Ah, I see. So, generally yes, but for completeness I think we should
distinguish between 3 scenarios:
1) Intentional leaks: so, malicious software trying to actively leak out
info, perhaps via cooperative covert channels established with another
malicious software on another VM (or on some server via networking, if
networking, even limited, is allowed for the VM).
2) Intentional sniffing, so a malicious software trying to use side
channels to e.g. actively guess some key material used in another VM by
some non-malicious software there (e.g. non-leak-proof GPG accidentally
leaking out bits of the private key by generating some timing patterns
when using this key for some crypto operation). Such attacks have been
described in the academic literature, although I personally _feel_ they
won't work in practice in a moderately busy general purpose system like
Qubes OS (where the attacker also has normally no way to trigger the
target crypto operation explicitly, as normally it is required for the
attacker to trigger lots of such operations).
3) Unintentional leaks made by non-malicious software (but one that
doesn't treat privacy too seriously, or is just buggy)
Qubes firewall (as well as networking-not-having of course) can prevent
#3 easily. Qubes firewall (neither networking-not-having) _cannot_
probably protect against #1 and #2. What, I think, can protect against
#1 and #2 is the user shutting down or pausing other VMs while
performing sensitive operations in the target VMs.
Ideally we could put this summary somewhere in the Wiki :)
joanna.