/news/2020/01/23/qubes-4-0-3/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl4paCEACgkQ203TvDlQ
MDDzoxAAvZtWxKGs2T3qM0U1w0NstEp5amxj5WjkUlCW5Vf45+QZXfnH9fXeI7gb
1LtpluKpc8SEQMLR+tch61c
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2020-01-16 4:46 PM, David Hobach wrote:
> On 1/15/20 12:59 PM, Andrew David Wong wrote:
>> Shortly after the announcement of 4.0.2 [1], a bug [2] was discovered in
>> the dom0 kernel included in that release. Since the bug would ha
/security/xsa/#312
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2020/01/15/xsa-312-qubes-not-affected/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE
/qubes-4-0-3-rc1/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl4e/oMACgkQ203TvDlQ
MDCqPw//ddfW08ObnL76ed87v0fkDLvViiC1S72udxlettb7pvhkIBv8emKE7YTR
Sm4Wl9AkV
res
on the corresponding qubes-secpack.git repo tags. [2]
[2] Don't just trust the contents of this file blindly! Verify the
digital signatures!
```
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2020/01/15/canary-22/
- --
Andrew David Wong (Axon)
Community Manager, Qu
for the majority of
users, we have temporarily removed it from the Downloads page and
reinstated the latest release candidate (Qubes 4.0.2-rc3) in its place.
On 2020-01-02 8:21 PM, Andrew David Wong wrote:
> Dear Qubes Community,
>
> We're pleased to announce the release of Qu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2020-01-03 7:43 AM, haaber wrote:
> On 1/3/20 3:21 AM, Andrew David Wong wrote:
>> Dear Qubes Community,
>>
>> We're pleased to announce the release of Qubes 4.0.2! This is the second
>> stable point release of Qubes 4.
-guide/#copying-the-iso-onto-the-installation-medium
[4] https://www.qubes-os.org/doc/reporting-bugs/
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2020/01/02/qubes-4-0-2/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
/2019/12/13/qubes-4-0-2-rc3/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl3zp/4ACgkQ203TvDlQ
MDDgVBAAo9cBaha4M9U3sDCFQsHHLN/XwJBY0kVNoI/reOLO3GLSRSyTh9lIiZC3
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2019-12-02 2:32 AM, Frédéric Pierret wrote:
>
> On 2019-12-02 01:01, Andrew David Wong wrote:
> On 2019-11-28 1:16 AM, Claudia wrote:
>>>> Andrew David Wong:
>>>>> Please note that no user action is req
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2019-11-29 8:37 PM, tetrahedra via qubes-users wrote:
> On Fri, Nov 29, 2019 at 04:17:39AM -0600, Andrew David Wong wrote:
>> Please note that no user action is required regarding the OS
>> version in dom0. For details, plea
] https://www.qubes-os.org/doc/supported-versions/#note-on-dom0-and-eol
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2019/11/29/fedora-29-eol/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE
Dear Qubes Community,
We have just published Qubes Security Bulletin (QSB) #054: Xen fix for
XSA-302 found ineffective in Qubes configuration (XSA-306). The text of
this QSB is reproduced below. This QSB and its accompanying signatures
will always be available in the Qubes Security Pack
r than making suggestions. We need
a way to keep track of each actionable issue and organize them all by
priority, type, component, milestone, and so on. The mailing list
doesn't support this, which is why we have a separate issue tracker:
https://www.qubes-os.org/doc/reporting-bugs/
- --
Andr
ere? A large amount of memory allocated to dom0 does not necessarily
indicate a problem: https://www.qubes-os.org/doc/qmemman/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl3Trc8ACgkQ203Tv
om which you sent
this message.
To confirm, the method for unsubscribing oneself is to send a blank
email to:
qubes-users+unsubscr...@googlegroups.com
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH120
earnet. Have you
tried restarting your UpdateVM and trying again?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl3OW0EACgkQ203TvDlQ
MDAq5Q//QGHZX8G82QdM8+7pdR2itVb16vZkufiIfEA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2019-11-14 6:28 AM, Andrew David Wong wrote:
> On 2019-11-13 12:40 PM, Lorenzo Lamas wrote:
>> There are 2 new vulnerabilities in Intel CPU's, also affecting
>> Xen. Xen has issued XSA-304(CVE-2018-12207) and XSA
>&g
-305.html
- --
The Qubes Security Team
https://www.qubes-os.org/security/
```
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2019/11/13/qsb-053/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE
/security/xsa/#304
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2019/11/13/xsa-304-qubes-not-affected/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE
d no
embargo period, so the Qubes Security Team had no advance notice of
them before they were publicly announced.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl3NSEQA
t I'd rather have someone more experienced review it.
>
> Rafael
>
Thank you!
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl3E7/wACgkQ203TvDlQ
MDAjmg/9HGJCpsPR8JnYZjO8
If I set for
>> the defaults instead of the custom partitioning, it appears to
>> move with the install just fine.
>>
>> Since I'm reinstalling from scratch, I'd like to take the
>> opportunity to use the higher encryption levels in
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2019-11-05 10:01 PM, Andrew David Wong wrote:
> On 2019-11-05 8:15 AM, Steve Coleman wrote:
>> On 2019-11-04 22:12, Andrew David Wong wrote: On 2019-11-04 6:05
>> AM, Anac wrote:
>>>>> Hi all,
>>>>&g
ver to "current"?
>
I asked Marek about this. Here is his reply:
"Basically the answer is 'current-testing' is disabled by default,
even in rc builds. This may mean some packages on the rc installation
image are newer than those in the stable repository, but the update
mechanism w
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2019-11-05 8:15 AM, Steve Coleman wrote:
> On 2019-11-04 22:12, Andrew David Wong wrote: On 2019-11-04 6:05
> AM, Anac wrote:
>>>> Hi all,
>>>>
>>>> Is it just me or does the iso really not fit ont
e small enough to fit on a DVD would have
required too many other sacrifices. In the end, we decided that this
was the least bad option.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH120
-bugs/
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2019/11/03/qubes-4-0-2-rc2/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl2
the current rc.
>>
Yes, awokd is correct. A point release does not designate a separate,
new version of Qubes OS. Rather, it designates its respective major or
minor release (in this case, 4.0) inclusive of all updates up to a
certain point. Installing Qubes 4.0 and fully updating it results
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2019-11-01 12:16 PM, Claudia wrote:
> Andrew David Wong: On 2019-10-31 10:01 AM, Claudia wrote:
>> [...]
>
> Question: Is there anything we need to be aware of when installing
> rc's/betas, with regards to upgrading?
>
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2019-11-03 2:44 AM, Andrew David Wong wrote:
> On 2019-10-31 10:01 AM, Claudia wrote:
>> re:
>> https://www.mail-archive.com/qubes-users@googlegroups.com/msg30379.html
>
>> So as I understand, there were two prob
e announcement and letting the mirrors catch up. We plan to publish
that announcement within the next 24 hours.
I'll check with the security team about that pending security issue.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN
t;
Hi Pete,
You should be able to use the Qubes Devices widget in your
Notification Area. Simply hover over the dom0 microphone, then select
the qube to which you'd like to attach the mic.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
/news/2019/10/31/xsa-296-298-301-303-qubes-not-affected/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl27n7UACgkQ203TvDlQ
MDChBA/7BbDaZClar2zTHk3VXfcn8i1nvsqaoK3JaUtEmPvDYujoUHjdB46yu9Ww
spend (S3 sleep) is supported.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl2v8asACgkQ203TvDlQ
MDANmw//dGxaEIW7hzSqU8HWtw1bDtv8BmMnYHQi8v6ILRDj2xJyNSV4VjuTRxPo
Rjdm9RnnlB/oDTyk
le.com/d/topic/qubes-devel/69XbRaJTC-8/discussion
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl2sC1IACgkQ203TvDlQ
MDBBJhAAgEx/x1zl50eCZqzoqRqdrWxd6iuNr/Fep0TLqeODJ9uM38uNIo
e a
> way to save screenshots directly to a VM? Maybe by mounting this VM
> to dom0 (not a security risk I guess, because dom0 already has
> access to everything)
>
You might find this helpful:
https://github.com/QubesOS/qubes-issues/issues/953
- --
Andrew David Wong (Axon)
Commun
ut the characters
>> don't appear when I'm using their respective key combinations.
>>
>> Can you please suggest any solution?
>>
>> Regards, P.
>>
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGN
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2019-10-16 12:48 AM, max via qubes-users wrote:
> tirsdag den 15. oktober 2019 kl. 03.21.03 UTC+2 skrev Andrew David Wong:
>>
>> Dear Qubes Community,
>>
>> We have published Qubes Canary #21. The text of this can
)"*
>>
>> I haven't seen it yet, but having the application integrated with the OS
>> sounds like what Qubes is doing with AppVMs to the user, so very
>> user-friendly.
>>
>> - PhR
>>
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
ht
y! Verify the
digital signatures!
```
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2019/10/13/canary-21/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDA
/2019/10/13/canary-21/
--
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-use
ng your interesting results!
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl2gKAgACgkQ203TvDlQ
MDBbLQ//Xiq2bbxG5ZppvEX1XcMi9xPZTgvxRL+DjxkySXjKfnHZNkdscQdU1C3c
sY7k9W7FlgwcPS6Pb8eNuKZwhKRv9K/9mUfj0
Any suggestions for how to stop this happening?
>
Are you, by any chance, copying into Vi/Vim? That sort of thing happens
when you have "smart indentation" (or similar) enabled in Vim.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
;
Use Emacs in an AppVM.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl2ZFZgACgkQ203TvDlQ
MDAdeBAAj/ogIuRdBfUL1togjNeBZATF0UJ8Fn90j0WKo7PZonydHGh/9TtCFcL+
BmXuCoBOhuftWyWjwwsP8PSMTbT/p3
On 2019-10-04 3:25 AM, 'Oli Sturm' via qubes-users wrote:
On Friday, October 4, 2019 12:43 AM, Andrew David Wong
wrote:
On 2019-10-03 11:42 AM, 'awokd' via qubes-users wrote:
'Oli Sturm' via qubes-users:
Hi,
I found a problem yesterday: I had some markdown text rendered to
HTML
ideos on Qubes",
> you're trying to reach practically everyone and yet Qubes is too
> away from that point.
>
Thank you for the feedback. I will discuss this with the rest of the
Qubes team.
- --
Andrew David Wong (Axon)
Community M
ing change that I can change back?
>
> It's Thunderbird that changed, but the issue is already fixed.
> Update the thunderbird-qubes package from the current-testing repo
> and you're back in business!
>
> /Sven
>
For further details, please see:
https://github.com/QubesOS/qubes-i
e it, might be worth submitting a new
> issue referencing that one?
>
Possibly related: https://github.com/QubesOS/qubes-issues/issues/2845
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3hen
e 4 Signing Key"
pub rsa4096 2017-03-06 [SC]
5817A43B283DE5A9181A522E1848792F9E2795E9
uid [ full ] Qubes OS Release 4 Signing Key
sig 31848792F9E2795E9 2017-03-06 Qubes OS Release 4 Signing Key
sig DDFA1A3E36879494 2017-03-08 Qubes Master Signing Key
Is it
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 9/23/19 4:49 AM, duc...@disroot.org wrote:
> Andrew David Wong:
>> On 9/22/19 6:39 AM, duc...@disroot.org wrote:
>>> In the official documentation "Copying from (and to) dom0",
>>> there is no m
t;
https://www.qubes-os.org/doc/copy-from-dom0/#copying-to-dom0
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl2Hy1IACgkQ203TvDlQ
MDBPfA/+Pe8OGl/VQb+jDPMQzMlDm0MoOYTBZ6zbEm
ing list
rather than qubes-devel. (I'm moving this thread there now.)
You can read more about the different mailing lists here:
https://www.qubes-os.org/support/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7
o-privacybeast-qubes-certification/
[8]
https://www.qubes-os.org/doc/certified-hardware/#qubes-certified-laptop-insurgo-privacybeast-x230
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2019/09/18/qubes-presentations-at-platform-security-summit-2019/
- --
And
872
The documentation has been updated. (Thank you, awokd.)
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl16+ooACgkQ203TvDlQ
MDADkQ//e1TyE2ZNMCoFALN6Rtu4oBi36TuovhkYfL
hunderbird gets its setting from the OS.
>
> Thank you.
>
This is a known bug in Thuderbird:
https://bugzilla.mozilla.org/show_bug.cgi?id=1426907
I managed to get ISO dates by following the workaround in this comment:
https://bugzilla.mozilla.org/show_bug.cgi?id=1426907#c144
- --
e
> this is not in place currently. See [3] for a description of the
> non-public gcc plugin from grsecurity which implements this approach.
>
> [2]:
> https://lists.xenproject.org/archives/html/xen-devel/2018-07/msg00982.html
> [3]: https://grsecurity.net/respectre_announce.p
since this
> filled up my dom0 pretty fast and then failed -> this is the reason why I
> resorted to what Andrew wrote: having the original still in place while
> restoring to different disks, not overwriting anything, just in case
> restoring fails
> * *restoring* the huge (
-devel.
>
The Qubes Security Team is preparing an answer to this question.
Please stand by.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl1
as we know more.
[1]
https://www.qubes-os.org/news/2019/07/09/qubes-4-0-2-rc1/#release-candidate-planning
[2] https://github.com/QubesOS/qubes-issues/issues/5149
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
--
ommended) on my part here. Any thoughts?
[1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=902413
[2] https://bugzilla.redhat.com/show_bug.cgi?id=1658487
[3] https://unix.stackexchange.com/q/364782
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
one level deep. But it's been a long time since I've done this.)
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl1tQQYACgkQ203TvDlQ
MDD7dRAAhG/7LS4k3YFaMaBBF2nTXslPakIiJfE/QeKotiuOZl76
nce it was
relatively small.
On the other hand, if it would be a lot of work that you
(understandably) don't want going to waste, then it would better to
open an issue that describes your proposed documentation enhancement,
and we can hash it out there before you submit a PR.
- --
Andrew David Wong
the only mechanism for migrating my old data to the new installation.
>> This is the only way I would be confident that I weren't screwing
>> anything up.
>>
>>
> Thank you very much for helping me out on this, awokd and Andrew. Currently
> I'm leaning toward taking the sa
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 01/09/2019 8.03 AM, Claudia wrote:
> Andrew David Wong:
>> On 31/08/2019 11.23 AM, Claudia wrote:
>>> The "Custom Installation" doc gives instructions about how to
>>> create a non-default dm-c
dition* to the
> steps outlined in the documentation
> <https://www.qubes-os.org/doc/backup-restore/>?
>
> (I'm on Qubes OS v4 latest)
>
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX
why it didn't. I can
simply remove it from the documentation if it's no longer working.
> 3) Is there a way around it that doesn't involve the hacky
> post-installation migration?
Not that I know of.
> 4) Does qubes provide any way to sidestep the graphical installer,
> i.e. something a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 29/08/2019 12.56 PM, haaber wrote:
> Dear Andrew,
>
> thanks for the reminder. After my last dom0 update ("current
> testing") my laptop does no longer wake up after lip-close: the
> screen keeps black, nothi
tant as the negative feedback, since this
helps us decide when it's okay to migrate packages to stable. This
results in a faster development cycle for Qubes and a better
experience for everyone. Thank you for contributing!
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os
, but that's my workaround
for now. Thanks for any more advice you can offer.
On Tuesday, August 20, 2019 at 1:26:36 AM UTC+9, unman wrote:
>
> On Mon, Aug 19, 2019 at 06:18:00AM -0700, Andrew Todd wrote:
> > I'm having a problem that I'm very confused about.
> >
> > I h
I'm having a problem that I'm very confused about.
I have several AppVMs based on the same fedora-30 TemplateVM. Some of them
are completely cut off from the Internet, some have firewall restrictions,
some connect through sys-firewall but are not restricted.
Today, one specific AppVM has
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 18/08/2019 12.36 PM, Andrew David Wong wrote:
> On 18/08/2019 11.59 AM, O K wrote:
>> I have a verified copy of Qubes installed and want to install it
>> on a second hard drive, so I was hoping to avoid the whole
>> verifica
ewhere in order to
>> provide us with the warm fuzzy feeling of a false sense of
>> security.
>>
>> Instructions here on how to verify the latest Qubes ISO is
>> legitimate:
>> https://www.qubes-os.org/security/verifying-signatures/
>>
- --
A
>>
>>
>> On Friday, August 16, 2019 at 10:51:11 AM UTC-4, O K wrote:
>>>
>>> Mint lets you do it, but not sure about Qubes.
>>>
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATU
ws items).
>
Right, it's just the standard meaning of unsupported or end-of-life
software: no more bug fixes or updates. (Since security updates are a
type of update, that means no more security updates.)
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-
. . . I need to turn over my MS in Information Systems and my BS in
Computer Science. I don't know how I overlooked that - probably because
I've been doing PHP for the last few years, so I only notice // and /**/ as
comments? Sigh . . . I'm sorry for being a bother . . . Thanks, though!
On Sun,
rticipants/project-qubes
[4] https://www.qubes-os.org/doc/doc-guidelines/
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2019/08/07/announcing-our-2019-season-of-docs-project/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qu
; configured and listening on port 8082, so can I just enable caching
> of those packages somewhere in Qubes' networking stream to speed up
> those downloads?
>
> Thanks.
>
Please have a look at this issue:
https://github.com/QubesOS/qubes-issues/issues/1957
- --
Andrew David Wo
:51:02 dom0 qubesd[2584]: File
> "/usr/lib/python3.5/site-packages/qubes/tarwriter.py", line 130, in
> copy_sparse_data
> Aug 04 03:51:02 dom0 qubesd[2584]: output_stream.write(buf_trailer)
> Aug 04 03:51:02 dom0 qubesd[2584]: BrokenPipeError: [Errno 32] Broken pipe
>
Yes, I've expe
in that
time.
On Saturday, June 29, 2019 at 2:31:53 PM UTC+9, Andrew Todd wrote:
>
> Hi,
>
> I've recently updated to a fedora-30 + rpmfusion template for many of my
> AppVMs. I've begun to experience a lot of instability in the following
> situations:
>
> * mpv playing video (oft
y/qubes.UpdatesProxy
>
> # Default rule for all TemplateVMs - direct the connection to sys-net
> $type:TemplateVM $default allow,target=sys-net
>
> and change it to sys-firewall or sys-net2
>
> because I'm getting complaint that my pci device is already attached to
Everything I tried works on Qubes 4.0.1: video, audio, microphone,
wireless, sleep, USB
I attached the automatically generated HCL report.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails
- --
The Qubes Security Team
https://www.qubes-os.org/security/
```
This announcement has also been updated on the Qubes website:
https://www.qubes-os.org/news/2019/07/24/qsb-050/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE
It appears this a result of hyperthreading being enabled, see conversation
in https://github.com/QubesOS/qubes-issues/issues/5210
On Friday, July 26, 2019 at 10:15:31 PM UTC-7, andrew...@gmail.com wrote:
>
> Ok, this wasn't expected but I actually see similar behavior on my T470 -
&
On Sun, Jul 28, 2019 at 11:44 wrote:
> Hi all,
>
> I recently got access to an T490 and wanted to migrate my Qubes
> installation to the machine. I can say that the latest rc release for 4.0.2
> works ok. Although I had to put the PCIe devices to "no-strict-reset=true"
> so my sys-net VM would
I didn't see any reports of Qubes on the T490, so I figured I'd start one:
I just got a T490 (i7 model with 32GB of ram), and was able to get Qubes
4.0.2rc1 installed and usable (after excluding the network card from FLR).
For the most part, it appears it will be as usable as Qubes on my T470
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 25/07/2019 8.21 PM, Andrew David Wong wrote:
> On 25/07/2019 3.27 AM, Claudio Chinicz wrote:
>> Hi Andrew,
>
>> I needed to reinstall Whonix-gw after having removed all
>> templates. I've followed the inst
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 25/07/2019 3.27 AM, Claudio Chinicz wrote:
> Hi Andrew,
>
> I needed to reinstall Whonix-gw after having removed all templates.
> I've followed the instructions contained below on "Workaround"
> https://www.qubes-os.o
-linux/commit/552fd062ea2bb6c2d05faa1e64e172503cacbdbf#diff-6b87ee5cdb9e63b703415a14e5a505cdL192
- --
The Qubes Security Team
https://www.qubes-os.org/security/
```
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2019/07/24/qsb-050/
- --
Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 24/07/2019 9.22 AM, unman wrote:
> On Mon, Jul 22, 2019 at 07:38:27PM -0500, Andrew David Wong wrote:
>>
>> Sorry, I'm not following your example. What does it mean to "do the
>> equivalent of qvm-create and qvm-prefs
ank password into an untrusted web browsing qube.
Having different colors for these makes it easier to avoid such
mistakes.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl033JAA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 22/07/2019 11.05 AM, unman wrote:
> On Sun, Jul 21, 2019 at 03:56:31PM -0500, Andrew David Wong wrote:
>> On 16/07/2019 9.35 AM, unman wrote:
>>> On Sun, Jul 14, 2019 at 09:13:16PM -0500, Andrew David Wong
>>> wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 16/07/2019 9.35 AM, unman wrote:
> On Sun, Jul 14, 2019 at 09:13:16PM -0500, Andrew David Wong wrote:
>> On 14/07/2019 9.08 PM, Andrew David Wong wrote:
>>> On 14/07/2019 8.19 AM, unman wrote:
>>>> On Sat, Jul 13, 20
website:
https://www.qubes-os.org/news/2019/07/18/insurgo-privacybeast-qubes-certification/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl0xRMEACgkQ203TvDlQ
MDAEVQ
t want to check that out first if you're not
familiar with vim.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl0tJjEACgkQ203TvDlQ
MDCcmg//Qar4kDq7jY7TbE0cDxs/9oBA7s6BrD023Ha3O
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 14/07/2019 9.08 PM, Andrew David Wong wrote:
> On 14/07/2019 8.19 AM, unman wrote:
>> On Sat, Jul 13, 2019 at 06:40:00PM -0500, Andrew David Wong
>> wrote:
>>>
>>> 1. When using the Qubes Update widget, a mgmt
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 14/07/2019 8.19 AM, unman wrote:
> On Sat, Jul 13, 2019 at 06:40:00PM -0500, Andrew David Wong wrote:
>>
>> 1. When using the Qubes Update widget, a mgmt DisposableVM is
>> started. Why is that? Is it just for execu
that does the same thing as the Qubes Update widget?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl0qa8sACgkQ203TvDlQ
MDDEgxAAtTn7AdUjlxM/e5I+JZO5qwAZy3f8D3motU15GWOIqc2DCiCX+lbxpiru
S
issue open to address part of this:
https://github.com/QubesOS/qubes-issues/issues/4215
> This is annoying. But if it's allowed to run uninteruppted, it'll
> do the job. <3 /panina
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qu
/security/xsa/#300
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl0lmDoACgkQ203TvDlQ
MDBOcBAAwaKiAqCKO8Y6MWztvdQx5qYFN9bFYeuxiom6WyZWghT6Ga3M3MDE0VGt
F1lGEIs4sQgJiXhIizWWnGq4tPKMbQ/wQfCQ
401 - 500 of 1727 matches
Mail list logo