From 1e6e3ecfa75dd0e17a8c041001de5cd94bd38fd3 Mon Sep 17 00:00:00 2001 From: Andrew David Wong Date: Mon, 3 Aug 2020 15:56:11 -0500 Subject: [PATCH] Update Qubes architecture diagram --- developer/system/architecture.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/developer/system/architecture.md b/developer/system/architecture.md index 5d02408e..56167f81 100644 --- a/developer/system/architecture.md +++ b/developer/system/architecture.md @@ -16,9 +16,8 @@ Qubes implements a Security by Isolation approach. To do this, Qubes utilizes vi Qubes lets the user define many security domains, which are implemented as lightweight Virtual Machines (VMs), or “AppVMs.” For example, the user can have “personal,” “work,” “shopping,” “bank,” and “random” AppVMs and can use the applications within those VMs just as if they were executing on the local machine. At the same time, however, these applications are well isolated from each other. Qubes also supports secure copy-and-paste and file sharing between the AppVMs, of course. -[![qubes-arch-diagram-1.png](/attachment/wiki/QubesArchitecture/qubes-arch-diagram-1.png)](/attachment/wiki/QubesArchitecture/qubes-arch-diagram-1.png) +[![qubes-schema-v2.png](/attachment/wiki/QubesArchitecture/qubes-schema-v2.png)](/attachment/wiki/QubesArchitecture/qubes-schema-v2.png) -(Note: In the diagram above, "Storage domain" is actually a USB domain.) Key Architecture features -------------------------