News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Hiding templatevm or appvm in Qubes : Qubes | Torhoo darknet markets

I have a question about Qubes, regarding this post: http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/sensitivevm/index.html
The post does not mention hidden vms on Qubes, just hidden vms in general in a veracrypt container.

Is it possible to have a hidden sensitive vm inside Qubes? Or are dispappvm the usecase for this? Can I not hide the fact that I have whonix templatevm on my system if I have Qubes?
/u/DrugHub P
1 points
2 months ago
If the disk is locked (encrypted, machine off) all VMs will be "hidden". If the disk is unlocked (decrypted, machine on) then no, you can't really hide anything. Even disposable VMs leave traces, disposables are designed to have a clean state and to open less trusted apps/documents/pages in an isolated environment not to hide usage.
/u/3xtr4tr1f0rce 📢
1 points
2 months ago
Understood, it is what I thought, just curious if actually possible to do or not, guess that solves that!
/u/Suffering01
1 points
2 months ago
This would be rather difficult in Qubes with how integrated the system is. https://github.com/QubesOS/qubes-issues/issues/2402 has been open for 9 years but as far as I can tell nothing has been done about it.