mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-07-29 09:39:09 -04:00
added sublists for better rst conversion formatting
This commit is contained in:
parent
da85dd62d4
commit
89f81ecf82
1 changed files with 3 additions and 3 deletions
|
@ -122,7 +122,7 @@ We recommend consulting these resources when selecting hardware for Qubes OS:
|
|||
2. The user's OEM, ODM, or MB to provide a suitable BIOS or (U)EFI update for
|
||||
the user's system.
|
||||
|
||||
Historically, AMD has often been slow to complete step (1), at least for its
|
||||
- Historically, AMD has often been slow to complete step (1), at least for its
|
||||
client (as opposed to server) platforms. In some cases, AMD has made fixes
|
||||
available for its server platforms very shortly after a security embargo was
|
||||
lifted, but it did not make fixes available for client platforms facing the
|
||||
|
@ -132,10 +132,10 @@ We recommend consulting these resources when selecting hardware for Qubes OS:
|
|||
new CPU vulnerabilities across its supported platforms very shortly after
|
||||
security embargoes have been lifted.
|
||||
|
||||
Step (2) varies by vendor. Many vendors fail to complete step (2) at all,
|
||||
- Step (2) varies by vendor. Many vendors fail to complete step (2) at all,
|
||||
while some others take a very long time to complete it.
|
||||
|
||||
The bottom line is that Qubes OS **can** run on AMD systems, and the Qubes and
|
||||
- The bottom line is that Qubes OS **can** run on AMD systems, and the Qubes and
|
||||
Xen security teams do their best to provide security support for AMD systems.
|
||||
However, without the ability to ship microcode updates, there is only so much
|
||||
they can do.
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue