-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Little too technical #1
Comments
No. Let's say you have encrypted containers (encrypted files with other files inside) inside a VM (usually Anyway when you shut down your laptop, all data at rest is encrypted by the Qubes OS default full disk encryption. Per-VM encryption is tracked in QubesOS/qubes-issues#1293, but you already found that. Anyway pool encryption is already possible in 4.1 via QubesOS/qubes-core-admin#354 and you can create one pool per VM if you want. However usage is rather complex (see examples in the code). |
Ok so an analogy would be if i have my files in truecrypt type container on a usb drive i plug it in and then qcrypt detects its been plugged in and launches a vm that mounts then container? |
Roughly, yes. More precisely |
I apologize for asking stupid questions i see you hAve explained what this does its just i dont understand. I am looking for a way to make sure
When a vm is not running it is at rest in encrypted state. Is that what this does?
The text was updated successfully, but these errors were encountered: