Re: [qubes-users] VPN tasket on Qubes 4.2

2024-06-08 Thread rss+qubes
now, at least. RSS -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web

[qubes-users] HCL: Lenovo T470: Intel(R) Core(TM) i5-7300U CPU @ 2.60GHz

2023-08-08 Thread RSS
I have been using Qubes 4.2 alpha RC on this machine as my main drive for about a month now, and so far hardware support during and after installation has been flawless. Everything tried works. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To

Re: [qubes-users] Re: Configure WireGuard on Qubes

2023-07-31 Thread RSS
I used https://privsec.dev/posts/qubes/using-mullvad-vpn-on-qubes-os/ to setup a dedicated VPN VM with the Mullvad GUI. Has some idiosyncrasies, but works really not bad. Been using it for a couple weeks already as a daily drive. On Sun, 30 Jul 2023 01:30:52 -0700 (PDT) klem klen wrote: > I

Re: [qubes-users] qubes packages in Archlinux AUR repo

2021-08-30 Thread rss+qubes
Hi unman, > I cant help with the AUR. > I build Arch packages for 4.0 and 4.1, and update them probably twice > a month ( other constraints permitting) Thanks very much for doing that, my Arch template originally came from your repo. > You can pick up templates and packages at

[qubes-users] mounting root TemplatVM partition in dom0 fails

2021-08-30 Thread rss+qubes
Hi, I have some templates stored in a "file" pool where, for example, I find the following files: private.img private-cow.img root.img root-cow.img I can do this in dom0, no problem: sudo mount private.img /mnt But this fails: sudo mount

[qubes-users] qubes packages in Archlinux AUR repo

2021-08-28 Thread rss+qubes
Hi, Wondering if the Archlinux dev "seberm" is on this list, and what (if anything) is happening with the Qubes AUR packages? https://aur.archlinux.org/packages/?O=0=qubes I have been using these repos (the six of them that are not "empty") to keep my Arch AppVM alive for quite some

[qubes-users] HCL for Lenovo X240

2019-08-05 Thread rss+qubes
Everything works flawlessly except return from suspend, where sys-usb is frozen and needs a restart. I am now in the habit of simply turning off sys-usb before suspending. I did have one nasty surprise: this machine is fitted for a maximum of 8G of RAM. There is in fact only one RAM socket. A

Re: [qubes-users] Re: Qubes 4.0-rc2 :: VMs fail to start

2017-10-31 Thread RSS
I see I am not alone here. > Having the information on which laptops Qubes 4 "should" run or even > more where it is running (Dev Users?) would help. The HCL > https://www.qubes-os.org/hcl/ does not help me, as it has no > information if 4.x is ok for the X230. It looks to me like a bigger

Re: [qubes-users] Re: Just realized one of the major disadvantages of Qubes OS...

2017-01-31 Thread RSS
> > no support for ipv6 > > not really a problem. it is 2017 and I still haven't encountered any > situation where IPv6 is actually being used, despite working a lot > with computers and routers (IPv6 is there but nobody is using it... > Never ever had to use those ridiculous IPv6 addresses,

Re: [qubes-users] Re: installing Signal on Qubes mini-HOWTO

2016-08-19 Thread RSS
> Is F-Droid's Silence any better than Signal given it can run without > Google Play Store? I use CyanogenMod Android minus most of the Google malware (ie. no Google play). In that configuration Signal refuses to work because it (at least) depends on Google Play for notifications. Silence

Re: [qubes-users] Qubes 3.1, Debian Stretch VM: audio not working

2016-08-12 Thread RSS
On Fri, 12 Aug 2016 00:37:59 -0700 Andrew David Wong <a...@qubes-os.org> wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 2016-08-10 04:32, RSS wrote: > > Everything should be update, with Qubes stretch "testing" sources > > turned on. &

[qubes-users] HCL Dell Latitude E6420 i7-2640M

2016-07-08 Thread rss+qubes
is now my full-time "forever" desktop environment. As far as marketing goes, some focus should really be directed at the virtual currency crowd. Qubes' uber-security is a natural fit for those keeping digital wallets on their desktops. rss -- You received this message because you are