If you are not sure if the website you would like to visit is secure, you can verify it here. Enter the website address of the page and see parts of its content and the thumbnail images on this site. None (if any) dangerous scripts on the referenced page will be executed. Additionally, if the selected site contains subpages, you can verify it (review) in batches containing 5 pages.
favicon.ico: blog.invisiblethings.org - Blog | The Invisible Things Bl.

site address: blog.invisiblethings.org

site title: Blog The Invisible Things Blog

Our opinion (on Sunday 24 May 2026 20:57:29 UTC):

GREEN status (no comments) - no comments

Meta tags:
description=My personal blog and website (see htt???/blog.invisiblethings.org/);

Headings (most frequently used words):

2026, 2021, 2018, 2017, 2016, 2015, 2014, 2013, 2012, 2011, 2010, 2009, 2008, 2007, 2006,

Text of the page (most frequently used words):
qubes (38), the (35), 2009 (23), sep (19), 2011 (19), 2008 (17), 2007 (16), 2010 (16), aug (15), jun (14), security (14), apr (14), and (13), may (12), mar (12), 2006 (11), feb (10), intel (10), released (10), jul (9), oct (9), thoughts (9), jan (9), 2012 (9), 2013 (9), 2015 (9), introducing (8), has (8), been (8), dec (7), 2014 (7), blog (6), for (6), attacking (6), beta (6), attack (5), about (5), windows (5), slides (5), new (5), 2016 (5), 2017 (5), code (4), blue (4), pill (4), vista (4), rc1 (4), invisible (4), things (4), vegas (4), xen (4), trusted (4), software (4), 2018 (4), source (3), detection (3), some (3), guard (3), nov (3), cpu (3), model (3), with (3), 0wning (3), execution (3), why (3), txt (3), paper (3), trusting (3), part (3), alpha (3), linux (3), gui (3), cloud (3), from (3), release (3), odyssey (3), pagefile (2), rc2 (2), stealth (2), malware (2), beyond (2), hardware (2), based (2), running (2), joke (2), lab (2), bitlocker (2), virtualization (2), thin (2), nesting (2), research (2), training (2), our (2), trilogy (2), q35 (2), computer (2), microsoft (2), more (2), core (2), interview (2), evil (2), maid (2), vms (2), your (2), fun (2), profit (2), into (2), challenges (2), untrusted (2), support (2), coming (2), initial (2), upcoming (2), extensions (2), announcing (2), considered (2), harmful (2), next (2), 2021 (2), 2026 (2), rss, feed, joanna, rutkowska, 2023, svv, made, public, confidence, trip, report, hype, still, vulnerable, patch, taxonomy, towards, verifiable, operating, systems, cheating, ram, forensics, every, day, big, confusion, post, handy, tool, play, integrity, levels, game, over, human, factor, understanding, tpm, bypassing, conference, ready, ptacek, challenge, tricky, tricks, browser, rootkits, razor, hypervisors, kick, ass, hypervisor, rsa, absurd, most, stupid, news, ever, obfuscated, 1984, rafal, wojtczuk, joins, highlights, domu, dom0, consideration, patches, bug, teamwork, crediting, three, approaches, demos, details, posted, executive, rebuts, technology, miss, closed, conspiracy, vmms, reloaded, independent, discoveries, smm, memory, via, cache, poisoning, sky, falling, computing, backdoors, quest, black, hat, toys, ring, tools, pdf, signing, apple, foundations, lack, thereof, summit, goes, after, truecrypt, another, priorities, remotely, network, cards, need, evolution, formally, verified, microkernels, them, disposable, skeletons, hidden, closet, r00ting, desktop, dos, pro, future, subsystem, clients, itl, hiring, update, documents, got, lost, stolen, offtopic, partitioning, digital, life, domains, password, revolution, won, work, circus, isolation, following, white, rabbit, attacks, against, app, oriented, its, implications, usb, silicon, years, sstic, anti, playing, networking, exploring, lands, cpus, sinit, hijacking, deepsafe, comments, operation, high, roller, candidate, how, different, converting, pdfs, ones, way, framework, preview, hal, action, seamless, integration, shattering, myths, debian, template, ssled, wiki, badusb, physical, separation, compartmentalization, git, iso, roadmap, project, gets, otf, funding, integrate, whonix, improve, usability, caspar, x86, state, proposal, stateless, laptop, build, process, physically, secure, orwl, compromise, recovery, individual, full, system, cases, admin, api, generation, stack, air, generalizing, architecture, graphene, arbitrary, payloads, sgx, enclaves, chapter, endpoint, wildland, client, have, traces, humanity,


Text of the page (random words):
blog the invisible things blog the invisible things blog 2026 i have a new blog traces of humanity feb 2 2026 2021 announcing wildland client v0 1 jun 11 2021 2018 the next chapter from the endpoint to the cloud oct 25 2018 introducing graphene ng running arbitrary payloads in sgx enclaves jun 11 2018 qubes air generalizing the qubes architecture jan 22 2018 2017 introducing the next generation qubes core stack oct 3 2017 qubes os 4 0 rc1 has been released jul 31 2017 introducing the qubes admin api jun 27 2017 compromise recovery on qubes os individual vms full system cases apr 26 2017 2016 qubes os 3 2 has been released sep 29 2016 thoughts on the physically secure orwl computer sep 3 2016 security challenges for the qubes build process may 30 2016 qubes os 3 1 has been released mar 9 2016 2015 state considered harmful a proposal for a stateless laptop new paper dec 23 2015 intel x86 considered harmful new paper oct 27 2015 qubes 3 0 oct 1 2015 caspar jul 10 2015 qubes os project gets otf funding to integrate whonix improve usability jun 4 2015 qubes 3 0 rc1 iso and roadmap for 2015 apr 23 2015 my new git based blog feb 9 2015 2014 qubes r3 odyssey initial source code release nov 27 2014 announcing qubes os release 2 sep 26 2014 physical separation vs software compartmentalization aug 26 2014 qubes os r2 rc2 debian template ssled wiki badusb and more aug 6 2014 qubes os r2 rc1 has been released apr 20 2014 shattering the myths of windows security jan 15 2014 2013 qubes r2 beta 3 has been released dec 10 2013 windows 7 seamless gui integration coming to qubes os nov 26 2013 thoughts on intel s upcoming software guard extensions part 2 sep 23 2013 thoughts on intel s upcoming software guard extensions part 1 aug 30 2013 qubes os r3 alpha preview odyssey hal in action jun 21 2013 introducing qubes odyssey framework mar 21 2013 qubes 2 beta 2 has been released feb 28 2013 converting untrusted pdfs into trusted ones the qubes way feb 21 2013 2012 qubes 2 beta 1 with initial windows support has been released dec 14 2012 how is qubes os different from sep 12 2012 introducing qubes 1 0 sep 3 2012 qubes 1 0 release candidate 1 jul 21 2012 some comments on operation high roller jun 27 2012 windows support coming to qubes mar 3 2012 qubes beta 3 feb 6 2012 thoughts on deepsafe jan 21 2012 2011 trusted execution in untrusted cloud dec 13 2011 exploring new lands on intel cpus sinit code execution hijacking dec 6 2011 playing with qubes networking for fun and profit sep 28 2011 qubes beta 2 released sep 19 2011 anti evil maid sep 7 2011 interview about qubes os aug 30 2011 my sstic 2011 slides jun 10 2011 from slides to silicon in 3 years jun 3 2011 usb security challenges may 31 2011 un trusting the cloud may 28 2011 the app oriented ui model and its security implications may 21 2011 following the white rabbit software attacks against intel vt d may 13 2011 the linux security circus on gui isolation apr 23 2011 why the us password revolution won t work apr 16 2011 qubes beta 1 has been released apr 12 2011 partitioning my digital life into security domains mar 13 2011 my documents got lost stolen offtopic mar 8 2011 2010 update on qubes dec 6 2010 qubes alpha 3 oct 6 2010 itl is hiring sep 28 2010 on thin clients security sep 13 2010 un trusting your gui subsystem sep 9 2010 qubes qubes pro and the future sep 2 2010 the ms dos security model aug 19 2010 skeletons hidden in the linux closet r00ting your linux desktop for fun and profit aug 17 2010 qubes alpha 2 released jul 1 2010 disposable vms jun 1 2010 on formally verified microkernels and on attacking them may 3 2010 evolution may 1 2010 remotely attacking network cards or why we do need vt d and txt apr 30 2010 introducing qubes os apr 7 2010 priorities jan 16 2010 2009 another txt attack dec 21 2009 evil maid goes after truecrypt oct 15 2009 intel security summit the slides sep 22 2009 about apple s security foundations or lack of thereof sep 2 2009 pdf signing and beyond aug 26 2009 vegas toys part i the ring 3 tools aug 25 2009 black hat 2009 slides jul 30 2009 interview jul 16 2009 virtualization in security training in vegas jun 12 2009 quest to the core jun 9 2009 more thoughts on cpu backdoors jun 1 2009 thoughts about trusted computing may 27 2009 trusting hardware mar 25 2009 the sky is falling mar 20 2009 attacking smm memory via intel cpu cache poisoning mar 19 2009 independent attack discoveries mar 13 2009 attacking intel txt paper and slides feb 19 2009 nesting vmms reloaded feb 10 2009 closed source conspiracy jan 26 2009 why do i miss microsoft bitlocker jan 21 2009 attacking intel trusted execution technology jan 5 2009 2008 microsoft executive rebuts our research sep 7 2008 xen 0wning trilogy code demos and q35 attack details posted sep 6 2008 the three approaches to computer security sep 2 2008 teamwork crediting aug 31 2008 intel patches the q35 bug aug 26 2008 attacking xen domu vs dom0 consideration aug 20 2008 our xen 0wning trilogy highlights aug 8 2008 0wning xen in vegas jul 7 2008 rafal wojtczuk joins invisible things lab jul 1 2008 1984 may 20 2008 vegas training 2008 apr 30 2008 research obfuscated apr 14 2008 the most stupid security news ever apr 12 2008 the rsa absurd apr 9 2008 kick ass hypervisor nesting mar 31 2008 2007 razor thin hypervisors oct 25 2007 thoughts on browser rootkits oct 17 2007 tricky tricks aug 31 2007 virtualization detection vs blue pill detection aug 3 2007 we re ready for the ptacek s challenge jun 28 2007 invisible things lab bitlocker tpm bypassing and some conference thoughts may 18 2007 understanding stealth malware apr 20 2007 the human factor apr 1 2007 the game is over mar 26 2007 handy tool to play with windows integrity levels mar 5 2007 confusion about the joke post feb 13 2007 vista security model a big joke feb 12 2007 running vista every day feb 4 2007 beyond the cpu cheating hardware based ram forensics jan 20 2007 towards verifiable operating systems jan 3 2007 2006 introducing stealth malware taxonomy nov 24 2006 vista rc2 vs pagefile attack and some thoughts about patch guard oct 19 2006 vista rc1 still vulnerable to the pagefile attack sep 13 2006 blue pill detection aug 12 2006 the blue pill hype jul 1 2006 introducing blue pill jun 22 2006 confidence 2006 trip report may 17 2006 svv source code made public may 12 2006 joanna rutkowska 2006 2023 blog rss feed
Images from subpage: "blog.invisiblethings.org/2013/06/21/qubes-os-r3-alpha-previe... " Verify
Images from subpage: "blog.invisiblethings.org/2013/03/21/introducing-qubes-odysse... " Verify
Images from subpage: "blog.invisiblethings.org/2013/02/28/qubes-2-beta-2-has-been-... " Verify
Images from subpage: "blog.invisiblethings.org/2013/02/21/converting-untrusted-pdf... " Verify
Images from subpage: "blog.invisiblethings.org/2012/12/14/qubes-2-beta-1-with-init... " Verify

Verified site has: 135 subpage(s). Do you want to verify them? Verify pages:

1-5 6-10 11-15 16-20 21-25 26-30 31-35 36-40 41-45 46-50
51-55 56-60 61-65 66-70 71-75 76-80 81-85 86-90 91-95 96-100
101-105 106-110 111-115 116-120 121-125 126-130 131-135


Pages verified in the last hours (randomly selected):


Top 50 hastags from of all verified websites.

Supplementary Information (add-on for SEO geeks)*- See more on header.verify-www.com

Header

HTTP/2 200
server GitHub.com
content-type text/html; charset=utf-8
last-modified Mon, 02 Feb 2026 12:46:31 GMT
access-control-allow-origin *
etag W/ 69809ca7-90a7
expires Sun, 24 May 2026 20:51:19 GMT
cache-control max-age=600
content-encoding gzip
x-proxy-cache MISS
x-github-request-id 30EE:E370F:2B1FBE:2BC631:6A13626E
accept-ranges bytes
age 0
date Sun, 24 May 2026 20:57:29 GMT
via 1.1 varnish
x-served-by cache-rtm-ehrd2290028-RTM
x-cache HIT
x-cache-hits 0
x-timer S1779656250.795739,VS0,VE104
vary Accept-Encoding
x-fastly-request-id daf99a37b1addb349f810fc0ae3a22c7a2f82664
content-length 6642

Meta Tags

title="Blog | The Invisible Things Blog"
charset="utf-8"
http-equiv="X-UA-Compatible" content="IE=edge"
name="viewport" content="width=device-width, initial-scale=1"
name="description" content="My personal blog and website (see htt???/blog.invisiblethings.org/)"
name="apple-mobile-web-app-title" content="Qubes OS"
name="application-name" content="Qubes OS"
name="theme-color" content="#ffffff"

Load Info

page size6642
load time (s)0.19836
redirect count0
speed download33545
server IP 185.199.108.153
* all occurrences of the string "http://" have been changed to "htt???/"