I am trying to disable automatic partition scanning in sys-usb,
and tried including block.no_part_scan=no in sys-usb’s kernelopts.
However, it had no effect. `block.no_part_scan=0` also doesn’t work.
Did I make a mistake in the command line?
Sincerely,
Demi
--
You received this message
The Arch package management system, Pacman, relies on a secret,
per-machine master key readable only by root. This is used to sign
the other Arch root signing keys. Anyone with access to the secret
part of the master key can present packages that Pacman will trust,
and thus execute arbitrary
This may be due to driver problems. Is there a workaround?
Thank you,
Demi
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
Has anyone had success installing QubesOS on a System76 laptop that
uses Coreboot?
Thank you,
Demi Obenour
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
In all of my time using QubesOS, I have never had reason to believe
that a qube was compromised. Has anyone here had a qube compromised?
Sincerely,
Demi
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop
If an AppVM is compromised, is truncating its private volume (which is
documented) enough to restore it to a trustworthy state? Obviously,
this loses all data on that volume, but the cases I have in mind are
where a DispVM template was accidentally started itself, rather than
a DispVM based on
On 7/19/19 12:19 AM, Andrew David Wong wrote:
> - Coreboot [6] initialization for the x230 is binary-blob-free,
> including native graphic initialization. Built with the
> Heads [7] payload, it delivers an Anti Evil Maid (AEM) [8]-like
> solution built into the firmware. (Even though
Someone I know is interested in using QubesOS. However, they are also a
gamer: if they could not have a Windows VM with access to a dedicated
graphics card for use by games, then QubesOS is not an option for them.
How risky is GPU pass-through? My understanding is that on most
laptops, the
I changed permissions on /srv/ recursively (I think they are 750 now?
Not sure). This is preventing me from using salt:// in state files.
What are the correct permissions for the stuff in that directory?
--
You received this message because you are subscribed to the Google Groups
How can I build a kernel module for an AppVM? I would like to write
some simple kernel modules, but I cannot figure out how to build them.
I get:
make[1]: *** No rule to make target 'tools/objtool/objtool', needed by
'/home/user/kernel/wierd.o'. Stop. make: *** [Makefile:1507:
On 02/21/2018 04:59 PM, Demi M. Obenour wrote:
>
> On 02/21/2018 08:36 AM, awokd wrote:
>> On Wed, February 21, 2018 12:55 pm, Demi Obenour wrote:
>>> Weird. Proxy logs indicate that the proxy never receives a CONNECT
>>> request from Firefox.
>>>
&
rote:
>>
>>
>>> On Tue, February 20, 2018 5:09 pm, Demi M. Obenour wrote:
>>>
>>>> I use GMail and Thunderbird for email, and Firefox as my browser. I
>>>> do email and GitHub from a different domain that is more trusted than
>>>>
I use GMail and Thunderbird for email, and Firefox as my browser. I do
email and GitHub from a different domain that is more trusted than
others (it’s blue).
I would love to restrict its networking abilities by using firewall
rules or a filtering proxy. Sadly, I have not been able to do that
13 matches
Mail list logo