On Friday, September 9, 2016 at 5:17:14 AM UTC+2, Jodie wrote:
> Hi all,
>
> I've been trying to install Qubes on a Thinkpad T430. As far as I can tell,
> support for this should be good.
>
> I get past the configuration window, but the install is currently failing on
> the installation of the
On Thursday, September 8, 2016 at 3:19:36 AM UTC-4, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-09-08 00:07, grv wrote:
> > I created a xubuntu StandaloneVM (HVM) on Qubes 3.2 rc3. When I try
> > to stretch HVM window, instead of changing window size
Hi,
After testing Qubes for a few weeks (3.1, 3.2-rc1,2&3), here's my 2 cents:
It's a great OS in many aspects but still unusable outside of the small
group of the "terminal only" ppl. Reason # 1 is graphics. In this day and
age it's expected for any OS to at least have basic video rendering
Hi, im trying my hand again at qubes. Previously i attempted to create a
USB VM and inadvertantly bricked qubes when i assigned all usb controllers
to a vm while running qubes on a usb.
Following the instructions
(https://www.qubes-os.org/doc/assigning-devices/) i went into dom0
terminal and ran
On 09/05/2016 07:24 PM, Marek Marczykowski-Górecki wrote:
I've just tried this and successfully upgraded Fedora 23 to Fedora 24
template.
TL;DR version:
1. Clone fedora-23 to fedora-24-test.
2. Open terminal in fedora-24-test.
3. Run "dnf upgrade --releasever=24".
4. Shutdown the template.
5.
On Thursday, September 8, 2016 at 1:19:09 AM UTC-7, Connor Page wrote:
> Think of Whonix as a possible compartment of your digital life that gives
> more anonymity online. It would be more or less securely separated from other
> compartments. In order to save space and admin effort common parts
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi,
I've worked on this mostly out of stubbornness :), but maybe it is
useful for someone here. README.md pasted below.
https://github.com/rustybird/qubes-split-dm-crypt
Rusty
# _Split dm-crypt_ for Qubes R3.2-rc3 and later
**Isolates
*** Expected behavior: macspoof script automatically scrambles network
interface MACs at sys-net startup using instructions from [1], just like
in R3.1.
[1] https://www.qubes-os.org/doc/anonymizing-your-mac-address/
*** Actual behavior:
[user@sys-net ~]$ sudo systemctl status macspoof@wlp0s1
On Wednesday, September 7, 2016 at 6:40:24 AM UTC-7, Marek Marczykowski-Górecki
wrote:
>
> For Qubes 4.0 it hasn't been decided yet (most likely will be Fedora
> 23 too). But hopefully we'll have newer kernel there. I'd aim for 4.8.
looks like fedora 23 will be EOL in 3-4 months.
On Wednesday, 7 September 2016 14:08:16 UTC+1, Connor Page wrote:
> agree, when I looked at it some time ago I could not imagine why I would need
> all of that. too large an attack surface for my taste. however, I did
> investigate what individual elements are capable of and borrowed some
Hello,
I am struggling to have VPN work while using it with Tor, I can't have both
work.
I tried first to follow Mrs. Rutkowska's tutorial on setting up a clear Tor
proxyVM
https://theinvisiblethings.blogspot.de/2011/09/playing-with-qubes-networking-for-fun.html
but unfortunately I can't
Think of Whonix as a possible compartment of your digital life that gives more
anonymity online. It would be more or less securely separated from other
compartments. In order to save space and admin effort common parts of these
compartments (i.e., the root filesystem, kernels, modules) are made
12 matches
Mail list logo