zlacker

Qubes OS 4.0 has been released

submitted by andrew+(OP) on 2018-03-28 17:37:51 | 143 points 39 comments
[view article] [source] [go to bottom]

NOTE: showing posts with links only show all posts
◧◩
4. mseri+QN[view] [source] [discussion] 2018-03-28 23:20:00
>>crafty+AF
With 8Gb of RAM I have been happily using Qubes 4 in my work workstation since rc2. I suggest to use the mirage firewall image [1] to save aound a Gb of RAM

The fedora 27 images can easily reach 5Gb of use under heavy load, but in gneneral I have pretty good performances and I usually have a couple of throwaway VMs and the main work VM running and dealing with web, co pilations of various sort and editing.

[1]: https://github.com/talex5/qubes-mirage-firewall

17. xvilka+351[view] [source] 2018-03-29 02:21:50
>>andrew+(OP)
I wonder if there was any progress on integrating with ReactOS[1].

[1] https://github.com/QubesOS/qubes-issues/issues/2809

◧◩
21. ttul+fd1[view] [source] [discussion] 2018-03-29 04:47:57
>>gigama+471
https://en.wikipedia.org/wiki/Epson_HX-20
◧◩
26. gbtw+Fh1[view] [source] [discussion] 2018-03-29 06:01:45
>>codetr+0S
I had the bug with the disk encryption screen on my xp13 as well. Removing the splash screen and just having a terminal helped it boot normaly. Something along the lines of this: https://askubuntu.com/questions/854388/ubuntu-16-04-cannot-e...
◧◩
29. xf86al+Uq1[view] [source] [discussion] 2018-03-29 08:18:09
>>ManlyB+hl1
Here's a link to Qubes' security tracker with the updated details about it: https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qs...
◧◩
32. gigama+tJ1[view] [source] [discussion] 2018-03-29 12:53:08
>>gigama+471
Snowden: "I’ll just namecheck Qubes here, just because it’s interesting. I’m really excited about Qubes because the idea of VM-separating machines, requiring expensive, costly sandbox escapes to get persistence on a machine, is a big step up in terms of burdening the attacker with greater resource and sophistication requirements for maintaining a compromise. I’d love to see them continue this project. I’d love to see them make it more accessible and much more secure. [You can read more about how to use Qubes here and here.]

Something that we haven’t seen that we need to see is a greater hardening of the overall kernels of every operating system through things like grsecurity [a set of patches to improve Linux security], but unfortunately there’s a big usability gap between the capabilities that are out there, that are possible, and what is attainable for the average user."

https://theintercept.com/2015/11/12/edward-snowden-explains-...

[go to top]