-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
On 2017-01-30 14:53,
aperi....@gmail.com wrote:
>
> Hello,
>
> Hopefully I did not overlook it if this has been proposed already.
> This is a suggestion to hypothetically help making Qubes more
> secure and increasing user-friendliness by making good use of users
> over decade long hard embodied habits. Furthermore additionally
> reducing the amount of mouse clicking overhead.
>
> The idea is to allow for a way to tie together shutdown of a
> specific app with the shutdown of the entire AppVM it is located
> in. Potential uses may be for users who wish to allocate an AppVM
> for a single app, which may help in numerous of different or
> multiple reasons, such as:
>
> - It reduces the attack surface inside the VM by naturally helping
> the VM run in less overall time. As Qubes remains mostly protected,
> but the contents of the VM itself remains vulnerable while actively
> running, just like any other Linux operating system. - More
> frequent natural habit induced reloads of the VM would lead to an
> automatic reload of the "read-only" system operation files, making
> better use of Qubes strength to clean system files from any
> attacks. - It helps freeing up computer resources, such as RAM,
> especially on laptops, cheap or old computers, so forth. -
> Aesthetically it helps making the Qubes VM Manager look more clean,
> sleek, less bloated, when non-active VM's are not running. -
> Probably some use-cases I didn't manage to think of.
>
>
> 1. It makes it easier to stay secure for those who already
> remembers to shutdown an AppVM after use (less clicking /
> management to do). 2. It improves the security and/or
> system-resources for those who knows but forget to shutdown an
> AppVM after use. 3. It also has an additional potential for making
This is pretty similar to this issue:
https://github.com/QubesOS/qubes-issues/issues/832
As you can see, there's been a long discussion about this issue, which
you might find interesting.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-----BEGIN PGP SIGNATURE-----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=MCpZ
-----END PGP SIGNATURE-----