Re: [EXT] Re: [qubes-users] Google requiring login to access qubes-users

2020-08-18 Thread 'Jackie' via qubes-users

54th Parallel:
(question: would a two trillion ton object the size of an elephant

collapse into a black hole?)



well, a neutron star is more dense, so i don't think so :) as appealing 
as the collapse of apple sounds..


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e0c50dc6-9fe3-97bc-5413-919e2d66175e%40danwin1210.me.


Re: [qubes-users] add-ons in torbrowser

2020-07-30 Thread 'Jackie' via qubes-users

Qubes:

On 7/30/20 10:58 PM, haaber wrote:

Hi this may be a double-post, but I could not find an appropiate help
page. I like to add an adblocker (u-block) to my TBB, since I consider
any browser without adblocking useless, meaning that I will not use it
anyways. So here is my approach:

download .xpi file in anon-whonix, qvm-move it to whonix-gw and there I
would (have liked to) install it. But the torbrowser does not want to be
run in  the template-VM. How procede then? Re-Install the .xpi file at
each reboot   Cheers!

 From a security point you should not customize TOR in any way. TOR's 
strength lies in hiding you in the masses. If everybody using TOR looks 
the same then it would be impossible to identify YOU. If you add one 
specific add-on to TOR and for arguments sake you are the only TOR user 
using that particular add-on you have compromised yourself as you can 
then be identified and tracked (by means of fingerprinting).


Customizing TOR is a bad idea. Just leave it stock standard.


Hi,

This is true. Installing adblock in TB has privacy implications because 
it makes you more unique. It's a convenience vs privacy tradeoff.


However you might decide that for certain uses, the added convenience is 
worth the privacy loss because you're not doing anything particularly 
sensitive where you really need to minimize fingerprintability.


I wouldn't try to install adblock in TB in the template though. I would 
have multiple tor-browsing VMs for different purposes, and in any that 
are less sensitive, where you're browsing sites with annoying ads, 
install adblock in the copy of TB in that specific VM.


Just keep in mind that by customizing TB this way you're increasing the 
ability of an adversary to connect different uses together and conclude 
they're the same person, even across multiple VMs where you make the 
customization.


Btw in some cases you might not need adblock because noscript will 
prevent *some* ads from being displayed (assuming you block javascript). 
So i'd try it out and only install adblock when you need it, when 
fingerprintability is not very important. But for anything sensitive use 
a separate VM/dispVM with no adblock.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/379828e8-7c30-8c68-7bf3-f0a51b32f4c0%40danwin1210.me.


Re: [qubes-users] Another newbie question related to TemplateVMs

2020-05-30 Thread 'Jackie' via qubes-users

viktor.ransm...@gmail.com:

Hello Jackie,

Am Samstag, 30. Mai 2020 00:49:01 UTC+2 schrieb Jackie:


On 2020-05-29 18:26, viktor@gmail.com  wrote:

Am Freitag, 29. Mai 2020 14:01:46 UTC+2 schrieb Frédéric Pierret:

  On 2020-05-29 13:53, viktor@gmail.com  wrote:
  >
  > I'm trying to continue my journey into the various Qubes OS

options from the smaller - and not - from the larger template POV.

  >
  > I'm not asking for any additions to the provided packages

available for example in 'fedora-31-minimal'.

  >
  > All I'm asking for is help to resolve the following question:
  >
  > *What do I need to do in order to activate / enable the copy /

paste pattern via copy-c/v for xterm?

  > *

  Control+Middle mouse clic -> Select to Clipboard. Then, you can

you QubesOS clipboard shortcut (Control+Shift+C).



It may be obvious to you, but for me - coming from the Windows world -

it is not really clear ...


The middle click simply the wheel click but indeed, with only left and

right buttons it's both at the same time. Here when hold Control in
addition to left and right mouse button (keep holding) on xterm, it makes
appearing a little menu where the selection is made by unholding mouse
buttons. On this little menu you would see the 'Select to Clipboard'
option.

For what it's worth i can't get this to work on xterm either. I use
gnome-terminal which lets you right click -> copy (or edit -> copy),
then qubes copy/paste shortcuts work like normal.



Thanks for sending a confirmation, that I'm not the only one having a
problem with the approach described & recommended by Frederic.

Concerning your mention of gnome-terminal. - I'm aware of it, I'm using it
in my 'regular' Qubes - but - in this specific case I don't want to start
with including the whole Gnome Desktop up front.

As I said in my first message: I'l like to start with as few packages as
possible for some qubes ...

With kind regards,

VR


Actually it only wasn't working for me because i missed something. My 
mouse has a middle button, but i wasn't pressing control. Now that i'm 
doing it the right way the menu comes up and i can enable select to 
clipboard.


The tricky part is simulating middle click without a middle button but 
it looks like you got it working. :)


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/833d8bfb-7a41-d40c-8836-830d88265887%40danwin1210.me.


Re: [qubes-users] Another newbie question related to TemplateVMs

2020-05-29 Thread 'Jackie' via qubes-users

Frédéric Pierret:


On 2020-05-29 18:26, viktor.ransm...@gmail.com wrote:

Hello Frederic,

Am Freitag, 29. Mai 2020 14:01:46 UTC+2 schrieb Frédéric Pierret:

 On 2020-05-29 13:53, viktor@gmail.com  wrote:
 >
 > I'm trying to continue my journey into the various Qubes OS options from 
the smaller - and not - from the larger template POV.
 >
 > I'm not asking for any additions to the provided packages available for 
example in 'fedora-31-minimal'.
 >
 > All I'm asking for is help to resolve the following question:
 >
 > *What do I need to do in order to activate / enable the copy / paste 
pattern via copy-c/v for xterm?
 > *

 Control+Middle mouse clic -> Select to Clipboard. Then, you can you 
QubesOS clipboard shortcut (Control+Shift+C).


It may be obvious to you, but for me - coming from the Windows world - it is 
not really clear ...


The middle click simply the wheel click but indeed, with only left and right 
buttons it's both at the same time. Here when hold Control in addition to left 
and right mouse button (keep holding) on xterm, it makes appearing a little 
menu where the selection is made by unholding mouse buttons. On this little 
menu you would see the 'Select to Clipboard' option.


For what it's worth i can't get this to work on xterm either. I use 
gnome-terminal which lets you right click -> copy (or edit -> copy), 
then qubes copy/paste shortcuts work like normal.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/10759012-d729-11a7-688f-fb6d0cc3c8ca%40danwin1210.me.


Re: [qubes-users] How much RAM does the dom0, sys-firewall and sys-whonix "normally" use ?

2020-03-15 Thread 'Jackie' via qubes-users

'M' via qubes-users:

How much RAM does the dom0, sys-firewall and sys-whonix "normally" use ?

I ask because these VM's seems to use quite a lot of RAM on my PC (of cause
a little more or less depending on the activity level):

dom0: About 4000 MB
sys-firewall: About 3000 MB
sys-whonix: About 4000 MB

That means just those three VM's use about 11000 MB of ram.

sys-net: About 400 MB
sys-usb: About 300 MB

Sum: About 700 MB

Sum so far: About 12000 MB

This is when I only have one other Fedora VM open which use about 4000 MB
of RAM (and that is when I only use Firefox).

That means about 16000 MB of RAM used.


If I open the file manager in another Fedora VM it uses about 2000 MB and
if I instead open the Firefox browser in this VM it uses about 3000 MB of
RAM.

In the last scenario the RAM use for all open VM's is as follow:

dom0: About 4000 MB
sys-firewall: About 1600 MB
sys-whonix: About 2200 MB
sys-net: About 400 MB
sys-usb: About 300 MB
Fedora VM: About 4000 MB
Fedora VM: About 3000 MB

SUM: About 15500 MB of RAM

Sometimes I experience my untrusted Fedora VM stall. I assume it's because
of to little amount of RAM at disposal. But I'm not sure.

In this PC I got 16 GB of RAM, but wonder if I shall install at least 16 GB
more.

And if this is normally behavior, it seems to me that the recommendation in
relation to RAM should be 32 GB of RAM instead of only 16 GB, although the
used amount of RAM for some VM's varies according to the amount of RAM at
disposal.


Does your Qubes OS 4.0.3 use about the same amount of RAM as mine, and do
you also sometimes experience that your Firefox browser stall ?


Hi,

VMs will generally use as much RAM as they're allowed to, even though 
they really don't need all that RAM. So i lower the max memory of my VMs 
to something a bit more reasonable.


For sys VMs if max memory is above 512 MB i set it to 512. Sys-firewall 
and sys-whonix and other sys VMs really don't need more than that. (IIRC 
sys-net and sys-usb are set lower than that by default.)


Templates i also set low because all you're doing in templates is updating.

For app VMs it depends on what i'll be doing in it. An app VM used for 
web browsing i'll usually set to 2048 MB, others are usually 1024 or 512 
depending on what they'll be used for, and you can always set it higher 
as needed.


And there's a way to change the memory allocated to dom0 too, i don't 
remember how but it's been posted about on the list before.


(Oh and as far as i know it's totally not necessary to set max mem to 
power of 2 values like i do, that's just the way i like to do it lol)


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5bb03ed4-e933-eb51-e66d-317175d68f75%40danwin1210.me.


Re: [qubes-users] the qubes clipboard

2020-03-01 Thread 'Jackie' via qubes-users

unman:

On Sat, Feb 29, 2020 at 07:02:58PM +, 'Jackie' via qubes-users wrote:

Ulrich Windl:

Hi!

I'm very much confused with the Qubes OS clipboard:
When trying to copy some text from a Temrinal, I mark the text with the mouse then press 
"Ctrl+Shift+C", and I get a confirmation that the text is copied.
However when I try to paste the clipboard in another machine, the contents is 
not what I had marked.
When I use the "Edit->Copy" menu in the Terminal after having marked the text, and then 
press "Ctrl+Shift+C" again, the correct text is put in the Qubes OS clipboard.
Confusingly the Terminal displays the shortcut "Ctrl+Shift+C" for "Edit->Copy".

Isn't that a highly confusing feature (slowing down productive work a lot IMHO)?

Regards,
Ulrich


Hi,

In general, copying text from one VM to another is a four step process.
Highlight text in VM1 document and ctrl+C to copy to VM1 clipboard. Then
ctrl+shift+C to copy to dom0 clipboard. Then in VM2 window ctrl+shift+V to
copy to VM2 clipboard, then ctrl+V to paste into document.

It's pretty fast once you get used to it, just highlight, ctrl+C,
ctrl+shift+C, alt+tab, ctrl+shift+V, ctrl+V.

Terminal is a special case because ctrl+C, ctrl+V doesn't work to
copy/paste, and default terminal shortcuts are the same as qubes inter-vm
copy/paste shortcuts that take precedence. To paste text into terminal i
ctrl+shift+V like normal to copy into VM clipboard, then edit->paste to
paste into terminal. Or to copy from terminal, highlight, edit->copy, then
ctrl+shift+C to copy to dom0 clipboard.

Actually i think it's possible to change the dom0 shortcut so they no longer
conflict, but the occasional edit->copy or edit->paste in terminal isn't too
inconvenient for me.



Also, it depends (naturally) on *which* terminal you use.
I have little experience with gnome-terminal, which is, I think, what
op is using.
Using xterm or uxterm, mouse selection *does* work to copy, and
Ctrl+Shift+C copies that text to clipboard for transmission to another
qube.
Does gnome-terminal need some extra configuration to enable "selection
by mouse"?


Gnome-terminal is what i use too. Actually i'm able to *select* text 
with the mouse, the problem is copying it to VM clipboard. The shortcut 
for copy in gnome-terminal is ctrl+shift+C, which qubes intercepts.


But actually now that i look gnome-terminal allows you to change the 
shortcut in preferences, so you can change it to whatever you want then 
use keyboard shortcuts like normal.


Right click->copy and right click->paste also work.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/47b9533a-1c0d-a5e3-2104-e3ba513c8b91%40danwin1210.me.


Re: [qubes-users] the qubes clipboard

2020-02-29 Thread 'Jackie' via qubes-users

Ulrich Windl:

Hi!

I'm very much confused with the Qubes OS clipboard:
When trying to copy some text from a Temrinal, I mark the text with the mouse then press 
"Ctrl+Shift+C", and I get a confirmation that the text is copied.
However when I try to paste the clipboard in another machine, the contents is 
not what I had marked.
When I use the "Edit->Copy" menu in the Terminal after having marked the text, and then 
press "Ctrl+Shift+C" again, the correct text is put in the Qubes OS clipboard.
Confusingly the Terminal displays the shortcut "Ctrl+Shift+C" for "Edit->Copy".

Isn't that a highly confusing feature (slowing down productive work a lot IMHO)?

Regards,
Ulrich


Hi,

In general, copying text from one VM to another is a four step process. 
Highlight text in VM1 document and ctrl+C to copy to VM1 clipboard. Then 
ctrl+shift+C to copy to dom0 clipboard. Then in VM2 window ctrl+shift+V 
to copy to VM2 clipboard, then ctrl+V to paste into document.


It's pretty fast once you get used to it, just highlight, ctrl+C, 
ctrl+shift+C, alt+tab, ctrl+shift+V, ctrl+V.


Terminal is a special case because ctrl+C, ctrl+V doesn't work to 
copy/paste, and default terminal shortcuts are the same as qubes 
inter-vm copy/paste shortcuts that take precedence. To paste text into 
terminal i ctrl+shift+V like normal to copy into VM clipboard, then 
edit->paste to paste into terminal. Or to copy from terminal, highlight, 
edit->copy, then ctrl+shift+C to copy to dom0 clipboard.


Actually i think it's possible to change the dom0 shortcut so they no 
longer conflict, but the occasional edit->copy or edit->paste in 
terminal isn't too inconvenient for me.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/053ac3c5-0ed6-65fc-10cb-dd22dd2dce4a%40danwin1210.me.


Re: [qubes-users] Installation Failure of Sagemath - More space needed on the filesystem

2019-12-22 Thread 'Jackie' via qubes-users

Ray Joseph:


I am trying to install Sagemath using:

sudo dnf install sagemath

which failed.

Template: fedora-30

This vm was started with default private/system storage 7 GB/10 GB.

Initial memory 400 MB

Max memory 4000 MB

VCPUs no.: 2

Mode:  PVH

The installation transaction summary reports:

Install 893 packages

Total download size:  1.1 G

Installed size: 4.1 G

I answer yes to install.

The system progresses through a portion of the installation and ends with:

Error Summary

Disk Requirements:

   At least 1506GB more space needed for the / filesystem

The second to the last report line is the installation of sagetwx which
needs 1504MB.  Then

the last entry is sagemath which needs 1506MB.

The last entry memory requirement matches the error report for 1506MB.
More may be required.

Qube Manager showed Disk usage for the VM to be zero.  I closed the manager
and reopened.  It then showed 216.78 MiB.  [Is there a way to make this
update in realtime?]

The system storage is (10 GB) is grayed out.  I don't see how to change it
but I don't expect that to be a solution.


Hi,

It sounds like you just need to increase the template's root filesystem 
size ("system storage"). You should be able to change this in the qube 
settings window. (Only for the template, in a template based VM it will 
be grayed out.)


https://www.qubes-os.org/doc/resize-disk-image/

These instructions are for Qubes 4.0. If you're using 3.2 the process is 
different.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e1cc71e3-0098-ea53-e22f-5103aa6e287e%40danwin1210.me.


Re: [qubes-users] Mike's emails

2019-12-13 Thread 'Jackie' via qubes-users

tetrahedra via qubes-users:

On Fri, Dec 13, 2019 at 08:59:16AM +0100, David Hobach wrote:

I am getting very many duplicate copies of Mike's emails, but only of
emails from Mike. Is this happening to anyone else?


Probably because he clicked "reply all" on one of your questions like 
I just did.


No, when that happens (as it does with everyone who replies-all to my
emails) I only get 2 messages. However I currently have 15 copies of
Mike's "Qubes won't help in that situation" email...!


I see this too. I've seen it on qubes-devel also. I guess the problem is 
on his email provider's end?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/82382a65-9bf7-650b-d94a-a63be78da0d8%40danwin1210.me.


Re: [qubes-users] App through apt of dnf to add subtitles to video in template

2019-12-09 Thread 'Jackie' via qubes-users

scurge1tl:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

I would like to apt or dnf install some app able to create, edit and
hardcode subtitles to the mp4 video, to be not forced to use unsigned
programs and utilize the sudo apt updte feature without need to do
otherwise.

Is there possibly any such good app that can be installed through apt
or dnf you know of for debian or fedora?

I use Flowblade in my media-debian template for video editing, but it
seems it doesn't have the option to work with subtitles.


Thank you a ton!


I think handbrake can do what you're looking for? At least i remember 
using it to hardcode subs before.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9740d7da-5129-a99c-7d01-3977b74cc02a%40danwin1210.me.


Re: [qubes-users] Tor qubes-r4.list returning error

2019-11-08 Thread 'Jackie' via qubes-users

scurge1tl:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

I try to onionize the debian-10, but Tor main qubes-r4.list is
returning error. Qubes is set to onionize everything, Whonix onionized
and working well.

I un-comment this line in my /etc/apt/sources.list.d/qubes-r4.list
(and comment everything else):

# Qubes Tor updates repositories
# Main qubes updates repository
deb [arch=amd64]
tor+http://deb.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.
onion/r4.0/vm
buster main

I get following error:

user@debian-10:~$ sudo apt update
Hit:1 http://vwakviie2ienjx6t.onion/debian buster InRelease
Hit:2 http://sgvtcaew4bxjd7ln.onion buster/updates InRelease
Reading package lists... Done
E: The method driver /usr/lib/apt/methods/tor+http could not be found.
N: Is the package apt-transport-tor installed?
E: Failed to fetch
tor+http://deb.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.
onion/r4.0/vm/dists/buster/InRelease

E: Some index files failed to download. They have been ignored, or old
ones used instead.


BTW in my /etc/apt/sources.list I have:

#deb https://deb.debian.org/debian buster main contrib non-free
#deb-src https://deb.debian.org/debian buster main contrib non-free
deb http://vwakviie2ienjx6t.onion/debian buster main contrib non-free

#deb https://deb.debian.org/debian-security buster/updates main
contrib non-free
#deb-src https://deb.debian.org/debian-security buster/updates main
contrib non-free
deb http://sgvtcaew4bxjd7ln.onion buster/updates main contrib non-free


Any ideas?
Thank you!


Hi,

I don't know for sure, but if you haven't yet, try removing the "tor+" 
part. My understanding is that the debian template doesn't need to know 
how to connect via tor, since it's updating over sys-whonix and 
sys-whonix itself routes connections through tor, so you can just put 
the onion address in there and it will work. At least it works for me 
(in whonix templates too).


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a77e851b-b467-0248-9017-1cbf2b385ab3%40danwin1210.me.


Re: [qubes-users] whonix-ws-15-dvm terminal opens in template

2019-10-21 Thread 'Jackie' via qubes-users

tetrahedra via qubes-users:

Expected behavior:

choosing "Disposable: whonix-ws-15 dvm" | Xfce Terminal from the
applications menu opens a terminal window in a new DispVM


Actual behavior:

terminal opens in the whonix-ws-15-dvm template (equivalent to qvm-run
-a)

did I miss something somewhere, or is this a bug?


Is the appmenus-dispvm feature turned on for the dvm template?

qvm-features dvm-template-name appmenus-dispvm 1

https://www.qubes-os.org/doc/disposablevm-customization/

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e3b17cc5-d058-bf84-9a36-a03ec2371ebe%40danwin1210.me.


Re: [qubes-users] Easiest way to redirect USB to a VM?

2019-10-09 Thread 'Jackie' via qubes-users

'awokd' via qubes-users:

Guerlan:

I installed android-tools and it didn't work.

Are you sure I don't need a sys-usb VM?
If you want to try, in that same link that was posted earlier 
(https://www.qubes-os.org/doc/usb-qubes/), look for the part about how 
to create one manually. Pay close attention to how to identify a free 
USB controller. Some machines only have one, in which case it is not an 
option unless you have a PS/2 keyboard.


I haven't done this but according to the docs it's possible to create 
sys-usb even if you depend on a usb keyboard to enter luks passphrase. 
See the "enable a usb keyboard for login" section of the doc page.


I think you do need a sys-usb for what you're trying to do though. USB 
keyboard/mouse and block devices work, but i was never able to get other 
kinds of usb devices working without sys-usb. (I think because dom0 
lacks the needed drivers for them - so it might be possible to install 
the required drivers in dom0 instead? That would present a security risk 
though.)


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b97a85eb-b301-7b42-31e6-1ffc8c6298f5%40danwin1210.me.


Re: [qubes-users] using two whonix-gw instances

2019-09-25 Thread 'Jackie' via qubes-users

Sven Semmler:

In addition to my fairly standard dvm based on whonix-ws connected to 
sys-whonix based on whonix-ws I have now done the following:

1) cloned sys-whonix to sys-whonix-id
2) created app-signal based on whonix-ws
3) installed signal in whonix-ws
4) connected both app-email-private and app-signal to sys-whonix-id

The idea being:

1) sys-whonix and the instances of whonix-ws connected to it are for truly 
anonymous browsing. I have never nor will I ever type in anything even remotely 
identifying into those qubes.

2) sys-whonix-id is used more like a VPN in that the endpoint of the connection 
(my email provider or my phone in case of signal) knows very well who I am ... 
not anonymous at all. However no one in between my PC and those end points 
should be able to tell.

Here is my assumption I would like to check against the members of this group: 
while both instances (since cloned) will use the same entry guards, the 
resulting TOR circuits will be different and there is no way the traffic on the 
one connection can be correlated to the other - right?

/Sven


Hi,

I'm certainly no expert, but i'm not sure having two sys-whonix vms is 
necessary here. Whonix vms have stream isolation so different whonix 
appvms, or even different applications within the same vm, will use 
different tor circuits.


Of course it's possible that just coincidentally two applications in the 
same or different vms could happen to use the same exit node for a 
period of time, but that would also be possible if they use separate 
sys-whonix proxy vms.


But i might be missing something here, so somebody please correct me if so.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4e3a67aa-aa89-952f-daaf-7a91ae6993ae%40danwin1210.me.


Re: [qubes-users] System and Template updates over Tor

2019-09-16 Thread 'Jackie' via qubes-users

duc...@disroot.org:

'awokd' via qubes-users:

You might want to
https://www.whonix.org/wiki/Onionizing_Repositories while you are at it.



Thanks. I'll pull all the Whonix docs for reference, seems like a good idea.


Using onion repos also provides a good visual confirmation that updates 
really are going over tor (in addition to being more secure also), since 
it won't even be able to connect to the .onion repos if it's not using tor.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6ca97343-febc-313f-59c8-f99a13789af9%40danwin1210.me.


Re: [qubes-users] Done with Qubes

2019-08-27 Thread 'Jackie' via qubes-users

O K:

You mean I create a VM with Whonix OS installed (using virtualbox I'm
guessing)?  I will have to research that, but yes I do need to use a VM, or
multiple VM's.  I'd also like to find a way to use Firejail to sandbox
whatever browser I'm using, if that's possible.


The whonix website has pre built images for virtualbox you can download 
and install. You can run firejail inside whonix workstation too.



On Friday, August 23, 2019 at 6:03:55 PM UTC-4, Jackie wrote:


O K:

Thanks for all the help but I've been trying to figure out how to get

Qubes

running for months and I've decided it's just a giant waste of my time
because every time I get one bug fixed, two more show up to take it's
place.  I think it's a brilliant idea but it needs a lot of work and
streamlining before it's ready for public use.  It's a shame because my
privacy and anonymity online are a matter of my personal safety and it
would be nice to have a secure OS.  TAILS is not a fully usable system
either.  I will have to install Ubuntu.  Good luck, everyone.


Hi,

Qubes definitely has a learning curve, but i think it's worth it (and
i'm definitely no linux expert).

But if you don't want to use qubes, one thing you can do for better
security and privacy is install debian/ubuntu and use non-qubes whonix
(you can use virtualbox, which is pretty easy to use). You can have
multiple whonix workstations, and you can create other VMs like debian
as well to compartmentalize your workflows. A solution like this is more
insecure than qubes, but definitely less insecure than just using bare
metal debian/ubuntu for everything. You still get the benefits of
virtualization and compartmentalization, but without the extra security
features of qubes (i'd recommend not using the host os for anything
directly, and doing everything in VMs).


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c94a4f53-df53-cf9c-d4eb-08698ea51f19%40danwin1210.me.


Re: [qubes-users] Done with Qubes

2019-08-23 Thread 'Jackie' via qubes-users

O K:

Thanks for all the help but I've been trying to figure out how to get Qubes
running for months and I've decided it's just a giant waste of my time
because every time I get one bug fixed, two more show up to take it's
place.  I think it's a brilliant idea but it needs a lot of work and
streamlining before it's ready for public use.  It's a shame because my
privacy and anonymity online are a matter of my personal safety and it
would be nice to have a secure OS.  TAILS is not a fully usable system
either.  I will have to install Ubuntu.  Good luck, everyone.


Hi,

Qubes definitely has a learning curve, but i think it's worth it (and 
i'm definitely no linux expert).


But if you don't want to use qubes, one thing you can do for better 
security and privacy is install debian/ubuntu and use non-qubes whonix 
(you can use virtualbox, which is pretty easy to use). You can have 
multiple whonix workstations, and you can create other VMs like debian 
as well to compartmentalize your workflows. A solution like this is more 
insecure than qubes, but definitely less insecure than just using bare 
metal debian/ubuntu for everything. You still get the benefits of 
virtualization and compartmentalization, but without the extra security 
features of qubes (i'd recommend not using the host os for anything 
directly, and doing everything in VMs).


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/77318e98-5a5b-db3a-6b01-f3ff02187db3%40danwin1210.me.


Re: [qubes-users] qvm-run - - service qubes.StartApp+ question

2019-08-20 Thread 'Jackie' via qubes-users

Qwyet:

Hello all,

I'm running qubes 4.0.1 with KDE. I've installed Libre office to a fedora 30 
template using dnf. Reboot the template(fedora-30-fuzer), reboot the app vm and 
add Libre office to it via qubes manager.

My app menu now shows Libre office under the appropriate app vm menu, but the 
option doesn't work. Further investigation shows that the menu is attempting to 
issue the following command:

qvm-run -q -a --service -- Dsktop-Writing qubes.StartApp+libreoffice

I attempted to run this command from dom0 and got the same nothing that I got 
from selecting the menu option. From the template I am able to launch 
libreoffice with the command: libreoffice --writer so the app it self works.

The command

qvm-run -q -a --service -- Dsktop-Writing qubes.StartApp+libreoffice --writer

Returns the error "--writer is not an arg of qvm-run"

I've attempted the following variations of the above qvm command.

qubes.StartApp+libreoffice+--writer
qubes.StartApp+libreoffice-writer
qubes.StartApp+libreoffice--writer
qubes.StartApp+libreoffice'-writer'
Qubes.StartApp+libreoffice'--writer'

Any ideas?
Thanks in advance


Hi,

qubes.StartApp is used to run a .desktop file, so 
qubes.StartApp+libreoffice is looking for a file called 
libreoffice.desktop in the root volume (ie in the template). If there 
isn't one, the command won't work. You can find the .desktop file that 
runs the libreoffice --writer command, and change the command in the 
shortcut in dom0 to match, or if there isn't one you can create one.


Alternatively you can replace the qubes.StartApp+libreoffice with the 
desired command (in this case libreoffice --writer) so it just runs the 
command directly, and it will work. (Not sure if any of the flags for 
the qvm-run command need to be changed in this case tho.) IIRC there's 
some reason why qubes.StartApp is preferred to just running the command 
directly in the shortcut, but i don't remember what it is.


This page gives a lot more info about application shortcuts, but it 
doesn't seem to mention the possibility of just running the command 
directly in the shortcut (i think it used to?)


https://www.qubes-os.org/doc/managing-appvm-shortcuts/

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/773df28f-955c-7c38-ddcc-9b2f8e65c092%40danwin1210.me.


Re: [qubes-users] How to avoid top-posting.

2019-08-20 Thread 'Jackie' via qubes-users

American Qubist 001:

"Dont top-post on this list.

*If your mailer puts the cursor at the top of the message, scroll to the
bottom before you start typing.*
It takes you seconds, but makes it easier for everyone else who reads
your messages."
=
SOURCE: Unman's signature.
=
MY "TIP"
If you go to https://groups.google.com you might find it easier to reply
either
to the group or to an individual, and avoid top-posting.
===
MY COMMENTS:

A. IMHO this is more helpful than the bare admonition "don't top-post" as

(one) we want to make Qubes as user-friendly and accessible as possible,
(two) that would include this forum,  and
(three) the default of gmail and other web-mail applications is to top-post.

B. ( I would guess that there may be is a clear and convincing reason to
create
an exception and deliberate top post, for instance if one has created a
thread
and wishes to top-post "SOLVED" to implicitly close the discussion. But this
is speculation on my part the ultimate decision revolves on what the
community
and/or list owner desires.)

C. Admin or user comments welcome but not necessary, this thread can serve
as a reference to
new users, people who have been away from the list for a while and forgot
this,
or people who are understandbly a bit confused about how to not  top-post.

D. It might be helpful if there was a way that regular users (non-admins)
could delete their own posts
and repost if accidentally top posting but I don't know that there is any
way to do that.


If you're using Thunderbird, the default is to top post, but that can be 
changed by going to account settings -> composition & addressing. There 
should be a dropdown that says start my reply above the quote, change it 
to start my reply below the quote.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bef5cda7-6695-b092-a0ae-5c0e640fdacb%40danwin1210.me.