is there any way to encrypt a AppVM / Qube?
for sensitive qubes that can’t be disposables
is there any way to encrypt a AppVM / Qube?
for sensitive qubes that can’t be disposables
Why not just encrypt the whole disk volume Qubes is running on with LUKS during install?
I can imagine cases where it is desirable or necessary to keep data fully locked except at the time of use.
I believe that the qvm-pool command should allow management of qubes stored on secondary encrypted supports, which may or may not be removable.
I never tried it, but it looks ideal for @raul1991 , if an extra layer of sometimes-unlocked encryption is require, to supplement the standard Qubes luks partition.
Docs are here (“advanced user”, may need refreshing):
https://doc.qubes-os.org/en/latest/user/advanced-topics/secondary-storage.html