mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-01-24 21:46:55 -05:00
Update information about recording optical discs
This commit is contained in:
parent
bc592c7a99
commit
9e2e0404d2
@ -57,16 +57,18 @@ Cons:
|
|||||||
|
|
||||||
* Fixed capacity. (If the size of the ISO is larger than your disc, it will be
|
* Fixed capacity. (If the size of the ISO is larger than your disc, it will be
|
||||||
inconvenient.)
|
inconvenient.)
|
||||||
* Passthrough burning is not supported by Xen. (This mainly applies if you're
|
* Passthrough recording (a.k.a., "burning") is not supported by Xen. (This
|
||||||
upgrading from a previous version of Qubes.) Currently, the only options for
|
mainly applies if you're upgrading from a previous version of Qubes.)
|
||||||
burning optical discs in Qubes are:
|
Currently, the only options for recording optical discs (e.g., CDs, DVDs,
|
||||||
|
BRDs) in Qubes are:
|
||||||
1. Use a USB optical drive.
|
1. Use a USB optical drive.
|
||||||
2. Attach a SATA optical drive to a secondary SATA controller, then assign
|
2. Attach a SATA optical drive to a secondary SATA controller, then assign
|
||||||
this secondary SATA controller to an AppVM.
|
this secondary SATA controller to an AppVM.
|
||||||
3. Use a SATA optical drive attached to dom0.
|
3. Use a SATA optical drive attached to dom0.
|
||||||
(Option 3 violates the Qubes security model since it entails transferring
|
|
||||||
an untrusted ISO to dom0 in order to burn it to disc, which leaves only
|
(Option 3 violates the Qubes security model since it entails transferring an
|
||||||
the other two options.)
|
untrusted ISO to dom0 in order to burn it to disc, which leaves only the
|
||||||
|
other two options.)
|
||||||
|
|
||||||
[verify]: https://www.qubes-os.org/doc/VerifyingSignatures/
|
[verify]: https://www.qubes-os.org/doc/VerifyingSignatures/
|
||||||
[trusting-trust]: http://www.acm.org/classics/sep95/
|
[trusting-trust]: http://www.acm.org/classics/sep95/
|
||||||
|
Loading…
Reference in New Issue
Block a user