From a1e5c64c4925a7fe2a6d524f0f2bf9d7bbe3577e Mon Sep 17 00:00:00 2001 From: m <3440586+maiska@users.noreply.github.com> Date: Sat, 6 Jul 2024 02:37:44 +0200 Subject: [PATCH] better conv for rst --- user/security-in-qubes/data-leaks.md | 1 + 1 file changed, 1 insertion(+) diff --git a/user/security-in-qubes/data-leaks.md b/user/security-in-qubes/data-leaks.md index 51c81201..82b736e7 100644 --- a/user/security-in-qubes/data-leaks.md +++ b/user/security-in-qubes/data-leaks.md @@ -48,6 +48,7 @@ Such attacks have been described in the academic literature, but it is doubtful 3. **Unintentional leaks.** Non-malicious software which is either buggy or doesn't maintain the privacy of user data, whether by design or accident. For example, software which automatically sends error reports to a remote server, where these reports contain details about the system which the user did not want to share. + Both Qubes firewall and an empty NetVM (i.e., setting the NetVM of an app qube to "none") can fully protect against leaks of type 3. However, neither Qubes firewall nor an empty NetVM are guaranteed to protect against leaks of types 1 and 2. There are few effective, practical policy measures available to end-users today to stop the leaks of type 1.