Introducing Qubes Admin API:
Previously: Golem Foundation/Wildland, Qubes OS, hardware/virtualization/OS security research.
Previously: Golem Foundation/Wildland, Qubes OS, hardware/virtualization/OS security research.
Introducing Qubes Admin API:
1. Details by the original discoverer: https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf
2. Independent rediscovery: https://t.co/l0rDyFlb0N
TLDR: trivial auth bug in the AMT web server...
What consequences should face those, who build web servers into our CPUs?
Remember Intel's been keen on mocking OSS for its lack of security & liability. Here's a fragment from the 2014 book by Intel ME architect:
New post: "Compromise recovery on Qubes OS":
https://www.qubes-os.org/news/2017/04/26/qubes-compromise-recovery/
Because fuckups happen... and it's good to have a reasonable Plan B.
I really like draw.io, a free Visio alternative, which also works fine in *offline* mode as a Chrome app (I tested it in offline VM).
But it would be even cooler if there was an easy way to package Chrome Apps as RPM or DEB, as then it could be easily installed in a template VM for use in many different AppVMs. Anyone knows how to do that?
(The diagram below is for an upcoming post on Qubes Compromises Recovery, BTW)