CPU vulnerability mitigations would typically be distributed with the intel-microcode
package for Intel processors on Debian-based distributions, for example.
CPU vulnerability mitigations would typically be distributed with the intel-microcode
package for Intel processors on Debian-based distributions, for example.
And QubesOS isnt based on linux kernel. It uses Xen. Linux is used in the Qubes aka VMs.
The dom0 is very much running a Linux kernel, the same way your domU:s are typically running Linux kernels (although you could probably run any kernel in hvm mode).
As an example, here is the documentation on how to manage updates for the dom0 kernel:
https://www.qubes-os.org/doc/how-to-install-software-in-dom0/#kernel-upgrade
Obligatory XKCD reference: https://xkcd.com/927/
Hadn’t heard about deSec until now, seems to be run by some cool privacy minded folks in Germany:
I guess you already know about the options, but for others:
Find the cheapest VPS out there and have a Wireguard tunnel between it and your home network. Run ddclient or similar on the VPS in case the public IP changes.
They went crying about WPEngine having found a good business model around Wordpress support, and started sabotaging for them.
https://www.theverge.com/2024/10/2/24260158/automattic-demand-wp-engine-revenue-wordpress-battle
Looks like they lost in court a few days ago!
https://www.theverge.com/2024/12/10/24318350/automattic-restore-wp-engine-access-wordpress
In one episode of Kleo, the assassin used home-made TTX in powder form (gathered from a pufferfish) to neutralise a target and claimed they would be feeling pain during the entire time. Made me wonder as well, considering the nervous system gets shutdown I would assume the ability to feel pain also went away?
For the same price and power usage as the Pi?
Security. The more popular a piece of software gets (including operating systems), it becomes a bigger attack surface for malicious actors to use.
Fundamentally, Windows security is not really that much of a swiss cheese people usually say it is. It’s just that more people (researchers and malicious actors alike) are actively looking for vulnerabilities in it.