As always fantastic article and work by your team.
One point about the RDP security concerns... You could have (if 2 zones and 4 VM in each):
2x4x AppVM --> 2x4x CouldGUI+RDPd --------> 2x4x RDPc+DesktopGUI --> 1 QubesGUI
--> local fast secure UI
---------------> compressed stream (RDP or other)
You could possible have 2x RDPc+DesktopGUI (one per zone if this is your security/performance model).
One point about Application as a service: I agree about browser isolation not being able to secure users (and certainly not able to manage privacy).
Let's just ignore user isolation in Office265 ;-)
Looking forward to what will come out. Devil is in the details.
Joanna Rutkowska has just published a new article titled "Qubes Air:
Generalizing the Qubes Architecture." The article is available both on
Joanna's blog:
https://blog.invisiblethings.org/2018/01/22/qubes-air.html
And on the Qubes website:
https://www.qubes-os.org/news/2018/01/22/qubes-air/
* Raspberry Pi, beagleboard, USB armory, etc are very low-powered devices (in both CPU & RAM). So running Qubes software on them at a productive speed will be a challenge.
* You're saying that laptop hardware specs are a problem for users. But remember we had the problem of wireless modules still broadcasting after being turned "off". So we needed laptops with wireless hardware switches to be more certain that we couldn't be hacked. But now you are asking us to again trust ordinary laptops and tablets that may not have hardware switches.
* In reality, you are also changing from "deployment and virtualization" as a single point of failure to "wireless" as the single point of failure. For example, WPA2 has been declared insecure (hackable), with WPA3 being necessary as a replacement. But, amazingly, WPA2 is still being "patched" by manufacturers who think it's still acceptable - so how long will it take for WPA3 to become ubiquitous?
Perfectly fine as a USB decryptionVM or as a Split PGP with the benefit of not have your keys in CPU cache.
>
> * You're saying that laptop hardware specs are a problem for users. But remember we had the problem of wireless modules still broadcasting after being turned "off". So we needed laptops with wireless hardware switches to be more certain that we couldn't be hacked. But now you are asking us to again trust ordinary laptops and tablets that may not have hardware switches.
>
> * In reality, you are also changing from "deployment and virtualization" as a single point of failure to "wireless" as the single point of failure. For example, WPA2 has been declared insecure (hackable), with WPA3 being necessary as a replacement. But, amazingly, WPA2 is still being "patched" by manufacturers who think it's still acceptable - so how long will it take for WPA3 to become ubiquitous?
On the Raspberry side, wireless is a no go. Secure wired connection will be required (to mitigate L2 and below attacks).
On the laptop side, sys-net will mitigate L2 and lower attacks. so your GUI connect to your QubesAIR by connecting to sys-firewall... nothing is changing (with the assumption that the protocol for remoting between Qubes is secure).