Using Tails OS in Qubes Os appVM3

So i want to use Tails Os inside of Qubes Os appVM3 Disposable VM together since Qubes good for security and stopping leaks & system compromise etc and Tails dont leave any trace in HDD/SSD for forensics.

But will using Tails inside of Qubes leave any forensics in Qubes HDD/SSD ?

Will using Tails inside of Qubes have any complications ?

what is an AppVM3 ?

It’ll leave traces in dom0.

thanks is there a way to succesfully flush it or wipe out ?

There is no known way to confidently achieve this.

But encrypting the Harddrive should be enough to protect right ?

It depends on what do you want to protect against.

forensics ! lol

Protecting against someone with a 0-day backdoors in the encryption?
Protecting against someone with capability to bruteforce the encryption?
Protecting against someone with a rubber hose?
Protecting against aliens with a mind control ability?

1 Like

haha well protecting against any govements agency

which probably covers cases 1-3, and (according to some sources) option
4 also.

I never presume to speak for the Qubes team.
When I comment in the Forum I speak for myself.

As far as I understand the topic, nowadays shredding (the command) doesn’t work on SSDs but works on HDDs. It does not work on pretty much all filesystems, and the fact that Qubes uses lvms makes it even less reliable. At this point you are probably better off literally shredding your devices. Or burning them.

Is there a good way to wipe SSD, at all?

I’m not even sure it’s reliable with HDDs, they are so complex nowadays that I don’t think they can guarantee you overwrote that exact sector multiple time.

I mean it should, why would HDD write in a weird, unpredictable way? It doesn’t have wear leveling.

Famous last words