qubes from each other seems self-evident to me and I don't care to explain further.
◧◩◪◨⬒⬓
6. ThePow+ER1[view] [source] 2023-07-12 09:20:45
>>flashb+iq
Technically correct, but kind of a shitty answer, no?
[go to top]