-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- From a security perspective, I think you're right. sys-usb and sys-net
(in some cases, they may be combined) should be assumed to be
compromised, which means that we should assume that an attacker could
be using sys-usb to do anything (including play music files). If we're
already assuming that an attacker could be doing this, why shouldn't
you (the actual owner of the system) not do it yourself, if you want to?
- From a practical perspective, your performance may not be very good if
memory balancing is disabled and a low amount of memory is assigned to
the VM, so you may want to adjust this. (You wouldn't adjust this to
benefit an attacker, though, so the analogy may start to break down
here.)
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-----BEGIN PGP SIGNATURE-----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=vWLK
-----END PGP SIGNATURE-----