It was disabled once in VirtualBox and then re-enabled.
https://phabricator.whonix.org/T718
Why is it disabled on KVM and already
already: “It’s not”. “It’s still.”
KVM “lags behind”. When ⚓ T718 Shared Clipboard and Drag n Drop defaults for WS and GW was
implemented for VirtualBox, changing KVM was forgotten.
secure on Qubes but
Because Qubes developed a virtualizer graphical user interface from
scratch and innovated a secure copy key sequence. Qubes comes with this
configuration by default for all VMs. Qubes effectively discourages use
of Qubes host for anything except using VMs. It’s not a setting up to
Qubes-Whonix.
https://phabricator.whonix.org/T720
being left less secure on VirtualBox? Do virtualbox users require less safety? are they less prone to making mistakes?
It can be refereed to analogy mentioned in my original post.
As an analogy, is it useful to have a super secure window while at the
same time it’s infeasible to secure the front door.
And more from my original post.
With Whonix the goal is the right balance.
etc.
VirtualBox has it’s problems. (
Whonix for KVM )
For best security, use Qubes-Whonix:
If there is a way to mitigate that, let’s take it. If not, at least mitigate threats we can.
Same as above. Already mentioned in original post in this thread.
The operation was a success, but the patient died. This style of
development was never applied in the history of Whonix and it won’t be
until Whonix or I got obsoleted.
Besides, with speakers I can think of attacks not even requiring an infected device nearby. For example: an adversary has a good reason to believe you use a public wifi at a certain airport, large cafe, library. He gets there, and make the speakers play a loud alarm sound. Busted. Other attacks - play a sound provoking the user to take some action. For example, mail arriving. I think the possibilities with speakers control are quite larger.
- Once under observation by whoever, software can do very little.
- A lot of these apply to the host operating system too.
Not sure I understood what you mean here.
Users of Non-Qubes-Whonix are very likely to use browsers or other VMs
on their host operating system. I.e. they are likely to run Firefox,
other browsers and other applications outside of the virtualizer.
Better options:
Hardware Threat Minimization - Kicksecure (just
now added)
I am not convinced giving the whole world (anyone can join) my email address is much better.
Use a separate e-mail address?
(anyone can join)
This means you’d prefer a user to staff private communications only?