I have some simple ideas for improving defenses against cold boot attacks that I can present to the Qubes developers.
But, I’m just wondering if people actually care? The last time this was discussed in the forums was 2022. So, if I spend 4 hours writing something up for the developers, is that a good use of my time?
Also, in general, what’s the best place to post technical suggestions for improvement?
Hello, definitely. I would say this OS’s job is to be the most secure on the planet, adding an extra protection wouldnt hurt, although there are other ways to get the encryption key. If someone has acess to your computer it is basically done for, that is why the devs have not made more effort to physical security in my opinion.
It has been discussed in the last year both on the forum and github.
Xen memory scrubbing does provide some protection against cold boot attacks, and if the default settings are too relaxed, you can force Xen to scrub all memory when a domain is destroyed.
If you have really good ideas for Qubes security improvements then I would highly recommend you to read this manual. Maybe it will inspire you to make even more improvements for protection from Qubes physical access attacks.
The only tamperproof computational system (OS and hardware) that exists is the one on Voyager 1, which is now sufficiently difficult for attackers to reach … physically.
@Yianni _ Thanks for interest in contributing. It’s a good topic.
I recommend mail to qubes-devel, as explained here:
“This list is primarily intended for people who are interested in
contributing to Qubes or who are willing to learn more about its
architecture and implementation.”
I never presume to speak for the Qubes team.
When I comment in the Forum I speak for myself.