Get Mystery Box with random crypto!

Qubes OS📢

Logo of telegram channel qubesos — Qubes OS📢 Q
Logo of telegram channel qubesos — Qubes OS📢
Channel address: @qubesos
Categories: Technologies
Language: English
Subscribers: 1.03K
Description from channel

A reasonably secure operating system for personal computers.
Qubes-OS.org
⚠️ This channel is updated ASAP after devs make an announcement to the project.
Help?
English Group: t.me/joinchat/B8FHpkEToMfgdREGV7wzRQ
German Group: @QubesOS_user_de

Ratings & Reviews

3.33

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

1

4 stars

0

3 stars

1

2 stars

1

1 stars

0


The latest Messages 5

2021-06-05 04:25:57 QSB-068: Disconnecting a video output can cause XScreenSaver to crash
https://www.qubes-os.org/news/2021/06/04/qsb-068/

We have just published Qubes Security Bulletin (QSB) 068:
Disconnecting a video output can cause XScreenSaver to crash.
The text of this QSB is reproduced below. This QSB and its accompanying
signatures will always be available in the Qubes Security Pack (qubes-secpack).

View QSB-068 in the qubes-secpack:

https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-068-2021.txt

Learn about the qubes-secpack, including how to obtain, verify, and read it:

https://www.qubes-os.org/security/pack/

View all past QSBs:

https://www.qubes-os.org/security/bulletins/



---===[ Qubes Security Bulletin 068 ]===---

2021-06-04


Disconnecting a video output can cause XScreenSaver to crash


User action required
=====================

Users must install the following specific packages in order to address
the issues discussed in this bulletin:

For Qubes 4.0, in dom0:
- xscreensaver 5.45-5

For Qubes 4.1, in dom0:
- xscreensaver 5.45-5

These packages will migrate from the security-testing repository to the
current (stable) repository over the next two weeks after being tested
by the community. [1] Once available, the packages are to be installed
via the Qubes Update Tool or its command-line equivalents. [2]

After installing this update, the XScreenSaver daemon process must be
restarted in order for the changes to take effect. This can be done by
restarting dom0, logging out of dom0 then logging back in, or issuing
the following command in a dom0 terminal:

xscreensaver-command -exit; xscreensaver &


Summary
========

XScreenSaver is the default screen locker in dom0. It tracks which video
outputs are connected to the system in order to blank them properly. In
some specific hardware configurations, disconnecting an output can cause
XScreenSaver to crash, leaving the screen unlocked.

Impact
=======

On hardware configurations with more than 10 video outputs that can be
disconnected, an attacker with physical access to a screen-locked system
may be able to unlock it by physically disconnecting one or more
outputs, bypassing standard screen lock authentication.

Details
========

On X11, screen locking and blanking is done by creating a window that
obscures the whole screen, which is a standard practice. In
XScreenSaver, each such window is assigned a specific property. When a
video output is disconnected, its corresponding blanking window is
destroyed, and its XScreenSaver-specific property is removed so that it
will not be used by `xscreensaver-command` anymore. This is handled by
the `update_screen_layout()` function in the `driver/screens.c` file:

985 /* Synchronize the contents of si->ssi to the current state of the monitors.
986 Doesn't change anything if nothing has changed; otherwise, alters and
987 reuses existing saver_screen_info structs as much as possible.
988 Returns True if anything changed.
989 */
990 Bool
991 update_screen_layout (saver_info *si)
992 {
993 monitor **monitors = scan_monitors (si);
994 int count = 0;
995 int good_count = 0;
...
1009 while (monitors[count])
1010 {
1011 if (monitors[count]->sanity == S_SANE)
1012 good_count++;
1013 count++;
1014 }
1015
1016 if (si->ssi_count == 0)
1017 {
1018 si->ssi_count = 10;
1019 si->screens = (saver_screen_info *)
1020 calloc (sizeof(*si->screens), si->ssi_count);
1021 }
1022
1023 if (si->ssi_count <= good_count)
1024 {
1025 si->ssi_count = good_count + 10;
1026 si->screens = (saver_screen_info *)
1027 realloc (si->screens, sizeof(*si->screens) * si->ssi_count);
1028 memset (si->screens + si->nscreens, 0,
122 views01:25
Open / Comment
2021-06-01 23:32:57 Unikraft at Usenix Lisa 21 Conference: It’s Time to Debloat the Cloud with Unikraft
https://xenproject.org/2021/06/01/unikraft-at-usenix-lisa-21-conference-its-time-to-debloat-the-cloud-with-unikraft/

On Thursday, June 3 at 12 pm PT, check out Unikraft’s talk at Usenix Lisa 21. Felipe Huici, NEC Laboratories Europe GmbH, will be giving the following talk, “It’s Time...
23 views20:32
Open / Comment
2021-06-01 22:46:42 Key features of the NitroPad T430 (https://shop.nitrokey.com/shop/product/nitropad-t430-119) include:



Tamper detection through measured boot with Coreboot (https://www.coreboot.org/), Heads (https://github.com/osresearch/heads/), and
Nitrokey USB hardware, including support for Anti Evil Maid (AEM) (https://www.qubes-os.org/doc/anti-evil-maid/)


Deactivated Intel Management Engine (https://libreboot.org/faq.html#intelme)


User-replaceable cryptographic keys


Included Nitrokey USB key


Professional ThinkPad hardware based on the ThinkPad T430 (https://www.thinkwiki.org/wiki/Category:T430)


Security-conscious shipping to mitigate against third-party
interdiction (https://en.wikipedia.org/wiki/Interdiction)



For further details, please see the NitroPad T430 (https://shop.nitrokey.com/shop/product/nitropad-t430-119) product page.

How to get one

Please see the NitroPad T430 (https://shop.nitrokey.com/shop/product/nitropad-t430-119) on the Nitrokey website (https://www.nitrokey.com/) for
purchasing information.
52 views19:46
Open / Comment
2021-06-01 22:46:42
50 views19:46
Open / Comment
2021-06-01 22:46:41 NitroPad T430 passes hardware certification for Qubes 4.0!
https://www.qubes-os.org/news/2021/06/01/nitropad-t430-qubes-certification/

It is our pleasure to announce that the NitroPad T430 (https://shop.nitrokey.com/shop/product/nitropad-t430-119) has become the
third Qubes-certified Laptop (https://www.qubes-os.org/doc/certified-hardware/#qubes-certified-laptops) for Qubes 4.0! This makes
Nitrokey (https://www.nitrokey.com/) the first vendor to have two products that pass Qubes
hardware certification, the other being the NitroPad X230 (https://www.qubes-os.org/doc/certified-hardware/#nitropad-x230).

What is Qubes Certified Hardware?

Qubes Certified Hardware (https://www.qubes-os.org/doc/certified-hardware/) is hardware that has been certified by the
Qubes developers as compatible with Qubes OS. Beginning with Qubes 4.0,
in order to achieve certification, the hardware must satisfy a rigorous
set of requirements (https://www.qubes-os.org/doc/certified-hardware/#hardware-certification-requirements), and the vendor must commit to offering customers
the very same configuration (same motherboard, same screen, same BIOS
version, same Wi-Fi module, etc.) for at least one year.

Qubes-certified Laptops (https://www.qubes-os.org/doc/certified-hardware/#qubes-certified-laptops), in particular, are regularly tested
by the Qubes developers to ensure compatibility with all of Qubes’
features. The developers test all new major versions and updates to
ensure that no regressions are introduced.

It is important to note, however, that Qubes Hardware Certification
certifies only that a particular hardware configuration is supported
by Qubes. The Qubes OS Project takes no responsibility for any vendor’s
manufacturing, shipping, payment, or other practices, nor can we control
whether physical hardware is modified (whether maliciously or otherwise)
en route to the user. (However, see below for information about how
this risk is mitigated.)

About the NitroPad T430
53 views19:46
Open / Comment
2021-05-25 20:53:33 Qubes OS pinned «Fedora 32 has reached EOL https://www.qubes-os.org/news/2021/05/25/fedora-32-eol/ Fedora 32 has reached EOL (end-of-life (https://fedoraproject.org/wiki/End_of_life)). If you have not already done so, we strongly recommend upgrading (https://www.qubes-os…»
17:53
Open / Comment
2021-05-25 20:06:59 Fedora 32 has reached EOL
https://www.qubes-os.org/news/2021/05/25/fedora-32-eol/

Fedora 32 has reached EOL (end-of-life (https://fedoraproject.org/wiki/End_of_life)). If you have not already done
so, we strongly recommend upgrading (https://www.qubes-os.org/doc/templates/fedora/#upgrading) your Fedora 32 TemplateVMs and
StandaloneVMs to Fedora 33 immediately. We provide a fresh Fedora 33
TemplateVM package through the official Qubes repositories, which you
can install in dom0 by following the standard installation
instructions (https://www.qubes-os.org/doc/templates/fedora/#installing). Alternatively, we also provide step-by-step instructions
for performing an in-place upgrade (https://www.qubes-os.org/doc/template/fedora/upgrade/) of an existing Fedora TemplateVM.
After upgrading your TemplateVMs, please remember to switch all qubes
that were using the old template to use the new one (https://www.qubes-os.org/doc/templates/#switching).

For a complete list of TemplateVM versions supported for your specific
version of Qubes, see Supported TemplateVM Versions (https://www.qubes-os.org/doc/supported-versions/#templatevms).

Please note that no user action is required regarding the OS version in
dom0. For details, please see our note on dom0 and EOL (https://www.qubes-os.org/doc/supported-versions/#note-on-dom0-and-eol).
50 views17:06
Open / Comment
2021-05-19 02:04:01 Why Attend the 2021 Xen Project Design and Developer Summit?
https://xenproject.org/2021/05/18/why-attend-the-2021-xen-project-design-and-developer-summit/

It’s almost that time of year, where we gather together as a Xen Project community and geek out on one of our most favorite topics – The Xen Project, of...
163 views23:04
Open / Comment
2021-04-10 19:12:13 Get paid to support Qubes development through automated testing! (six-month contract)
https://www.qubes-os.org/news/2021/04/10/get-paid-to-support-qubes-development-through-automated-testing/

The Qubes OS Project is seeking an expert in automated testing. We use
OpenQA and Travis to test changes to the Qubes OS source code and
automated building from source. We’re looking for someone who can help
with improving both the automated tests themselves and the testing
infrastructure.

This is a paid position on a six-month part-time contract with a
budgeted rate of $30-50 USD per hour through the Internews BASICS
project (Building Analytical and Support Infrastructure for Critical
Security tools):

https://phf.tbe.taleo.net/phf04/ats/careers/v2/viewRequisition?cws=38&org=INTERNEWS&rid=1392
496 views16:12
Open / Comment
2021-04-08 19:46:12 Xen Project Hypervisor 4.15 now Available
https://xenproject.org/2021/04/08/xen-project-hypervisor-4-15/

Xen Project ships version 4.15 with Focus on Broader Accessibility, Performance, and Security. New version introduces Processor Trace, Improved Viridian support. Community initiatives, including Functional Safety and RISC-V Port, continue...
533 views16:46
Open / Comment