From d785f9f298b7fffe2203eea73d942dc728a8d6ff Mon Sep 17 00:00:00 2001 From: Joanna Rutkowska Date: Sun, 27 Apr 2014 12:56:15 +0000 Subject: [PATCH] QubesArchitecture changed Use local copy of the image instead refering over http:// (preparing for a real CA cert :) --- QubesArchitecture.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/QubesArchitecture.md b/QubesArchitecture.md index 8c391863..6a0b4f50 100644 --- a/QubesArchitecture.md +++ b/QubesArchitecture.md @@ -11,7 +11,7 @@ Qubes implements a Security by Isolation approach. To do this, Qubes utilizes vi Qubes lets the user define many security domains, which are implemented as lightweight Virtual Machines (VMs), or “AppVMs.” For example, the user can have “personal,” “work,” “shopping,” “bank,” and “random” AppVMs and can use the applications within those VMs just as if they were executing on the local machine. At the same time, however, these applications are well isolated from each other. Qubes also supports secure copy-and-paste and file sharing between the AppVMs, of course. -[![](http://files.qubes-os.org/Architecture_files/droppedImage.png "http://files.qubes-os.org/Architecture_files/droppedImage.png")](http://files.qubes-os.org/Architecture_files/droppedImage.png) +[![No image "qubes-arch-diagram-1.png" attached to QubesArchitecture](/chrome/common/attachment.png "No image "qubes-arch-diagram-1.png" attached to QubesArchitecture")](/attachment/wiki/QubesArchitecture/qubes-arch-diagram-1.png) (Note: In the diagram above, "Storage domain" is actually a USB domain.)