Hi,
Main thing for security in qubes is isolation. There is a mac address randomization in qubes also and I couldn’t find info about that on qubes website. There are some tools for making pdfs and images trusted, too. I would like to know about more “hidden” features that qubes do for security that differs that os from most of linux distros and where I can find information about that.
Especially:
Arguably one of the biggest challenges for desktop security is how to handle those overly complex PDFs, DOCs, and similar files, that are so often exchange...
So …
Qubes component: app-linux-img-converter
Qubes component: app-linux-pdf-converter
Concerning security in general:
(MAC address randomisation is a function of general network manager AFAIK.)
2 Likes
A bit more advanced stuff:
The concept of ‘qubes’ (the VMs) is a game-changer to me, since it allows for modularity as though you have a bunch of computers inside your computer–except these computers can be created, destroyed, and recreated at will; and also be modified and connected to your heart’s desires (if you have the technical skills).
I’m still stuck in the paradigm of using qubes in the prescribed method (sys-VMs, disp-VMs, etc.) and am wondering if there are more creative people out there who have found other w…
adw
August 21, 2024, 11:37pm
4
It’s not on the website, because it’s not a Qubes-specific feature. Instead, it’s here on the forum:
Although the MAC address is not the only metadata broadcast by network hardware, changing your hardware’s default MAC Address could be an important step in protecting privacy .
Qubes OS 4.1 and later already anonymize all Wi-Fi MAC addresses by default - they change during every Wifi session. So there is no need to apply any of the instructions below if you’re only interested in Wi-Fi connections. Users requiring Ethernet MAC address anonymization may want to read on.
Randomize a single connec…
1 Like