On Fri, 15 May 2020 17:34:43 +0530 Sreyan Chakravarty <sreyan32@xxxxxxxxx> wrote: > > On Thu, 14 May 2020 12:33:59 -0700 > > stan via users wrote: > > > >> These are meant to > >> be silos, but this attack would allow someone on one virtual > >> machine to capture data of another virtual machine running on the > >> same core. > > This gives me a naive idea. > > Is there any way to force the VMs to run on an isolated core ? The VM > and OS must not run on the same core, if this is enforced, then > according to what you say there might be sufficient containment of > the breach. > > Am I correct ? Or am I speaking nonsense ? You are correct. I'm not sure of the method to do that though. _______________________________________________ users mailing list -- users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to users-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/users@xxxxxxxxxxxxxxxxxxxxxxx