This assumes that you can't break out of the VM, and that you can't gather information across the VM boundary. From <a href="http://news.ycombinator.com/item?id=2573618" rel="nofollow">http://news.ycombinator.com/item?id=2573618</a>:<p>> ... [C]onsider e.g. <a href="http://cseweb.ucsd.edu/~hovav/dist/cloudsec.pdf" rel="nofollow">http://cseweb.ucsd.edu/~hovav/dist/cloudsec.pdf</a> - cross-VM attacks are real, and extremely scary.
When I saw the diagram showing the way Joanna partitions her computing on her blog in March, I thought I was looking at something a schizophrenic would have drawn.<p>I think this line of research is interesting though, even if I don't foresee ever using it.
aren't the specs a little too much for an os focusing on security?<p>Minimum:<p>4GB of RAM<p>64-bit Intel or AMD processor (x86_64 aka x64 aka AMD64)
Intel GPU strongly preferred (if you have Nvidia GPU, prepare for some troubleshooting; we haven't tested ATI hardware)<p>10GB of disk (Note that it is possible to install Qubes on an external USB disk, so that you can try it without sacrificing your current system. Mind, however, that USB disks are usually SLOW!)