Re: [qubes-users] xdg-open works in dvm, but qvm-open-in-dvm from other qube does not

2024-05-02 Thread qubist
That's secondary, but in case you are interested, mpv gives better playback:

https://forum.qubes-os.org/t/improving-video-playback-speed/21906/8

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20240502144409.3933f3b6%40localhost.


Re: [qubes-users] xdg-open works in dvm, but qvm-open-in-dvm from other qube does not

2024-05-01 Thread qubist
On Wed, 1 May 2024 11:15:42 +0200 'justanotherquber' via qubes-users wrote:

> Hi, I've been trying to get a dvm to open media files in mplayer in a
> disposable qube. Starting the disposable media qube from dom0 with
> qvm-run --dispvm media-dvm --service -- qubes.StartApp+st works.
> Copying files(same as the ones used to test
> qvm-open-in-vm/qvm-open-in-dvm) to the vm with qvm-copy works.
> Opening the copied files with xdg-open or qubes-open works in the
> dvm. Opening media files in mplayer in the disposable qube with
> qvm-open-in-dvm used to work.

Same here.

> It stopped working after I switched the media qube's template from
> debian-11-minimal to debian-12-minimal.

I am not sure if that per se is the reason. It used to work for me in
debian-12-minimal too.

Here is what I get when I "Open in VM" a text file (VM is based on
debian-12-minimal with thunar, xpdf and mpv installed).

[  277.623816] systemctl[1176]: Failed to connect to bus: No medium found
[  277.649127] qubes.OpenInVM+-storage[1187]: xdg-mime: mimetype argument 
missing
[  277.649430] qubes.OpenInVM+-storage[1187]: Try 'xdg-mime --help' for more 
information.
[  277.678605] qubes.OpenInVM+-storage[1187]: /usr/bin/xdg-open: 882: 
x-www-browser: not found
[  277.679554] qubes.OpenInVM+-storage[1187]: /usr/bin/xdg-open: 882: firefox: 
not found
[  277.680597] qubes.OpenInVM+-storage[1187]: /usr/bin/xdg-open: 882: 
iceweasel: not found
[  277.681603] qubes.OpenInVM+-storage[1187]: /usr/bin/xdg-open: 882: 
seamonkey: not found
[  277.682573] qubes.OpenInVM+-storage[1187]: /usr/bin/xdg-open: 882: mozilla: 
not found
[  277.683527] qubes.OpenInVM+-storage[1187]: /usr/bin/xdg-open: 882: epiphany: 
not found
[  277.684437] qubes.OpenInVM+-storage[1187]: /usr/bin/xdg-open: 882: 
konqueror: not found
[  277.685364] qubes.OpenInVM+-storage[1187]: /usr/bin/xdg-open: 882: chromium: 
not found
[  277.686320] qubes.OpenInVM+-storage[1187]: /usr/bin/xdg-open: 882: 
chromium-browser: not found
[  277.687446] qubes.OpenInVM+-storage[1187]: /usr/bin/xdg-open: 882: 
google-chrome: not found
[  277.688471] qubes.OpenInVM+-storage[1187]: /usr/bin/xdg-open: 882: 
www-browser: not found
[  277.689353] qubes.OpenInVM+-storage[1187]: /usr/bin/xdg-open: 882: links2: 
not found
[  277.690593] qubes.OpenInVM+-storage[1187]: /usr/bin/xdg-open: 882: elinks: 
not found
[  277.691631] qubes.OpenInVM+-storage[1187]: /usr/bin/xdg-open: 882: links: 
not found
[  277.692557] qubes.OpenInVM+-storage[1187]: /usr/bin/xdg-open: 882: lynx: not 
found
[  277.693781] qubes.OpenInVM+-storage[1187]: /usr/bin/xdg-open: 882: w3m: not 
found
[  277.693832] qubes.OpenInVM+-storage[1187]: xdg-open: no method available for 
opening '/tmp/storage-LVDbTK/TEST.pdf'

Trying to copy the file first and then 'xdg-open TEST.pdf' in the
target VM, I get the same series of errors:

$ xdg-open TEST.pdf 
xdg-mime: mimetype argument missing
Try 'xdg-mime --help' for more information.
/usr/bin/xdg-open: 882: x-www-browser: not found
/usr/bin/xdg-open: 882: firefox: not found
/usr/bin/xdg-open: 882: iceweasel: not found
/usr/bin/xdg-open: 882: seamonkey: not found
/usr/bin/xdg-open: 882: mozilla: not found
/usr/bin/xdg-open: 882: epiphany: not found
/usr/bin/xdg-open: 882: konqueror: not found
/usr/bin/xdg-open: 882: chromium: not found
/usr/bin/xdg-open: 882: chromium-browser: not found
/usr/bin/xdg-open: 882: google-chrome: not found
/usr/bin/xdg-open: 882: www-browser: not found
/usr/bin/xdg-open: 882: links2: not found
/usr/bin/xdg-open: 882: elinks: not found
/usr/bin/xdg-open: 882: links: not found
/usr/bin/xdg-open: 882: lynx: not found
/usr/bin/xdg-open: 882: w3m: not found
xdg-open: no method available for opening 'TEST.pdf'

Then I tried this:

https://unix.stackexchange.com/a/59088

but it changed nothing. Tested with an mp4 file - same result.

I can open the files through thunar, where I can set default app for
the type too. However, thunar does not use xdg-open but exo-open.

Next, I looked at the code of xdg-open (it is a shell script) and I saw
it used some form of desktop environment (DE) detection and acted based
on that.

So, to see what exactly happens:

$ bash -x xdg-open TEST.pdf
...
+ DEBUG 2 'Selected DE gnome3'
...
+ open_gnome3 TEST.pdf
+ gio help open
+ gvfs-open --help
+ open_generic TEST.pdf
...

And there it is: xdg-open wrongly detects gnome3 which is not
installed. Then I checked:

$ printenv | grep XDG_CURRENT_DESKTOP
XDG_CURRENT_DESKTOP=X-QUBES ## NOT XFCE, which is the correct value

After:

$ export XDG_CURRENT_DESKTOP=XFCE

xdg-open works as expected in the current session.

To have "Open in VM" work as well, obviously the above must be set
persistently.

Speculation 1 (needs checking and confirmation):

Since I see in a fedora-xfce-template-based qubes the
XDG_CURRENT_DESKTOP=XFCE, I suppose it is somehow set when XFCE itself
is installed (and not just thunar), so perhaps the fact of the Debian
template being "-minimal" (and not "-xfce") is related to this 

Re: [qubes-users] Microphone disabled in firmware is showing in Qubes

2024-04-27 Thread qubist
The question probably comes down to: Does disabling the microphone make
it invisible or just dysfunctional? Have you researched that?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20240427163230.279efbe5%40localhost.


Re: [qubes-users] Where to run undervolt script?

2024-04-27 Thread qubist
On Sat, 27 Apr 2024 14:30:00 + ales...@magenta.de wrote:

> I still need to know what is best way for undervolt.py to run.

There is no best way to run potentially dangerous software.

> For best way I mean for security and without making more performance
> hit like maybe running a new qube.
> 
> Can someone give advice?

PVM domUs have no direct access to hardware, so perhaps you won't be
able to undervolt your CPU in a domU. Running it in dom0 seems the only
option, however that is also the most dangerous one.

Downloading arbitrary software from the web and running it in dom0 is
highly NOT recommended. The software itself comes with a warning. So...
you have been warned.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20240427163002.18ccb48f%40localhost.


Re: [qubes-users] Qubes OS 4.2.1 has been released!

2024-04-02 Thread qubist
On Mon, 1 Apr 2024 16:33:13 -0700 Andrew David Wong wrote:

> [...] to the average user [...]

Targeting abstract entities is confusing.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20240402082029.3a4c2a7e%40localhost.


Re: [qubes-users] Qubes OS 4.2.1 has been released!

2024-04-01 Thread qubist
Thanks for explaining.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20240401172142.2b375807%40localhost.


Re: [qubes-users] Qubes OS 4.2.1 has been released!

2024-03-27 Thread qubist
On Tue, 26 Mar 2024 14:46:12 -0700 Andrew David Wong wrote:

> ## What's new in Qubes OS 4.2.1?
> 
> [...]
> 
> For more information about the changes included [...]

It would be much better to have a more detailed (yet concise)
changelog. It is highly unlikely that the user will read pages upon
pages of issues on a bug tracker, just to find out what is new.

My $0.02. :)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20240327095752.29f39474%40localhost.


[qubes-users] Where exactly does qubesdb-write write the data?

2024-03-19 Thread qubist
Hi,

Where exactly does qubesdb-write write the data?

What RPC policy is necessary for qube A to be able to read/write
'/somepath' of qube B? (but *no* other paths)

What can this be used for (safely)?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20240318165349.46dbf170%40localhost.


Re: [qubes-users] 80x24 geometry used by qvm-console-dispvm

2024-03-07 Thread qubist
On Wed, 6 Mar 2024 14:48:54 -0800 Andrew David Wong wrote:

> I rejected it, because although it contains a "Why did you implement
> XYZ this way...?" question, the rest of the message implies a "How do
> I...?" request for help or support.

Well, it was rather "I am trying to modify existing functionality".
Anyway, thanks for clarifying. It's a blurry line I guess. :)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20240307080813.5cec4b2f%40localhost.


Re: [qubes-users] 80x24 geometry used by qvm-console-dispvm

2024-03-06 Thread qubist
On Wed, 6 Mar 2024 18:14:53 +0100 Marek Marczykowski-Górecki wrote:

> The way that console works does not support sending information about
> window size (changes).

Do I understand correctly there is no way to change it and it is
impossible, hence not planned?


> You must subscribe to qubes-devel mailing list to post there.

I am subscribed. I was subscribed at the time of posting it, yet it was
explicitly rejected:

On Tue, 05 Mar 2024 14:26:01 -0800 Google Groups wrote:

> Google Groups (https://groups.google.com/d/overview)
> 
> Unfortunately, your recent post to the qubes-devel  
> (https://groups.google.com/d/forum/qubes-devel) group
> was rejected by a group owner or manager.
> 
> Message from the group owner or manager:
> Your message to the qubes-devel group has been rejected. For more  
> information, please see:
> 
> https://www.qubes-os.org/support/
> 
> You may wish to send your message to the qubes-users mailing list
> instead:
> 
> https://www.qubes-os.org/support/#qubes-users
> 
> Possible reasons your post was rejected include:
>* Your post was more relevant to a different group or conversation.
>* Your post did not conform to the posting guidelines of this
> group.
>* Your post needs more information.
> 
> Google Groups allows you to create and participate in online forums
> and email-based groups with a rich community experience. You can also
> use your Group to share documents, pictures, calendars, invitations,
> and other resources.
> 
> 
> Visit Google Groups Help Center at  
> https://support.google.com/groups/answer/46601?hl=en.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20240306183705.48152996%40localhost.


[qubes-users] 80x24 geometry used by qvm-console-dispvm

2024-03-06 Thread qubist
Hello,

What is the reason for the '80x24' geometry of xterm used by
qvm-console-dispvm through the management_dispvm?

I tried to remove the option in the policy file in order to utilize the
full available workspace, as well as to change it to a bigger window,
but in both cases it just stops working.



P.S. I posted that initially in qubes-devel because it fits completely
the "Why did you implement XYZ this way and not the other way?" example
in https://qubes-os.org/support/ but it was rejected. Quite confusing.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20240306154223.450b2348%40localhost.


[qubes-users] Re: Qubes 4,02 Fails on sudo apt-get update

2019-09-30 Thread American Qubist 2.0

>
> UPDATE/FAIL/TWO POSSIBLE REAONS OK so I "accepted explicitly before 
> updates for this repository can be applied", was able to update and install 
> apps to the template. HOWEVER, neither the template nor the AppVMs based on 
> it would open!
>

This might be because I installed way too many apps, to test. I even 
reached some kind of memory warning or error message. 

An intermediate Template/AppVM does work, but as I recall it is one that I 
did NOT run the "accept explicit" update procedure on. (I was able to 
install some but not all of the apps I wanted before running the procedure 
recommended in Github. 


I will try this again , running the "explicit accept" and see if the 
pertinent Template/AppVMs will indeed run. This will confirm whether the 
error was that I bloated out the template with too many apps, or a problem 
with the update and repository atuthentication procedure.  

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/77c4b905-201a-441e-ae78-60b82e9b3f17%40googlegroups.com.


Re: [qubes-users] Neither WiFi card nor USBs work

2019-09-27 Thread American Qubist 001
I wonder - if you install Qubes onto an external ssd will it recognize your 
wifi card and (other) usb's? Also, is this version-sensitive? 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a599f2ac-e401-457e-9f84-09ba96cffd20%40googlegroups.com.


[qubes-users] Re: Qubes 4,02 Fails on sudo apt-get update

2019-09-27 Thread American Qubist 001

Dithub thread

indicates to run "apt update" not "apt-get update". 

This allows user to select Suite change to stable and the update proceeds.

Thereafter, it is possible to install apps which previously would fail.

Note: Prior to the fix, some but not all apps installed.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c39022e6-6644-4af8-991a-ac5fadab4838%40googlegroups.com.


[qubes-users] Re: Qubes 4,02 Fails on sudo apt-get update

2019-09-26 Thread American Qubist 001


On Thursday, September 26, 2019 at 10:26:09 PM UTC-4, American Qubist 001 
wrote:
>
> Never had trouble in Qubes 4.0 is it possible to access the repositories 
> from this testing version? Here is the result of the command:
>
>
> user@debian-10-clone-1:~$ sudo apt-get update
> Hit:1 https://deb.qubes-os.org/r4.0/vm buster 
> InRelease
> Get:2 https://cdn-aws.deb.debian.org/debian buster InRelease [122 
> kB]  
> Get:3 https://cdn-aws.deb.debian.org/debian-security buster/updates 
> InRelease [39.1 kB]
> Reading package lists... Done  
> N: Repository 'https://cdn-aws.deb.debian.org/debian buster InRelease' 
> changed its 'Version' value from '' to '10.1'
> E: Repository 'https://cdn-aws.deb.debian.org/debian buster InRelease' 
> changed its 'Suite' value from 'testing' to 'stable'
> N: This must be accepted explicitly before updates for this repository can 
> be applied. See apt-secure(8) manpage for details.
> N: Repository 'https://cdn-aws.deb.debian.org/debian-security 
> buster/updates InRelease' changed its 'Version' value from '' to '10'
> E: Repository 'https://cdn-aws.deb.debian.org/debian-security 
> buster/updates InRelease' changed its 'Suite' value from 'testing' to 
> 'stable'
> N: This must be accepted explicitly before updates for this repository can 
> be applied. See apt-secure(8) manpage for details.
> user@debian-10-clone-1:~$ 
>

NOTE: THIS IS IN A TEMPLATE VM!!! 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/38f75d7c-c355-481e-9bed-9791fd7c5e82%40googlegroups.com.


[qubes-users] Qubes 4,02 Fails on sudo apt-get update

2019-09-26 Thread American Qubist 001
Never had trouble in Qubes 4.0 is it possible to access the repositories 
from this testing version? Here is the result of the command:


user@debian-10-clone-1:~$ sudo apt-get update
Hit:1 https://deb.qubes-os.org/r4.0/vm buster 
InRelease
Get:2 https://cdn-aws.deb.debian.org/debian buster InRelease [122 kB]  
Get:3 https://cdn-aws.deb.debian.org/debian-security buster/updates 
InRelease [39.1 kB]
Reading package lists... Done  
N: Repository 'https://cdn-aws.deb.debian.org/debian buster InRelease' 
changed its 'Version' value from '' to '10.1'
E: Repository 'https://cdn-aws.deb.debian.org/debian buster InRelease' 
changed its 'Suite' value from 'testing' to 'stable'
N: This must be accepted explicitly before updates for this repository can 
be applied. See apt-secure(8) manpage for details.
N: Repository 'https://cdn-aws.deb.debian.org/debian-security 
buster/updates InRelease' changed its 'Version' value from '' to '10'
E: Repository 'https://cdn-aws.deb.debian.org/debian-security 
buster/updates InRelease' changed its 'Suite' value from 'testing' to 
'stable'
N: This must be accepted explicitly before updates for this repository can 
be applied. See apt-secure(8) manpage for details.
user@debian-10-clone-1:~$ 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/66f7ba71-f9f5-4b51-b41b-bd7e501d4868%40googlegroups.com.


[qubes-users] Re: Which qube is most secure for internet use?

2019-08-22 Thread American Qubist 001


On Friday, August 16, 2019 at 7:52:44 AM UTC-7, O K wrote:
>
> Which qube is most secure when it comes to keeping any identifying info 
> about my computer invisible from anyone on the internet (or if not 
> completely, which qube does this the best)?  Thanks.se 
>

Use a completely different computer if at all possible segregating anything 
that your snoop agencies/torturers/totalitarians/cyberstalkers/thieves or 
other malicious actor should not access. Download to a usb or temporarily 
unlocked encrypted partition imho preferable an external hardrive 
preferable, immediately lock or disconnect. Download via VPN. Maybe TOR but 
in some places you will be arrested or watchlisted if using TOR.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f553578b-e3af-4e99-9538-b71a99ff1f21%40googlegroups.com.


[qubes-users] Wifi connection fails from AppVM am I supposed to connect via ysy-net?

2019-08-22 Thread American Qubist 001
Never had this issue on open wifi but with my new wifi router Ubuntu 
laptops and  Android tablet connect, Qubes does not. I get the passsword 
text box type in password and on Qubes only, no wifi connection. Does not 
make sense to me. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e59f2a2b-9448-4362-8e7d-c7db967f4eef%40googlegroups.com.


[qubes-users] Re: On new installs, is exotic procedure still needed to cure debian apt bug or can we simply update/apt-upgrade from deb template?

2019-08-20 Thread American Qubist 001


On Sunday, August 18, 2019 at 10:39:38 AM UTC-7, American Qubist 001 wrote:
>
> I need to re-install Qubes and last time I installed, maybe around Feb 
> 2019, there was an advisory about an apt-bug which required a fix. Is that 
> now taken care of automatically in the deb-9 template or is that procedure 
> still required?
> 
> This email is confidential to the recipient named in the original. If you 
> receive and are not the named recipient *please delete and notify sender* 
> thank you in advance for your adherence. 
>
> will make sure to use the lhe latest,  but I thought 4.02 was still in 
> beta. 
> Also, the instructions in the QSB are much more complex than simply 
> updating through the gui.Why do you think a regular update would work when 
> the QSB or Qubes documentation advises a much more complex, completely 
> different proceure? 
>
> Somethhing is not right here. It is inconsisitent. If all you needto do is 
> a regulsr simple update, the documentation should reflect thatand not send 
> users through a much more elaboraate templace replacement process.
>

ALSO the QSB says that the bug is actually inthe update process of apt 
itself, so it stands to reason that if there has been a malicious code 
injection, merely updating will not suffice. 

So, are we sure we are on the saame page here??

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bd8b5898-b6fa-4609-a701-b47580f9457b%40googlegroups.com.


[qubes-users] HDMI TV as monitor: no sound

2019-08-20 Thread American Qubist 001
I plug a big screen HDMI-TV on Debian and Fedora (non-Qubes) and get 
picture and sound but on Qubes, which I want now for all online purposes, I 
get picture but the sound is only through the laptop and the HDMI setup 
does not show in the the p3ulse-audio dropdowns. 

Any ideas?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/25d48fa1-729d-4ebe-947f-2ef88c6849ee%40googlegroups.com.


[qubes-users] How to avoid top-posting.

2019-08-19 Thread American Qubist 001
"Dont top-post on this list.

*If your mailer puts the cursor at the top of the message, scroll to the 
bottom before you start typing.*
It takes you seconds, but makes it easier for everyone else who reads
your messages."
=
SOURCE: Unman's signature. 
=
MY "TIP"
If you go to https://groups.google.com you might find it easier to reply 
either
to the group or to an individual, and avoid top-posting.
===
MY COMMENTS: 

A. IMHO this is more helpful than the bare admonition "don't top-post" as

(one) we want to make Qubes as user-friendly and accessible as possible,
(two) that would include this forum,  and 
(three) the default of gmail and other web-mail applications is to top-post.

B. ( I would guess that there may be is a clear and convincing reason to 
create
an exception and deliberate top post, for instance if one has created a 
thread
and wishes to top-post "SOLVED" to implicitly close the discussion. But this
is speculation on my part the ultimate decision revolves on what the 
community
and/or list owner desires.)

C. Admin or user comments welcome but not necessary, this thread can serve 
as a reference to 
new users, people who have been away from the list for a while and forgot 
this, 
or people who are understandbly a bit confused about how to not  top-post. 

D. It might be helpful if there was a way that regular users (non-admins) 
could delete their own posts
and repost if accidentally top posting but I don't know that there is any 
way to do that. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b685f3a6-27f5-44bb-85b4-984ffb6f739a%40googlegroups.com.


[qubes-users] Re: What is the SHA-256 checksum of the Qubes-R4.0.1-x86_64 ISO?

2019-08-18 Thread American Qubist 001

O K you have asked many different questions as you have proceeded, and I 
don't have a problem with that. At this point, you are asking the same 
question as this thread. I direct yo to the stack exchange link in that 
thread, which does ask other questons but they hinge on the answer to the 
quesstion of what gpg command will work to see the footprint of the 
xxx.pubkey file. 
https://groups.google.com/forum/#!topic/qubes-users/v9aaQ1SAG9I

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3df96577-7735-4544-bf7a-d6218798ebb1%40googlegroups.com.


[qubes-users] Re: What gpg cat command works on Qubes 4.x?

2019-08-18 Thread American Qubist 001


On Sunday, August 18, 2019 at 12:30:10 PM UTC-7, threeletteragency wrote:
>
> I created a t-multimedia template and  successfully installed spotify. 
> However, I was unable to find a working gpg command to "cat" the 
> spotify.pubkey. (The quebes webpage directs to a stackexchange discussion 
> which advises a variety of commands, none of which seemed to work on my 
> Qubes 4.x t-multimedia template.)
>

The Qubes instruction page https://www.qubes-os.org/doc/multimedia/  
indicates that the gpg command may be outdated  and directs to this stack 
exchange discusision thread 
https://unix.stackexchange.com/questions/391344/gnupg-command-to-show-key-info-from-file

Apparently, this thread is asking the same question as OK is now asking, 
except that OK is trying to verify the signature for his Qubes .pubkey.

Maybe someone should file an issue/reuest in Qubes 
documentationhttps://www.qubes-os.org/doc/reporting-bugs/

and get this cleared up, as the same question is popping up simultaneously 
from two unrealted users. There is a very specific etiquette regarding bug 
reports and docuemntation changes, which are two different things, but both 
require to read first, then write. (Like listen, then speak, something I 
often have to remind myself in life. )

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/21dda4bd-da9d-4340-8443-96fd77787523%40googlegroups.com.


Re: [qubes-users] Re: What is the SHA-256 checksum of the Qubes-R4.0.1-x86_64 ISO?

2019-08-18 Thread American Qubist 001


*On Sunday, August 18, 2019 at 1:20:30 PM UTC-7, O K wrote:*
>
> *Ok, I figured out the difference between sha and other process and I 
> guess it would be better to use the other process.  I found some good 
> instructions along with qubes instructions so I will try to implement 
> those.  Thanks.*
>
>
Reply: I perform both the sha256sum verification on all downloaded ISO's 
> and also, unless I am lazy or in a rush, verify the signatures with gpg. As 
> stated in another reply, this safeguards in case there is a fake sha256sum 
> which, conveniently, matches a fake ISO installed by a malicious actor. 
>

OK wrote:  Re: What is the SHA-256 checksum of the Qubes-R4.0.1-x86_64 ISO?
Yeah, I just want to know how to get the actual SHA-256 of the Qubes ISO. 
 I don't know how to use DIGESTS.  Is verifying the master file and sig 
file a different process than comparing the sha-256? 


Reply: They are different as per my above answer. However, afaik both not 
either.

Tip: If you have the DIGEST, finding it often being the hard part, you are 
home free. Just find the line that corresponds to the version of the ISO 
you have. The correct sha256sum is listed right there.

*OK wrote:   Sorry, I know it's a pain bc I don't know much, but a yes or 
no is fine, I just want to be sure* 

I been into Qubes about three years still consider myself a newbie. Tip: do 
as much reading and tweaking on one's own before posting.

*OK wrote: And what is top-posting?  Thanks*.

Top posting is when you write above rather than below what you are replying 
to. It is sometimes the default when you hit "Reply" on email, so afaik it 
is better to go to the google groups web page where you have more control.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a076f0a6-4ba9-4bbf-847d-8e0c3f439c8a%40googlegroups.com.


[qubes-users] Re: best and less expensive Lenovo think pad

2019-08-16 Thread American Qubist 001
I lose track of the difference between Ideapads and Thinkpads but I have 
installed Qubes successfully on 4GB RAM Lenovos that cost less than $300 
new, without issue. Nice to upgrade memory to 8 GB though. 

On Monday, August 12, 2019 at 12:26:15 AM UTC-7, 27casa...@gmail.com wrote:
>
> What is the best and less expensive Lenovo think pad for new Qube?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8db243b6-bcd3-401d-8706-e47e430b2b45%40googlegroups.com.


Re: [qubes-users] best and less expensive Lenovo think pad

2019-08-16 Thread American Qubist 001
Is it really so bad just to use the standard EFI with fastboot and secure 
boot disabled? I use that with a password but maybe coreboot is important 
too. No one has physical access afaik unless the landlord is letting 
Russian spies into my apartment. 

On Monday, August 12, 2019 at 3:51:35 AM UTC-7, awokd wrote:
>
> 27casa...@gmail.com : 
> > What is the best and less expensive Lenovo think pad for new Qube? 
> > 
> G505s if you're prepared to Coreboot it yourself. PrivacyBeast if not. 
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fdb6ab29-7daf-49a3-850f-74668ed16b2e%40googlegroups.com.