The problem resolved itself. I looked around and it seems like the site is
put in read-only mode when Discourse does maintenance.
On Thursday, 4 February 2021 at 11:07:15 UTC+8 54th Parallel wrote:
> I noticed that the Discourse site is stuck in read-only mode. I tried
> logging out, bu
I noticed that the Discourse site is stuck in read-only mode. I tried
logging out, but it's not letting me, citing read-only mode.
Anyone else having the same issue?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this
On Wednesday, 2 December 2020 at 05:01:10 UTC+8 evado...@gmail.com wrote:
> looks like not it's at buster-backports...
>
Enable the testing repo by modifyting `/etc/apt/sources.list` in the
TemplateVM and adding `deb https://deb.debian.org/debian testing main`.
Don't forget to set your default
On Tuesday, 1 December 2020 at 16:44:31 UTC+8 evado...@gmail.com wrote:
> New 5.4 kernel announced support Wireguard? Can I install it and them
> create fedora AppVM with wireguard?
>
> Or what is the better way now to install wireguard appvm? Only the way to
> go with Debian 10?
>
> Thanks
>
>
> XSA-346, XSA-457: A malicious domain with a PCI device (e.g., sys-net or
> sys-usb in the default configuration) could try to exploit this
> vulnerability in order to crash the host.
>
Just wanted to point out that there's a very minor typo here ('XSA-457').
Also, since the last QSB was
On Friday, 9 October 2020 at 18:07:56 UTC+8 drw...@gmail.com wrote:
> I should've been a bit more clear but yes by PVH I meant virt_mode == hvm.
>
> On Friday, October 9, 2020 at 3:18:35 AM UTC+2 Jarrah wrote:
>
>>
>> > I've been trying to get a Debian 10 sys-net running with grsecurity as
>> a
On Wednesday, 30 September 2020 at 14:05:20 UTC+8 sandyi...@gmail.com wrote:
> (from Slashdot)
> https://www.theregister.com/2020/09/29/xen_on_rpi_4/
>
*Salivates over the prospect of ARM Qubes*
--
You received this message because you are subscribed to the Google Groups
"qubes-users"
On Tuesday, 15 September 2020 at 01:13:13 UTC+8 m.fernande...@gmail.com
wrote:
> The cloud-based aspect of Chromebooks means that in those situations where
> you don't consider you have much local on-site security, you can gain extra
> security by keeping things in the cloud, and using cloud
On Wednesday, 26 August 2020 at 10:52:47 UTC+8 sv...@svensemmler.org wrote:
> Here are my thoughts: security is on a spectrum, here are two extremes:
>
> a)
> - - completely offline
> - - in a locked room at a secure location
> - - completely shielded
> - - I never leave that room
>
> b)
>
On Wednesday, 26 August 2020 at 11:00:36 UTC+8 sv...@svensemmler.org wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 8/22/20 10:10 AM, unman wrote:
> > To deal with the question here, I use debian minimal templates
> > extensively, (NOT with qubes-vm-hardening), and have
On Monday, 27 July 2020 at 23:52:20 UTC+8 fiftyfour...@gmail.com wrote:
>
> Hi Claudia,
>
> I'm suffering from the same problem as you, and 'dmesg | grep -i
> snd_hda_intel' brought me to this thread.
>
> My sound was originally working fine after I updated dom0 and domus
> (tested via
On Sunday, 23 August 2020 at 07:51:11 UTC+8 one7...@gmail.com wrote:
> Hello,
>
> I'm trying to install mirage-fw with a Fedora-32 Build-AppVM and run into
> the following error:
>
> OCI runtime create failed: this version of runc doesn't work on cgroups
> v2: unknown
>
[...]
>
Any ideas how
On Saturday, 22 August 2020 at 18:57:22 UTC+8 Frank Schäckermann wrote:
> I am not sure what you mean with „behind a vpn vm“.
>
> My setup is such that I have the sys-net VM which is used as network vm in
> sys-firewall and a few sys-vpn-xxx. sys-firewall in turn is used as network
> vm for all
On Saturday, 22 August 2020 at 17:37:24 UTC+8 Qubes wrote:
>
> Yes a big difference, but the two are intertwined in ways that it is
> impossible to separate them. If you believe an operating system from
> Google, Microsoft, Apple, or any other tech giant, provides
> "near-absolute" security I
On Friday, 21 August 2020 at 16:58:48 UTC+8 54th Parallel wrote:
> I'm having the same issue with disposable firewalls built on
> debian-10-minimal, with the minimum amount of packages, on
> brand-spanking-new installations (plural) being unreliable firewalls. They
> someti
On Saturday, 22 August 2020 at 01:35:05 UTC+8 Qubes wrote:
>
> If you configure Firefox and uMatrix properly you should see less of
> these funnies creep up. Have a look at this guide,
>
>
On Friday, 21 August 2020 at 23:35:05 UTC+8 deeplow wrote:
> It's working just fine for me (also tried it in chromium version
> 83.0.4103.116). Does it work for you in other browsers?
>
Working fine on Firefox and Tor Browser, but not Chrome 84.0.4147 on Chrome
OS (yes, I'm a dirty Google
On Friday, 21 August 2020 at 01:21:11 UTC+8 a...@qubes-os.org wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> Dear Qubes community,
>
> We're pleased to announce the launch of a new forum for Qubes OS users:
>
> https://qubes-os.discourse.group
>
Not sure if I'm the only
On Thursday, 20 August 2020 at 20:08:10 UTC+8 donoban wrote:
> Maybe your problem is Opengl not being hardware accelerated. Try
> switching to XRender under System Settings -> Display and Monitor ->
> Compositor -> Rendering backend
>
KDE was already uninstalled when you posted this so I
On Tuesday, 11 February 2020 at 00:56:07 UTC+8 awokd wrote:
>
> Systemctl in sys-firewall tells me qubes-firewall.service is "loaded
> active running", if that helps.
>
> --
> - don't top post
> Mailing list etiquette:
> - trim quoted reply to only relevant portions
> - when possible, copy
On Friday, 21 August 2020 at 01:21:11 UTC+8 a...@qubes-os.org wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> Dear Qubes community,
>
> We're pleased to announce the launch of a new forum for Qubes OS users:
>
> https://qubes-os.discourse.group
>
> This is an official user
On Thursday, 20 August 2020 at 13:25:49 UTC+8 Chris Laprise wrote:
> On 8/20/20 12:29 AM, 54th Parallel wrote:
>
> I switch off any nvidia gpus before installation. The company is
> anti-open source and I'm not interested in running drivers that are the
> result of
On Thursday, 20 August 2020 at 06:58:35 UTC+8 Chris Laprise wrote:
> Not an issue with dom0 KDE here. But I did have this problem with
> k/ubuntu on my new AMD Ryzen Thinkpad... graphics driver was not working
> and defaulted to a non-accelerated framebuffer mode. In this case I had
> to
Quick question:
I decided to try out KDE on 4.0 and was liking it until I noticed the low
overall framerate and the high CPU usage of dom0 shown in xentop whenever
there's motion (like dragging windows around). Since I'm using an
i7-1065G7, power shouldn't be an issue, so I was surprised.
Is
On Wednesday, 19 August 2020 at 00:15:08 UTC+8 Robert Spigler wrote:
> This is the real solution for the Intel problem :)
>
> https://github.com/QubesOS/qubes-issues/issues/4318
>
> I believe IBM stated they also have protections against the Rowhammer
> attacks
>
I'm all for having Qubes on
Andrew wrote:
>We're actually working on an announcement about this right now. Stay
tuned!
I see you're very much on top of things. Looking forward to it!
On Tuesday, 18 August 2020 at 21:14:07 UTC+8 awokd wrote:
>
> I imagine China's policy requiring real ID to use the Internet has
> Google
On Monday, 17 August 2020 at 05:11:16 UTC+8 Ari wrote:
> find templates that fit best with your vm and that u know well, dont look
> for templates on the black market and have low ratings
>
Am I missing something, or is there a sketchy unofficial source for
templates with ratings somewhere?
On Monday, 17 August 2020 at 08:38:20 UTC+8 Chris Laprise wrote:
> The mail-archive site doesn't come up prominently in searches and I even
> forgot it existed, but thanks for the reminder.
>
> The list remains in peoples' minds as being a "Google group" so they are
> likely to gravitate
of sys-whonix as the dom0 update VM instead of
writing a separate script to be run after the fact.
On Friday, 14 August 2020 at 22:38:33 UTC+8 54th Parallel wrote:
> On Friday, 14 August 2020 at 19:24:11 UTC+8 disrupt_the_flow wrote:
>
>> I am so confused. Please explain what yo
On Sunday, 16 August 2020 at 01:14:08 UTC+8 Chris Laprise wrote:
> I'm not going to get into details now, but the short story is Intel
> haven't addressed all the sidechannel vulnerabilities, and the long and
> varied trend of Intel vulns points to a fundamentally flawed
> implementation...
On Saturday, 15 August 2020 at 14:39:32 UTC+8 a...@qubes-os.org wrote:
>
> Then don't use it! :)
>
With the new look that makes it so much harder to use (top posting is
default now) and replying to multiple people in a single post is a pain, so
I just might give Thunderbird or Mutt a try.
On Friday, 14 August 2020 at 19:24:11 UTC+8 disrupt_the_flow wrote:
> I am so confused. Please explain what you want to do, but no like in a
> pseudo-script method.
>
The thread above contains all the pertinent information--if you're using
Google Groups, try 'expanding all' and reading through
How does this look?
*Outline of qubes-dom0-update-guard*
*Usage: Use in conjunction with manual dom0 update*
*sudo qubes-dom0-update -y && qubes-dom0-update-guard*
Prompt 1: "Please enter the name of a clean VM with access to Tor (e.g.
anon-whonix): "
Check if entered name is a VM
> Since the lions' share of Qubes installs are Intel based, I think a
> side-channel attack would be the most likely way to breach a Qubes
> system.
I thought Spectre and Meltdown have been dealt with by shutting off
hyperthreading and updating microcode? Also, the latest CPUs have Spectre
34 matches
Mail list logo