Hiding CPUID from AppVM (why is this not default)?

as time goes on i’m learning qubes isn’t as private and secure as i originally belived
while this sepsific issue is less important to me personally (since i care more about security then privacy…) you’d think that by principal the hardware id should be hidden from vm’s by default…

and while yes it is hard to believe any entity less powerfull then maybe a full blowen government would be able to use such a “meaningless” piece of information
think of the journalists using qubes and tyranical goverments such as china’s… to give and example


i’ve found this after a quick search Setting the CPUID of a XEN guest - Intrbiz Blog

but the link given is old

wayback machin gets me to 2012 and not much usefull information either

and well most lickly that anything from 2012 is very very outdated
if anyone can direct me to a patch or instruction/… anything like that i’d appreciate it

no need to really dig into the matter it’s just “general discussion”

(it’s not that important to me as i said i’m not in the business of upsetting governments/ paranoid to the degree where a attacker would have the ability to identify who am i from the device…
and if i were i would’ve got my self a cheap second hand laptop for cash anyway so…
or paid someone in cash to buy me a good cpu/… not to step foot in a store with cameras or credit card or…)

but i mean…
u get the point it’s a matter of principal

(Adjusted your title for clarity, but fell free to tweak it if it is not adequate)

I think this will answer your question (marmarek is the lead developer of Qubes):