L26

joined 1 year ago
[–] [email protected] 11 points 1 year ago (17 children)
[–] [email protected] 23 points 1 year ago

Well that’s not very Chakotay

[–] [email protected] 4 points 1 year ago

That’s pretty cool thanks

[–] [email protected] 4 points 1 year ago

Thanks for clarifying!

[–] [email protected] 22 points 1 year ago (5 children)

Basically RedHat changed their source code policy and have ostracized the open source community.

[–] [email protected] 2 points 1 year ago* (last edited 1 year ago) (1 children)

I don’t unfortunately. This is from a conversation I had with a researcher in VM escape.

As far as I’m aware peripherals are not actually passed through exactly but rather emulated on the guest machine. When you pass through a peripheral you’re only passing the input of that device, data is not sent upstream.

Whereas passing through the GPU you’re providing a means of accessing non-emulated devices through the hardware itself bypassing the isolation provided by virtualization entirely.

[–] [email protected] 3 points 1 year ago (3 children)

GPU passthroughs can expose the host to a potentially compromised VM.

[–] [email protected] 4 points 1 year ago (5 children)

Not great but better than it used to be. Don’t do a GPU passthrough.

[–] [email protected] 2 points 1 year ago (1 children)

Uncommon symbols could help a bit but not enough to keep your information safe. Backspaces would be trained in the dataset for sure. Also, as this practice matures it’ll become increasingly difficult to prevent.

[–] [email protected] 12 points 1 year ago

I think it’s a great name and domain

[–] [email protected] 3 points 1 year ago (1 children)

This looks really nice, good job!

[–] [email protected] 21 points 1 year ago (4 children)
view more: ‹ prev next ›