-
-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Additions and changes #52
Comments
On 1-2 good points, those should be clarified
Qubes is good for those who want to use virtualization to isolate and compartmentalize. secureblue is good for those who want to use desktop linux, but with known security holes filled and proactive exploit mitigations in place.
This misses the point of Qubes. Qubes doesn't make things more secure simply by running everything in one VM. The point is to use several VMs and isolate things from each other A better comparison would be: is using secureblue in a qube a more secure option than using Fedora in a qube. |
For the recommended hardware list, it may also be a good idea to list which FIDO2 hardware security keys are recommended for |
Recommended Hardware
section should be added to the website. The hardware there should be ones that pass GNOME'sDevice Security
checks. Here are some resources from other projects:https://www.qubes-os.org/doc/certified-hardware/
https://forum.qubes-os.org/t/community-recommended-computers/
https://www.qubes-os.org/hcl/
https://libreboot.org/docs/install/#which-systems-are-supported-by-libreboot
ujust flatpak-permissions-lockdown
, but that command isn't listed as an option in the post install instructions. There is a mention at the end to read the FAQ, but that's not given with high priority.The text was updated successfully, but these errors were encountered: