repo cache cannot be updated
because of the error mentioned above?
Kind regards
tracked here: https://github.com/QubesOS/qubes-issues/issues/7114
no solution I've seen yet. (I'm also affected)
--
Michael Carbone
Qubes OS | https://www.qubes-os.org
@QubesOS <https://www.twitter.com/
hi folks,
for those in Berlin you are invited to the monthly Qubes Users Berlin
meeting!
the next one will be tomorrow Tuesday October 12 at 19h at xHain. more
details here:
https://qubesusersberlin.github.io
Hope to see you there!
Michael
--
You received this message because you are
, including viewing,
archiving, and processing documents. The talk will review the results of
the recent security audit focusing on the Workstation, and outline
future directions for the project as it approaches general availability.
--
Michael Carbone
Qubes OS | https://www.qubes-os.org
@QubesOS
On 12/13/20 5:17 PM, 'Reece O'Bryan' via qubes-users wrote:
Hello,
I am wondering if anyone has any ideas as to how I could run a screen reader in
Qubes. I use Orca with Debian-based systems, would it be possible to do the
same thing?
I do realize that blind people that want privacy or an
On 8/6/20 3:09 PM, Qubes wrote:
> Perhaps someone here can suggest something better than what I currently
> have. A default Firefox on a default Fedora-32 template does not play
> videos on something like Invidio.us. The video thumbnails display
> everything looks exactly as it should just the
or community,
in academia, & beyond are actively working on these topics and there is
already functionality within Tor Browser that takes these issues into
account. Because China and some other countries actively work on new
methods to identify and block such initial hops, it will continue to be
www.whonix.org/wiki/Donate/Tax-Deductible
thanks for letting me/us know Lorenzo! I'd been in talks with CCT when
they first started but they had told me to wait until they were finished
getting set up. sounds like they are taking projects now, I'll email them.
--
Michael Carbone
Qubes OS | https://ww
On 4/21/19 8:18 PM, Andrew David Wong wrote:
> On 19/04/2019 10.15 PM, Andrew David Wong wrote:
>> On 19/04/2019 1.12 AM, Michael Carbone wrote:
>>> hey all,
>
>>> sorry for the short notice -- I'll be submitting the Season of Docs
>>> application on M
On 04/16/18 16:08, mai...@maiski.net wrote:
> Hello guys,
>
> I am a qubes user for nearly three years now and would love to meet
> other people, discuss, learn from each other, contribute...
> That is why i would like to organize a meetup in the city where i am
> currently residing - Berlin.
>
On 03/27/2018 01:58 PM, 'TFQOS' via qubes-users wrote:
> On 27 March 2018 5:40 PM, cubit wrote:
>
>> 27. Mar 2018 09:45 by mich...@qubes-os.org:
>>
>>> couldn't figure out a fast solution so I downgraded back to v1.9.9 for
>>> the time being.
>>>
>>> You can do the same by
On 03/27/2018 06:45 AM, Michael Carbone wrote:
> On 03/27/2018 06:41 AM, 'Eric Barrett' via qubes-users wrote:
>> On Tuesday, March 27, 2018 at 5:45:56 AM UTC-4, Michael Carbone wrote:
>>> couldn't figure out a fast solution so I downgraded back to v1.9.9 for
>>> the tim
On 03/27/2018 06:41 AM, 'Eric Barrett' via qubes-users wrote:
> On Tuesday, March 27, 2018 at 5:45:56 AM UTC-4, Michael Carbone wrote:
>> couldn't figure out a fast solution so I downgraded back to v1.9.9 for
>> the time being.
>>
>> You can do the same by down
you have to run:
>
> 'sudo /usr/lib/qubes/qubes-setup-dnat-to-ns'
>
> for doing it effective.
FYI this is the issue I created to try to collect clear instructions for
Bitmask users:
https://github.com/QubesOS/qubes-issues/issues/2021
the ticket is still open and once clear documentation is creat
over to the downloads page.
I also like your work on the QubesTor iso, moves us a bit towards
Tails-like functionality:
https://github.com/QubesOS/qubes-issues/issues/2024
--
Michael Carbone
Qubes OS | https://www.qubes-os.org
@QubesOS <https://www.twitter.com/QubesOS>
PGP fingerprint
I try to start a VM an alert message appears in the upper left telling
> that VM kernel does not exists at
> /var/lib/qubes/vm-kernels/4.4.67-13/vmlinuz and it is right: kernels are
> all newer than 4.9.
>
> But why is it looking for 4.4.67-13? Hope there is a fix.
>
>
I have just submitted a pull request to update that
doc to reflect that fact:
https://github.com/QubesOS/qubes-doc/pull/452
--
Michael Carbone
Qubes OS | https://www.qubes-os.org
@QubesOS <https://www.twitter.com/QubesOS>
PGP fingerprint: D3D8 BEBF ECE8 91AC 46A7 30DE 63FC 4D26 84A7 33B4
y would we want this outcome?
Your Librem 13 rev2 will probably work fine with Qubes, feel free to
make a HCL report and share it with the rest of the community, I'm sure
others would appreciate it:
https://www.qubes-os.org/doc/hcl/
--
Michael Carbone
Qubes OS | https://www.qubes-os.org
@QubesOS <ht
o qubes-dom0-update qubes-template-fedora-25
as unman mentions you can also upgrade an existing Fedora template
rather than download a fresh new one:
https://www.qubes-os.org/doc/template/fedora/upgrade-23-to-24/
--
Michael Carbone
Qubes OS | https://www.qubes-os.org
@QubesOS <https://www.t
h you might also like to use.
> (see https://osresearch.net) - but start with plain coreboot+qubes, that's
> a steep enough learning curve already :)
FYI x220 also has heads support:
https://github.com/osresearch/heads/pull/190
--
Michael Carbone
Qubes OS | https://www.qubes-os.org
@Qubes
Marek Marczykowski:
> On Tue, Apr 18, 2017 at 05:33:00PM +0000, Michael Carbone wrote:
>> Joonas Lehtonen:
>>> Hi,
>>>
>>> just a quick notice about todays kernel update.
>>>
>>> After upgrading, the new kernel 4.4.55 became the new default f
> boot the vm
Encountered the same issues on update. There was also a broken pipe
error during the update process.
Workaround works, needs to be done manually for each affected VM (which
qvm-ls -k lists).
--
Michael Carbone
Qubes OS | https://www.qubes-os.org
@QubesOS <https://www.twitter.com/Qub
ve more manufacturers and hardware certified, both
for 3.x and 4.x. There are some (potentially) on the horizon, like:
https://minifree.org/product/libreboot-d16/
Feel free to search this mailing list for past discussions on Purism.
--
Michael Carbone
Qubes OS | https://www.qubes-os.org
@Qub
Me:
> Michael Carbone:
>> Me:
>>> Qubes users beware. Riseup Services (including email)are likely
>>> compromised by State actors.
>>> For more info and to verify above statement visit
>>> https://riseup.net/canary {here you'll see that the canar
haaber:
> On 01/28/2017 07:05 PM, Michael Carbone wrote:
>> haaber:
>>> On 01/27/2017 09:47 PM, taii...@gmx.com wrote:
>>>> On 01/27/2017 10:11 AM, '01v3g4n10' via qubes-users wrote:
>>>>> On Friday, January 27, 2017 at 7:19:10 AM UTC-6, Bernhard wrote
the current poor situation of firewalling in Android to *protect against
non-Tor identity leaks*.
It seems pretty orthogonal to what you want to discuss with this thread
- using mobile routers as a firewall for non-phone devices (Qubes)
against active attackers.
--
Michael Carbone
Qubes OS |
shutdown your debian-9 template.
4. turn off your existing sys-net. change its template to debian-9 in VM
Manager > VM Settings. ensure that there is your wireless network
controller assigned to it in VM Settings > Devices. (If no network
controller exists, go into your BIOS and see if there are
ements from the Riseup team.
It sounds like they were served with something boring, but because of
how they defined their warrant canary they had to not update it.
Removing a warrant canary does not mean compromise, which is one of the
weaknesses of poorly defined (and followed) warrant canaries.
--
Marek Marczykowski-Górecki:
> On Fri, Nov 18, 2016 at 02:49:00PM +0000, Michael Carbone wrote:
>> Is there an easy way to disable split-gpg notifications? They are just
>> screen noise, and in XFCE cover the time and systray by default.
>
> The easy (hacky) way is to co
ent could just decrypt emails in mass when the
user is AFK to avoid notifying the user, so I see little security benefit.
Thanks,
Michael
--
Michael Carbone
Qubes OS | https://www.qubes-os.org
@QubesOS <https://www.twitter.com/QubesOS>
PGP fingerprint: D3D8 BEBF ECE8 91AC 46A7 30DE 63FC
Thanks,
Michael
--
Michael Carbone
Qubes OS | https://www.qubes-os.org
@QubesOS <https://www.twitter.com/QubesOS>
PGP fingerprint: D3D8 BEBF ECE8 91AC 46A7 30DE 63FC 4D26 84A7 33B4
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group
command:
>
>$ sudo dnf install google-chrome
FYI if you use the Debian 8 template you can install Chromium (the free
and open source version of Chrome) with:
sudo apt-get install chromium
--
Michael Carbone
Qubes OS | https://www.qubes-os.org
@QubesOS <https://www.twitter.co
an issue for it:
https://github.com/QubesOS/qubes-issues/issues/2291
--
Michael Carbone
Qubes OS | https://www.qubes-os.org
@QubesOS <https://www.twitter.com/QubesOS>
PGP fingerprint: D3D8 BEBF ECE8 91AC 46A7 30DE 63FC 4D26 84A7 33B4
--
You received this message because you are su
Andrew David Wong:
> On 2016-08-12 15:31, johnyju...@sigaint.org wrote:
>> (Is that Debian Template manager a paid position? :) )
>
> I think that depends on the current funding situation (CCing Michael).
currently no, though funding is actively being sought for it.
--
Michael
33 matches
Mail list logo