On Thu, 14 May 2020 12:33:59 -0700 stan via users wrote:These are meant to be silos, but this attack would allow someone on one virtual machine to capture data of another virtual machine running on the same core.
This gives me a naive idea.
Is there any way to force the VMs to run on an isolated core ? The VM and OS must not run on the same core, if this is enforced, then according to what you say there might be sufficient containment of the breach.
Am I correct ? Or am I speaking nonsense ?
-- Regards, Sreyan
_______________________________________________ users mailing list -- users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to users-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/users@xxxxxxxxxxxxxxxxxxxxxxx