mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-11-29 07:56:50 -05:00
Add security information pertaining to DisposableVMs
This patch was prepared in collaboration with Simon Gaiser.
This commit is contained in:
parent
11d8a5e02e
commit
9586996f15
3 changed files with 45 additions and 5 deletions
|
|
@ -12,6 +12,15 @@ redirect_from:
|
|||
Disposable VM Customization
|
||||
============================
|
||||
|
||||
Security
|
||||
--------
|
||||
|
||||
If a DVM Template becomes compromised, then any DisposableVM based on that DVM Template could be compromised.
|
||||
Therefore, you should not make any risky customizations (e.g., installing untrusted browser plugins) in important DVM Templates.
|
||||
In particular, the *default* DVM Template is important becuase it is used by the "Open in DispVM" feature.
|
||||
This means that it will have access to everything that you open with this feature.
|
||||
For this reason, it is strongly recommended that you base the default DVM Template on a trusted TemplateVM and refrain from making any risky customizations to it.
|
||||
|
||||
Qubes 4.0
|
||||
----------
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue