https://www.qubes-os.org/news/2016/07/21/new-hw-certification-for-q4/
However, I noticed a few people voicing privacy concerns regarding the switch from paravirtualization to hardware-enforced memory virtualization.
Here's one such comment, taken from an r/privacy Reddit thread.
"Qubes v.4 does concern me though. I am NOT an expert here so I dont want to spread bad info but: Qubes 4 plans to ditch paravirtualization in favor of hardware-enforced memory virtualization (which I will call HEMV though I dont think it has an official acronym). This is good from a security standpoint- paravirtualization is vulnerable to code exploits (2 have happened to Xen, though never in the wild, KVM/Virtualbox/VMware have all had exploits), while HEMV is not. However, HEMV makes the profiling of hardware easier to accomplish. Given the recent spat of articles that talk about hardware profiling being used as a means to profile and track users, you can understand the basis for my concern- paravirtualization makes hardware profiling impossible unless an exploit is found to defeat it."
Does this hold any water? Does the switch from paravirtualization to HVM/SLAT degrade privacy by allowing easier hardware fingerprinting?
Sorry if this question has been asked and answered before; I searched around for a while, and found none. Also, feel free to correct me on anything I got wrong. Thanks! :)
Would you be able to point me in the direction of any unique privacy-specific functions Qubes OS allows me to take advantage of (other than obvious stuff like Whonix)? Is there anything of that sort?
Thanks again!
On 11/19/2017 07:17 PM, rigged...@gmail.com wrote:
Does this hold any water? Does the switch from paravirtualization to HVM/SLAT degrade privacy by allowing easier hardware fingerprinting?
On 11/20/2017 06:08 PM, Jean-Philippe Ouellet wrote:
On Mon, Nov 20, 2017 at 5:59 PM, Tai...@gmx.com <Tai...@gmx.com> wrote:On 11/19/2017 07:17 PM, rigged...@gmail.com wrote: Does this hold any water? Does the switch from paravirtualization to HVM/SLAT degrade privacy by allowing easier hardware fingerprinting? It holds no water. There is no such thing as "hardware fingerprinting"Then what do you call checking e.g. clock drift, disk bandwidth, etc.?
On 11/20/2017 06:10 PM, Jean-Philippe Ouellet wrote:
On Mon, Nov 20, 2017 at 6:04 PM, Tai...@gmx.com <Tai...@gmx.com> wrote:On 11/20/2017 04:36 AM, Jean-Philippe Ouellet wrote:That statement is demonstrably false. For example, we don't filter CPUID vendor IDs in either mode.How come?See discussion at https://github.com/QubesOS/qubes-issues/issues/1142