> while initially I thought it would be interesting to try, the only situation
> when yubikey could actually improve security is having to boot a Qubes PC
> under unavoidable surveilance.
came to the same conclusion - probably not worth the security
tradeoff... Perhaps one can implement a 2FA
On Thursday, August 25, 2016 at 1:41:51 PM UTC, richar...@gmail.com wrote:
> On Wednesday, August 24, 2016 at 3:15:09 PM UTC+1, Foppe de Haan wrote:
> > On Wednesday, August 24, 2016 at 4:14:12 PM UTC+2, Foppe de Haan wrote:
> > > On Thursday, August 18, 2016 at 6:40:42 PM UTC+2, Jovan Miloskovski
> I have built Arch Linux (and Ubuntu) templates successfully (eventually!),
> but they won't start as the error message: "The Dom0 GUI daemon do not
> support protocol 1:1, requested by the VM" appears. It looks like the
> templates are being built against Qubes 3.2, whereas I'm on 3.1 here.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-28 18:04, Drew White wrote:
> Hi folks,
>
> Just wondering..
>
> I've looked at the backup data for the XML file and it contains
> ALL of the guests on the machine, not just the one I'm backing up.
>
> Is there any particular reason
Any new information on this issue? Is there any way that it will be resolved or
available for use for installation?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
Hi folks,
Just wondering..
I've looked at the backup data for the XML file and it contains ALL of the
guests on the machine, not just the one I'm backing up.
Is there any particular reason for this?
Is it just the way that it does the backup for 1 guest?
--
You received this message because
On Sunday, 28 August 2016 06:56:34 UTC+10, johny...@sigaint.org wrote:
> Hey, does anyone have any luck with getting any form of OSX to fire up
> under Qubes?
>
> After several other failures, I was able to get some iPC ISO build to get
> to a certain point in an HVM, but the mouse didn't work,
On Saturday, 27 August 2016 07:23:33 UTC+10, angelo "angico" costa wrote:
> Hi, all!
>
> I'm experiencing some weird network access issues. I'm using Qubes 3.1.
>
> After logging in to the system, sys-net, sys-firewall and sys-whonix start as
> expected, and network access is normally
On Saturday, 27 August 2016 04:36:52 UTC+10, grzegorz@gmail.com wrote:
> Run the Vm in debug mode and disable seamless integration.
I wish to access the display, not run in debug mode, that completely defeats
the purpose.
I need to find out if it's sitting at the login screen or not.
--
> Hey, does anyone have any luck with getting any form of OSX to fire up
> under Qubes?
>
> After several other failures, I was able to get some iPC ISO build to get
> to a certain point in an HVM, but the mouse didn't work, so I couldn't do
> much, and I couldn't figure out how to get it to any
> But I'll Joanna's page a more detailed read when I'm a bit more refreshed.
Sorry, not just "Joanna's" page; on a quick scan, I see you contributed to
it significantly as well.
I very much look forward to giving it a proper read and review tomorrow.
Cheers, and thanks, Andrew. :)
JJ
--
You
> Thanks for the suggestions. Our goal for Qubes 4.0 is to "decmopose"
> the current Qubes Manager by integrating its functions more seamlessly
> into the desktop environment:
>
> https://github.com/QubesOS/qubes-issues/issues/2132
>
> We hope that this approach will take care of the kinds of
> On Saturday, August 27, 2016 at 1:50:22 PM UTC-7, johny...@sigaint.org
> wrote:
>> BTW, keepassx rocks. I'm working on some scripts to make it a little
>> less
>> painful with all the Ctrl-Alt-C and Ctrl-Alt-V'ing (which also conflicts
>> with the standard konsole paste shortcuts).
>
> I have
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-28 07:07, Cube wrote:
> On Saturday, August 27, 2016 at 10:59:50 PM UTC-7, Andrew David
> Wong wrote:
>> This has been proposed and is being tracked here:
>>
>> https://github.com/QubesOS/qubes-issues/issues/2024
>
> OK that's in the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-28 06:58, Jon Solworth wrote:
> NetworkManager apparently selects which network to connect to based
> on most recently connected network. This policy is really
> unfortunate.
>
> At my university, I connect to my lab's WiFi and when I'm
These are fairly minor cosmetic issues, and if I ever get some of my
current struggles under control, I'll submit patches instead of
suggestions. :)
I think the Qubes folks work on the VM Manager (and install process, which
is amazing) has made major strides in making the system more accessible
I have a mid-2012 MacBook Pro retina system - a 10,1 machine with 2.7GHz i7,
750 gig SSD, and the Intel HD Graphics 4000.
I put Qubes 3.1 on an 8 gig USB and booted the system with option key held
down. Qubes shows up as "EFI Boot" and it starts to a menu with four options:
Test media and
On Sunday, August 28, 2016 at 7:07:06 AM UTC-7, Cube wrote:
> On Saturday, August 27, 2016 at 10:59:50 PM UTC-7, Andrew David Wong wrote:
> any thoughts on either reverting my disposable VM statefile
Well it's easy to revert
qvm-create-default-dvm --default-template
--
You received this
NetworkManager apparently selects which network to connect
to based on most recently connected network. This policy is
really unfortunate.
At my university, I connect to my lab's WiFi and when I'm
out of range to my University's WiFi. My notebook can also
see eduroam, an inter-University
On 08/27/2016 10:50 PM, johnyju...@sigaint.org wrote:
> BTW, keepassx rocks. I'm working on some scripts to make it a little
> less painful with all the Ctrl-Alt-C and Ctrl-Alt-V'ing (which also
> conflicts with the standard konsole paste shortcuts).
That would be nice. KeepassX used to have a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-27 10:50, Cube wrote:
> This would be more in the style of Tails - no persistent state.
>
This has been proposed and is being tracked here:
https://github.com/QubesOS/qubes-issues/issues/2024
You can find some interesting discussion
21 matches
Mail list logo