-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Swâmi Petaramesh:
> I now have downloaded 3rd_gen_i5_i7_SINIT_67.BIN from Intel, installed
> it per instructions, completely redone everything (including resetting
> the TPM chip in BIOS, uninstalling and reinstallind the AEM RPM...
>
> But still,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Swâmi Petaramesh:
> Hi Rusty Bird, and thanks for your help,
>
> > Is the SINIT module working? Run the "find" command from step 2b of
> > /usr/share/doc/anti-evil-maid/README, but look at the lines for PCRs
> > 1
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
"Everyone loves the Whonix approach of running Tor Browser and the tor
daemon in two separate Qubes VMs, e.g. anon-whonix and sys-whonix.
Let's take it a step further and run Tor Browser (or other Firefox
versions) in a DisposableVM connecting
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Swâmi Petaramesh:
> So after upgrading Xen in dom0 I rebooted the system and... nothing
> special hapenned. AEM displayed my "secret" image as usual, without any
> unusual behaviour or warning whatsoever.
Some things you can check:
Is the SINIT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi Vít,
> When trying to implement a backup script (for a different mechanism
> than the builtin one), I need to start a DVM with an attached (RO)
> image. How can I do it?
If you're running R3.2:
set -e
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi Jeremy!
> In Qubes 3.0, I noticed that source files for the "move to VM"
> command would be deleted even if the move failed due to
> insufficient disk space in the destination VM. (It goes without
> saying that this is a Very Bad Thing.)
That
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi Robert,
> However I would not use the "move to VM" command like this, as I
> experienced those requests getting lost One time files were
> actually deleted, since that time I always use copy instead of
> move.
Sounds troubling. Do you
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
> https://github.com/rustybird/qubes-split-dm-crypt
If anyone has been using this already, please update to version 0.1.1
which contains a security bugfix.
Rusty
-BEGIN PGP SIGNATURE-
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi Andrew!
>> https://github.com/rustybird/qubes-split-dm-crypt
> This looks great, Rusty! Thank you!
I actually took the modern luksFormat parameters from your writeup at
https://www.qubes-os.org/doc/encryption-config/. The 5 sec iteration
time
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi,
I've worked on this mostly out of stubbornness :), but maybe it is
useful for someone here. README.md pasted below.
https://github.com/rustybird/qubes-split-dm-crypt
Rusty
# _Split dm-crypt_ for Qubes R3.2-rc3 and later
**Isolates
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi Andrew,
> On 2016-06-22 21:58, Todd Lasman wrote:
>> On 05/16/2016 11:44 PM, Andrew David Wong wrote: I seem to have
>> this exact same problem, but only after installing Qubes 3.2
>> (worked fine with 3.1) on my Thinkpad T430.
>
> Very
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi Zrubi,
>> There is an issue with updating a template over a vpn: The
>> intercepting updates proxy normally runs in sys-net, which can't
>> see inside the encrypted vpn traffic. This may be a cause of the
>> problem, however it should really
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi Chris & everyone,
> On 06/23/2016 06:53 AM, Andrew David Wong wrote:
>> On 2016-06-23 03:49, Rusty Bird wrote:
>>> Hi Andrew,
>>>
>>>> On 2016-06-22 21:58, Todd Lasman wrote:
>>>>&g
101 - 113 of 113 matches
Mail list logo