On Thu, 14 May 2020 12:33:59 -0700
stan via users wrote:
These are meant to
be silos, but this attack would allow someone on one virtual machine to
capture data of another virtual machine running on the same core.
This gives me a naive idea.
Is there any way to force the VMs to run on an isolated core ? The VM
and OS must not run on the same core, if this is enforced, then
according to what you say there might be sufficient containment of the
breach.
Am I correct ? Or am I speaking nonsense ?
--
Regards,
Sreyan
_______________________________________________
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct:
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives:
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org