logoalt Hacker News

fsfloveryesterday at 7:08 PM4 repliesview on HN

It seems Qubes OS and Qubes-Whonix are not affected.


Replies

handednessyesterday at 11:14 PM

> It seems Qubes OS and Qubes-Whonix are not affected.

This is dangerously incomplete and bad advice.

Qubes OS does not work the way you seem to think it does.

Creating a new identity in the Tor Browser inside a disposable VM does not automatically stop that VM and start a new disposable VM. That initial disposable VM launches the new identity from the existing process and therefore remains vulnerable, the same as any bare metal computer running Tor Browser would.

Virtualization is not magic.

A Qubes OS user needs to spin up a new disposable Whonix VM to sidestep this attack. Creating a new identity alone is ineffective in this threat model.

If you care about these projects as much as you say you do, please stop giving harmful advice. You do it in various places on the Internet and in every thread which gives you half a chance to do so, and these projects would be better off if you either took any of the extensive well-reasoned correction many people offer you, or opted to stop making such claims. The former would be ideal, the latter still vastly preferable to the existing state of affairs.

hrimfaxiyesterday at 7:26 PM

How so? If you kept a disposable VM open and just created new identities in tor browser, how does Qubes mitigate the threat here?

show 2 replies
2ndorderthoughtyesterday at 7:53 PM

In the last ten years has qubes moved on to support more hardware? Every 4 years I would try to use it only to find it didn't support any of my hardware.

show 5 replies
ranger_dangeryesterday at 7:15 PM

Source?

show 1 reply