qubes-release: update release notes

pull/21/head
Marek Marczykowski-Górecki 6 years ago
parent 7c67b93468
commit 9d41b135ed
No known key found for this signature in database
GPG Key ID: 063938BA42CFA724

@ -8,7 +8,7 @@ New features since 3.2
* [Admin API][admin-api] allowing strictly controlled managing from non-dom0
* All `qvm-*` command-line tools rewritten, some options have changed
* Renaming VM directly is prohibited, there is GUI to clone under new name and remove old VM
* [Use HVM by default][hvm-switch] to lower [attack surface on Xen][qsb-24]
* Use [PVH][qsb-37] and [HVM][hvm-switch] by default to [mitigate Meltdown & Spectre][qsb-37] and lower the [attack surface on Xen][qsb-24]
* Create USB VM by default
* [Multiple Disposable VMs templates support][dispvm-ticket]
* New [backup format][backup-format] using scrypt key-derivation function
@ -21,7 +21,7 @@ New features since 3.2
* More flexible Qubes RPC policy - [related ticket][qrexec-policy-keywords], [documentation][qrexec-doc]
* [New Qubes RPC confirmation window][qrexec-confirm], including option to specify destination VM
* Dom0 update to Fedora 25 for better hardware support
* Kernel 4.9.x
* Kernel 4.14.x
You can get detailed description in [completed github issues][github-release-notes]
@ -69,6 +69,7 @@ supported option to upgrade to Qubes R4.0 is to install it from scratch and use
[vm-interface]: https://www.qubes-os.org/doc/vm-interface/
[admin-api]: https://www.qubes-os.org/news/2017/06/27/qubes-admin-api/
[qsb-24]: https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-024-2016.txt
[qsb-37]: https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-037-2018.txt
[backup-format]: https://www.qubes-os.org/doc/backup-emergency-restore-v4/
[api-doc]: https://dev.qubes-os.org/projects/qubes-core-admin/en/latest/

Loading…
Cancel
Save