Replies: 1 comment 1 reply
-
|
This opens up some interesting possibilities, but I'd personally advocate prioritizing work on this below getting the Qubes->Dangerzone->Signal pipeline to be really solid, so this seems more a 2026-2027 thing to me. Sanitizing files and then passing them on is IMO the common case, while achieving further security benefits beyond Xen virtualization seems to be something that only a very small percentage of users are likely going to want to rely on. |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Why?
Part of the long-term vision of Qubes is to support remote machines as well a virtual ones. They call this "Qubes Air" in the original 2018 article introducing it. But while the Qubes team (and therefore, downstream projects like SecureDrop Workstation) are on top of Xen security patches, they are a non-negligible number, as Joanna Rutkowska highlighted:
We're still in early stages of Qubes Air, but it may become a practical possibility over the next few years, so we should consider what it offers, particularly, for the most untrusted operation -- opening documents. With it, a user would be able to view documents as they do today, but without the risks of hardware virtualization.
How?
The practical details are still up in the air (pun intended), here's a list of things we'd need:
Beta Was this translation helpful? Give feedback.
All reactions