If I pull the WiFi card out and don’t connect the Ethernet port to anything,
then I configure qubes to use only a usb WiFi adapter (as I indicated above),
I’m pretty sure that the ME engine won’t be able to use any of the three
network interfaces to phone home. For ME to work over a network, it
On Wed, March 14, 2018 12:30 am, yreb...@riseup.net wrote:
> please remind me how to remove orphaned Domain: menu items, the AppVM is
> gone, but I still see it listed in the Application 'Q' menu in 3.2
>
> but not in qvm-ls ; I don't want to remove the wrong config file
> somewhere , I can't
On Wednesday, 14 March 2018 12:25:12 UTC+11, Chris Laprise wrote:
> On 03/13/2018 08:20 PM, Drew White wrote:
> > On Wednesday, 14 March 2018 11:06:22 UTC+11, Chris Laprise wrote:
> >> The current VPN doc is here:
> >>
> >> https://www.qubes-os.org/doc/vpn/
> >
> > Thanks for the reply Chris,
On 03/13/2018 08:20 PM, Drew White wrote:
On Wednesday, 14 March 2018 11:06:22 UTC+11, Chris Laprise wrote:
The current VPN doc is here:
https://www.qubes-os.org/doc/vpn/
Thanks for the reply Chris, but that is not what I was looking for as I was wanting to use pptp VPN connections (and
Is there such a thing for Qubes 3.2?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email
On Tue, March 13, 2018 10:41 pm, rucksack.peter via qubes-users wrote:
> Am Montag, 12. März 2018 01:01:55 UTC+1 schrieb awokd:
>
>> On Sun, March 11, 2018 9:22 pm, rucksack.peter via qubes-users wrote:
>>
>>> I'm trying to build a Qubes ISO on a Fedora 26 System, following the
>>> instructions of
please remind me how to remove orphaned Domain: menu items, the AppVM
is gone, but I still see it listed in the Application 'Q' menu in 3.2
but not in qvm-ls ; I don't want to remove the wrong config file
somewhere , I can't seem to find it in the old group postings,
though I know it's
On Wednesday, 14 March 2018 11:06:22 UTC+11, Chris Laprise wrote:
> The current VPN doc is here:
>
> https://www.qubes-os.org/doc/vpn/
Thanks for the reply Chris, but that is not what I was looking for as I was
wanting to use pptp VPN connections (and similar), not a Qubes VPN.
> It is in
On 03/13/2018 07:24 PM, Drew White wrote:
Hi folks,
I've searched and searched and I am unable to locate the information I require.
I'm trying to get a VPN to work from a ProxyVM.
It is failing with no reason why.
From the NetVM I am able to connect the VPN.
What is it that I am doing
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Xaver:
> After updating system from 4.0-rc4 to rc5 qvm-backup --exclude no
> longer excludes the specified VM from the backup.
I recently broke that. Sorry, and thanks for the bug report!
https://github.com/QubesOS/qubes-core-admin/pull/202
Rusty
Hi folks,
I've searched and searched and I am unable to locate the information I require.
I'm trying to get a VPN to work from a ProxyVM.
It is failing with no reason why.
>From the NetVM I am able to connect the VPN.
What is it that I am doing wrong please?
There has to be something?
Doesn't
On Tuesday, March 13, 2018 at 11:07:49 PM UTC+1, Xaver wrote:
> After updating system from 4.0-rc4 to rc5 qvm-backup --exclude no longer
> excludes the specified VM from the backup. When the command is run the
> specified VMs are in fact included in the backup. This was not an issue with
>
On Tuesday, March 13, 2018 at 10:13:45 PM UTC+1, Dave C wrote:
> Many times in recent days, I've closed my Qubes laptop, expecting it to
> sleep, and put it into my backpack. Normally it sleeps as expected.
>
> Two of those times, once today and once several days ago, I reach into the
>
Am Montag, 12. März 2018 01:01:55 UTC+1 schrieb awokd:
> On Sun, March 11, 2018 9:22 pm, rucksack.peter via qubes-users wrote:
> > I'm trying to build a Qubes ISO on a Fedora 26 System, following the
> > instructions of the documentation page "Building Qubes OS ISO", and get
> > this error
After updating system from 4.0-rc4 to rc5 qvm-backup --exclude no longer
excludes the specified VM from the backup. When the command is run the
specified VMs are in fact included in the backup. This was not an issue with
4.0-rc4 and a system backup was created prior to updating to rc5 without
ogle.com/d/msgid/qubes-users/3ff8de22-02f5-4218-81ea-5ecf75df61f0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
Qubes-HCL-LENOVO-20HHCTO1WW-20180313-131259.yml
Description: Binary data
vPro is a set of ME programs for insecure remote management (vs the
secure owner controlled remote management of OpenBMC) but ME is always
on, always capable of remote access and impossible to disable no matter
what - possibly the best industrial espionage utility ever invented and
not really
On 03/13/2018 08:55 AM, brendan.h...@gmail.com wrote:
If you bypass the onboard/whitelisted Ethernet and WiFi controllers and use USB
connected networking, don’t you strongly mitigate remote access via Intel ME?
It cannot use hardware it doesn’t have code to communicate with, right?
Wrong.
On Tuesday, March 13, 2018 at 3:14:20 AM UTC+2, awokd wrote:
> On Mon, March 12, 2018 10:21 pm, idanqu...@gmail.com wrote:
> > I'm trying to build a server that uses tcp protocol, and I'm having
> > trouble figuring the firewall rules that I need to set in order to
> > connect the server so it
On 03/13/2018 07:14 AM, Alex Dubois wrote:
On 12 Mar 2018, at 18:40, David Hobach wrote:
On 03/11/2018 03:15 PM, David Hobach wrote:
An alternative might be to setup the local DNS service in a VM closer to the
Internet, i.e. not in the proxy VM which also implements
On Tuesday, March 13, 2018 at 11:43:21 PM UTC+7, sevas wrote:
> vPro = bad.
>
> That GitHub page does not recommend vPro. It states that AEM uses a feature
> of vPro to detect if vPro software (BIOS) has been tampered with while you
> were away. Then you can throw your computer in the trash
Le lundi 3 octobre 2016 02:04:05 UTC+2, Quentin Bourgeois a écrit :
> Hi,
>
> Please find attached the output of qubes-hcl-report. For now
> everything is working (slowly).
Hi,
why was it so slow ? Did you install Qubes on a ssd as recomended or sticked to
the original HDD ? Would it worth it
Hello,
I'm afraid I'm unable to help with your question. However, if you managed to
run windows in seamless mode under Qubes 4rc5, as far as I know, you are
further advanced than all the tips and discussions I could find[1][2][3].
Would you share with us how did you manage to get seamless mode
vPro = bad.
That GitHub page does not recommend vPro. It states that AEM uses a feature
of vPro to detect if vPro software (BIOS) has been tampered with while you
were away. Then you can throw your computer in the trash when AEM throws up
a red flag.
--
You received this message because you
Tai, I would be interested to hear what you would recommend for a qubes laptop.
I just bought in to the intel blob myself. Is it feasible to build a custom
laptop?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group
On 03/13/18 07:27, Yuraeitha wrote:
First, I'll apologize if I sound a bit grumpy today, it's not on you, and I
hope you will remember that below, even though I strongly disagree with you,
it's nonetheless nothing personal.
No offense taken here. You have a right to be grumpy!
Originally
On Sun, 11 Mar 2018 06:51:35 -0700 (PDT)
Michael MENG wrote:
> On Tuesday, February 27, 2018 at 10:27:21 PM UTC+8, Yuraeitha wrote:
> > On Tuesday, February 27, 2018 at 3:18:56 PM UTC+1, Michael MENG
> > wrote:
> > > Yes. I did , but still no luck. Also googled. I did
On Tue, March 13, 2018 12:55 pm, brendan.h...@gmail.com wrote:
> If you bypass the onboard/whitelisted Ethernet and WiFi controllers and
> use USB connected networking, don’t you strongly mitigate remote access
> via Intel ME? It cannot use hardware it doesn’t have code to communicate
> with,
If you bypass the onboard/whitelisted Ethernet and WiFi controllers and use USB
connected networking, don’t you strongly mitigate remote access via Intel ME?
It cannot use hardware it doesn’t have code to communicate with, right?
B
--
You received this message because you are subscribed to
On Saturday, March 10, 2018 at 6:36:25 AM UTC+1, Glen H wrote:
> On Thursday, March 8, 2018 at 8:55:56 AM UTC-5, Glen H wrote:
> > On Thursday, March 8, 2018 at 8:12:59 AM UTC-5, Ed wrote:
> > > On 03/07/2018 10:24 PM, Glen H wrote:
> > > > Hi,
> > > >
> > > > I'm using R4 (having never used R3)
On Tue, March 13, 2018 2:46 am, Tim W wrote:
> On Saturday, March 10, 2018 at 6:01:25 PM UTC-5, Tim W wrote:
>
>> When I try to build anything with qubes-builder I keep getting an error
>> when its verifying tags. Specifically this error below:
>>
>> -> Updating sources for builder...
>> │
>> │
On Monday, March 12, 2018 at 3:02:15 PM UTC+1, steve.coleman wrote:
> I would say that if somebody has such an email in their out box, and you
> know it was removed, then contact Google and resolve the issue rather
> than just complaining here. No offense meant by this, its just that you
> have
Hello,
Am 13.03.2018 2:17 vorm. schrieb "'awokd' via qubes-users" <
qubes-users@googlegroups.com>:
> Is backing up to a removable USB device then the suggested best practice
Backing up to some type of removable storage is a good idea in case your
computer gets lost or heavily damaged.
I
On Tuesday, 13 March 2018 06:37:22 UTC, mrp...@gmail.com wrote:
> On Wednesday, February 14, 2018 at 1:22:42 PM UTC+7, Krišjānis Gross wrote:
> > On Monday, 5 February 2018 14:13:25 UTC, Krišjānis Gross wrote:
> > > Hi,
> > >
> > > I have recently installed Qubes 4.0 rc4 on a new 8th
On Monday, November 6, 2017 at 11:22:18 PM UTC+7, Marek Jenkins wrote:
> > > I'm really glad the 63xx CPUs are also supported by Coreboot. I don't
> > > really mind about Libreboot' philosophical issues - if it works on
> > > Coreboot I'm happy. And now as I have checked the Coreboot Wiki page
On Saturday, November 19, 2016 at 5:47:33 PM UTC+7, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-11-16 00:03, nezna...@xy9ce.tk wrote:
> > If i have intel processor with the vPro technology - should i afraid some
> > "factory vulnerabilities" of that
On Wednesday, February 14, 2018 at 1:22:42 PM UTC+7, Krišjānis Gross wrote:
> On Monday, 5 February 2018 14:13:25 UTC, Krišjānis Gross wrote:
> > Hi,
> >
> > I have recently installed Qubes 4.0 rc4 on a new 8th generation Intel
> > hardware and have an issue that I would like to get help with.
On Wednesday, February 14, 2018 at 1:22:42 PM UTC+7, Krišjānis Gross wrote:
> On Monday, 5 February 2018 14:13:25 UTC, Krišjānis Gross wrote:
> > Hi,
> >
> > I have recently installed Qubes 4.0 rc4 on a new 8th generation Intel
> > hardware and have an issue that I would like to get help with.
Sent from my mobile phone.
> On 12 Mar 2018, at 18:40, David Hobach wrote:
>
>> On 03/11/2018 03:15 PM, David Hobach wrote:
>> An alternative might be to setup the local DNS service in a VM closer to the
>> Internet, i.e. not in the proxy VM which also implements the
39 matches
Mail list logo