boom, was just aobut to suggest this. its the beauty of qubes. do it for
any anomaly. when in doubt delete it and recreate it in seconds. its the most
suspect vm of them all.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To
On Monday, December 4, 2017 at 11:09:24 PM UTC-5, tai...@gmx.com wrote:
> On 12/04/2017 07:31 PM, cooloutac wrote:
>
> > I use a usb to ps2 adapter for my keyboard.
> I assume with the mistaken impression that PS/2 is more secure for some
> reason - for the record it sends y
I use a usb to ps2 adapter for my keyboard.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send
On Tuesday, November 28, 2017 at 11:04:06 AM UTC-5, Tom Zander wrote:
> On Tuesday, 28 November 2017 14:18:44 CET cooloutac wrote:
> > Of course many feel Qubes is for more advanced users, and apparently that
> > will become a self fulfilling prophecy in version 4.
>
>
I'd want something with more ram for Qubes. I'd say 8 is minimum, 32gb
recommended. I had 8 on a desktop and was hitting limit sometimes so I added
another 8. A laptop would probably use more.
And most importantly to know if iommu protections work on it. You would
either have to look at
On Thursday, November 23, 2017 at 7:55:21 AM UTC-5, Leo Gaspard wrote:
> On 11/23/2017 03:35 AM, taii...@gmx.com wrote:
> > On 11/22/2017 07:25 PM, xeph...@gmail.com wrote:
> >> This is quite late, but now that UEFI is supported...is secure boot?
> >> Wasn't quite sure what key or signature to
>
> > This is quite late, but now that UEFI is supported...is secure boot?
> > Wasn't quite sure what key or signature to import.
> Why are all the newbies here so obsessed with a microsoft technology?
>
> Just shut it off, it provides no benefit to you. If their code is so
> great and
On Wednesday, November 22, 2017 at 10:44:58 AM UTC-5, haaber wrote:
> This is the first line while booting. So I checked systemctl status
> systemd-modules-load.service that says the below. I see no errors .. all
> OK then??
>
> Thank you, Bernhard
>
> [me @dom0 ]
>
>
On Monday, November 27, 2017 at 2:09:12 PM UTC-5, David Hobach wrote:
> On 11/27/2017 07:57 PM, David Hobach wrote:
> > On 11/27/2017 07:47 AM, Wael Nasreddine wrote:
> >> I'm running 4.0-RC2 on Asrock Z170 pro4/i7-6700k and I got two hard
> >> reboots in the last few hours, often around the time
On Friday, November 10, 2017 at 6:45:07 PM UTC-5, David Schissler wrote:
> Researchers find almost EVERY computer with an Intel Skylake and above CPU
> can be owned via USB
>
On Friday, November 10, 2017 at 6:45:07 PM UTC-5, David Schissler wrote:
> Researchers find almost EVERY computer with an Intel Skylake and above CPU
> can be owned via USB
>
On Wednesday, November 8, 2017 at 11:06:28 PM UTC-5, tai...@gmx.com wrote:
> On 11/08/2017 03:52 PM, Guerlan wrote:
>
> > My computer complains about bad signature when I try to install qubes. Is
> > there a way to install it without disabling secure boot? Does qubes support
> > secure boot? Is
On Thursday, November 9, 2017 at 6:27:01 AM UTC-5, blacklight wrote:
> On Wednesday, 8 November 2017 20:52:14 UTC, Guerlan wrote:
> > My computer complains about bad signature when I try to install qubes. Is
> > there a way to install it without disabling secure boot? Does qubes support
> >
On Thursday, November 2, 2017 at 4:21:38 AM UTC-4, [799] wrote:
> Hello,
>
> >> Did you make it permanently ?
>
> Yes of course :-) but thank you for the reminder, I edited in once in grub
> for the first boot after installation and then applied it in the Grub
> configuration.
> Same results,
I mean maybe there is security implications? I dunno does gui automatically
equal risk? lol but like 799 say options is good.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it,
On Friday, October 27, 2017 at 12:58:13 AM UTC-4, anthon...@gmail.com wrote:
> Is Qubes OS compatible w/ Dell Inspiron 15R N5110?
> http://www.dell.com/support/home/ca/en/cabsdt1/product-support/servicetag/6h9clp1/configuration
>
> Please let me know. Thanks.
download the live usb and try it
On Saturday, October 28, 2017 at 7:50:54 AM UTC-4, [799] wrote:
> Hello,
>
> > What original Qubes Manager did wrong:
> > Didn't expose all per-VM settings (qvm-prefs)
> > Didn't expose all global settings (guid.conf)
> > Didn't expose all device options (USB mostly,
> > block devices were
On Saturday, October 28, 2017 at 7:35:20 AM UTC-4, Yethal wrote:
> W dniu sobota, 28 października 2017 13:14:29 UTC+2 użytkownik [799] napisał:
> > Hello,
> >
> > > While I do know how to use the cli tools I
> > > enjoy a gui for at a glance viewing and tasks,
> > > it is much easier to press
On Saturday, October 21, 2017 at 9:39:44 AM UTC-4, [799] wrote:
> Hello,
>
>
>
> here you can find my scripts, which will rebuild all your sys-vms:
>
> All scripts must be made executable with chmod +x FILENAME
>
>
>
> 1) qvm-destroy.sh
>
> this script is a helper script which can be used
On Saturday, October 21, 2017 at 9:39:44 AM UTC-4, [799] wrote:
> Hello,
>
>
>
> here you can find my scripts, which will rebuild all your sys-vms:
>
> All scripts must be made executable with chmod +x FILENAME
>
>
>
> 1) qvm-destroy.sh
>
> this script is a helper script which can be used
On Tuesday, October 24, 2017 at 1:42:25 PM UTC-4, evo wrote:
> ... do nobody has any USB webcam in use with qubes???
>
> it shows me on sys-usb (lsusb) that the webcam is attached, but i can
> not find it over attach/detach devices and i have no idea, how can i
> mount it on another VM.
how
On Wednesday, October 25, 2017 at 8:50:56 PM UTC-4, cooloutac wrote:
> On Wednesday, October 25, 2017 at 7:53:46 PM UTC-4, Sam Hentschel wrote:
> > I am trying to make a VM that is going to have a lot of applications. I
> > would like to be able to put these applications into gr
On Wednesday, October 25, 2017 at 7:53:46 PM UTC-4, Sam Hentschel wrote:
> I am trying to make a VM that is going to have a lot of applications. I
> would like to be able to put these applications into groups (sub-menus)
> in the main qubes menu using xfce4.
>
> I've looked at the xfce wiki[1]
On Sunday, October 1, 2017 at 6:09:41 AM UTC-4, dr.giz.jd wrote:
> hi
>
> I am having a usb qube issue, I keep getting an error message when trying to
> start the qube
>
> Erro starting VM ‘sys-usb’: Requested operation is not valid: PCI device
> :00: 14.0 is in use by driver xenlight,
On Thursday, October 5, 2017 at 9:38:50 AM UTC-4, Bill Wether wrote:
> On my thinkpad 430, I fix this by setting sys-firewall's netvm to 'none',
> restarting sys-net, and setting it back. Works every time so far.
>
> Cheers
>
> BillW
what about just removing the sys-net and recreating it.
--
On Saturday, September 23, 2017 at 8:53:09 PM UTC-4, janchristop...@gmail.com
wrote:
> Hey folks,
>
> currently trying to install QubesOS 3.2 from USB which I created using rufus.
> After booting the installation medium, I get the message "Couldn't obtain the
> File System Protocol Interface."
On Thursday, September 28, 2017 at 7:11:05 AM UTC-4, Jerry wrote:
> I need to see how much room I have on my ssd preferrably by vm. Seems I
> created and deleted several vms but I seem to have missing space I should
> have. Any help or add on would be appreciated.
qvm-ls -d from dom0.
--
On Friday, September 29, 2017 at 9:46:01 AM UTC-4, cooloutac wrote:
> On Tuesday, September 26, 2017 at 7:33:06 PM UTC-4, Person wrote:
> > On Monday, September 25, 2017 at 7:52:22 AM UTC+8, cooloutac wrote:
> > > On Sunday, September 24, 2017 at 3:59:28 PM UTC-4, Person wrote
On Tuesday, September 26, 2017 at 7:33:06 PM UTC-4, Person wrote:
> On Monday, September 25, 2017 at 7:52:22 AM UTC+8, cooloutac wrote:
> > On Sunday, September 24, 2017 at 3:59:28 PM UTC-4, Person wrote:
> > > It seems that the VMs have already been replaced. Which is good
On Sunday, September 24, 2017 at 8:24:44 PM UTC-4, cooloutac wrote:
> On Thursday, September 21, 2017 at 12:08:41 PM UTC-4, Hugo Costa wrote:
> > On Thursday, 21 September 2017 07:23:01 UTC+1, Alex wrote:
> > > Replying to this thread to report that somebody DID ACTUALLY find an
On Thursday, September 21, 2017 at 12:08:41 PM UTC-4, Hugo Costa wrote:
> On Thursday, 21 September 2017 07:23:01 UTC+1, Alex wrote:
> > Replying to this thread to report that somebody DID ACTUALLY find an
> > exploitable vulnerability in the latest IME 11+, and they will be
> > sharing nothing
On Sunday, September 24, 2017 at 3:59:28 PM UTC-4, Person wrote:
> It seems that the VMs have already been replaced. Which is good considering
> that then I don't need to delete the old templates.
>
> However, the system didn't automatically give me an anon-Whonix or sys-Whonix
> templates, so
On Saturday, September 23, 2017 at 10:31:08 PM UTC-4, Person wrote:
> You were correct (thank you so much!). Apparently I set the Update VM to
> "none" in the Global Settings, so it didn't work. Now installing Whonix works
> fine.
>
> However, uninstalling the old templates still does not work.
On Sunday, September 24, 2017 at 12:23:23 PM UTC-4, cooloutac wrote:
> On Sunday, September 24, 2017 at 9:25:24 AM UTC-4, Patrick Schleizer wrote:
> > Quote from https://www.qubes-os.org/doc/usb/
> >
> > > Caution: By assigning a USB controller to a USB qube, it will no
On Sunday, September 24, 2017 at 9:25:24 AM UTC-4, Patrick Schleizer wrote:
> Quote from https://www.qubes-os.org/doc/usb/
>
> > Caution: By assigning a USB controller to a USB qube, it will no
> longer be available to dom0. This can make your system unusable if, for
> example, you have only one
On Sunday, September 24, 2017 at 12:17:33 PM UTC-4, cooloutac wrote:
> On Sunday, September 24, 2017 at 12:16:34 PM UTC-4, cooloutac wrote:
> > On Thursday, September 21, 2017 at 4:40:42 AM UTC-4, pels wrote:
> > > On Wednesday, September 20, 2017 at 2:54:31 PM UTC+
On Sunday, September 24, 2017 at 12:16:34 PM UTC-4, cooloutac wrote:
> On Thursday, September 21, 2017 at 4:40:42 AM UTC-4, pels wrote:
> > On Wednesday, September 20, 2017 at 2:54:31 PM UTC+2, cooloutac wrote:
> > > On Wednesday, September 20, 2017 at 4:41:58 AM UTC-4, pels
On Friday, September 22, 2017 at 9:39:31 PM UTC-4, Person wrote:
> These are all very good tips, but to be honest, I'm not actually doing
> anything too serious on Qubes so tracking is not that bad (but privacy is
> still valuable).
>
> How would changing the web user agent fare? I tried it,
On Wednesday, September 20, 2017 at 8:50:46 AM UTC-4, Dominique St-Pierre
Boucher wrote:
> On Wednesday, September 20, 2017 at 8:27:40 AM UTC-4, cooloutac wrote:
> > On Monday, September 18, 2017 at 11:02:50 PM UTC-4, Person wrote:
> > > Let's say you have an online identity tha
On Tuesday, September 19, 2017 at 6:13:19 PM UTC-4, Person wrote:
> On Tuesday, September 19, 2017 at 10:59:33 AM UTC+8, Person wrote:
> > I use Qubes-Whonix (precisely Qubes 3.2), and when I try to remove the
> > Whonix Template VMs after removing the anon-whonix VM, it says that the
> >
On Wednesday, September 20, 2017 at 8:27:40 AM UTC-4, cooloutac wrote:
> On Monday, September 18, 2017 at 11:02:50 PM UTC-4, Person wrote:
> > Let's say you have an online identity that you want to keep separate from
> > your personal information. On Qubes, is it possible to kee
On Monday, September 18, 2017 at 11:02:50 PM UTC-4, Person wrote:
> Let's say you have an online identity that you want to keep separate from
> your personal information. On Qubes, is it possible to keep i information
> completely separate without physical separation? I have considered using a
On Tuesday, September 19, 2017 at 9:47:49 PM UTC-4, yre...@riseup.net wrote:
> every fedora25 template update fails ** is this NOW expected behavior?
>
> it fails unless I reboot, after I've done even 1 suspend
>
> really a big pita, as there are so many silly emacs updates, and libthis
> and
On Sunday, September 10, 2017 at 7:21:19 PM UTC-4, Selton wrote:
> Am Dienstag, 4. Oktober 2016 18:53:36 UTC+2 schrieb cooloutac:
> > have you rebooted machine? is it just the default firefox dispvm entry?
> > What if you load a terminal from a vm, then try to load
On Friday, September 8, 2017 at 10:10:01 AM UTC-4, cooloutac wrote:
> On Thursday, September 7, 2017 at 11:00:14 PM UTC-4, tai...@gmx.com wrote:
> > On 09/07/2017 02:40 PM, pixel fairy wrote:
> >
> > > sun microsystems, now part of oracle, used capsules with beads and
On Thursday, September 7, 2017 at 11:00:14 PM UTC-4, tai...@gmx.com wrote:
> On 09/07/2017 02:40 PM, pixel fairy wrote:
>
> > sun microsystems, now part of oracle, used capsules with beads and adhesive
> > to detect rough handling in shipment. have not seen anyone else adopt that.
> >
> > purism
On Friday, September 8, 2017 at 9:40:23 AM UTC-4, cooloutac wrote:
> On Thursday, September 7, 2017 at 11:00:14 PM UTC-4, tai...@gmx.com wrote:
> > On 09/07/2017 02:40 PM, pixel fairy wrote:
> >
> > > sun microsystems, now part of oracle, used capsules with beads and
On Thursday, September 7, 2017 at 11:00:14 PM UTC-4, tai...@gmx.com wrote:
> On 09/07/2017 02:40 PM, pixel fairy wrote:
>
> > sun microsystems, now part of oracle, used capsules with beads and adhesive
> > to detect rough handling in shipment. have not seen anyone else adopt that.
> >
> > purism
On Thursday, September 7, 2017 at 12:49:05 PM UTC-4, cooloutac wrote:
> On Thursday, September 7, 2017 at 9:40:47 AM UTC-4, Patrik Hagara wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA256
> >
> > On 09/07/2017 03:21 PM, cooloutac wrote:
> > > On
On Thursday, September 7, 2017 at 9:40:47 AM UTC-4, Patrik Hagara wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On 09/07/2017 03:21 PM, cooloutac wrote:
> > On Tuesday, August 29, 2017 at 12:46:04 PM UTC-4, Patrik Hagara
> > wrote: On 08/29/2017 0
On Thursday, September 7, 2017 at 9:27:35 AM UTC-4, cooloutac wrote:
> On Friday, September 1, 2017 at 10:46:04 AM UTC-4, James Miller wrote:
> > For those that run Qubes on an off the shelf computer, did you go through
> > any special steps to insure the hardware was clean afte
On Friday, September 1, 2017 at 10:46:04 AM UTC-4, James Miller wrote:
> For those that run Qubes on an off the shelf computer, did you go through any
> special steps to insure the hardware was clean after you purchased, but
> before you installed qubes? I'm about to buy new hardware for my
>
On Tuesday, August 29, 2017 at 12:46:04 PM UTC-4, Patrik Hagara wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On 08/29/2017 06:25 PM, cooloutac wrote:
> > On Tuesday, August 29, 2017 at 11:38:59 AM UTC-4, Patrik Hagara
> > wrote: On 08/29
On Thursday, September 7, 2017 at 9:15:31 AM UTC-4, cooloutac wrote:
> On Tuesday, August 29, 2017 at 1:09:36 PM UTC-4, Leo Gaspard wrote:
> > On 08/29/2017 04:01 PM, cooloutac wrote:
> > > On Monday, August 28, 2017 at 6:36:08 PM UTC-4, Leo Gaspard wrote:
> > >> Jus
On Tuesday, August 29, 2017 at 1:09:36 PM UTC-4, Leo Gaspard wrote:
> On 08/29/2017 04:01 PM, cooloutac wrote:
> > On Monday, August 28, 2017 at 6:36:08 PM UTC-4, Leo Gaspard wrote:
> >> Just encrypting /boot would bring little, as it would still be possible
> >> to
On Tuesday, August 29, 2017 at 12:25:51 PM UTC-4, cooloutac wrote:
> On Tuesday, August 29, 2017 at 11:38:59 AM UTC-4, Patrik Hagara wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA256
> >
> > On 08/29/2017 04:50 PM, cyberian@national.shitposting.agen
On Tuesday, August 29, 2017 at 11:38:59 AM UTC-4, Patrik Hagara wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On 08/29/2017 04:50 PM, cyberian@national.shitposting.agency wrote:
> > Leo Gaspard,
> >
> > I have read about AEM but have never used it, it seems like it is
> > geared
On Tuesday, August 29, 2017 at 12:18:45 PM UTC-4, cooloutac wrote:
> On Tuesday, August 29, 2017 at 10:47:14 AM UTC-4,
> cybe...@national.shitposting.agency wrote:
> > I dont dual boot, as implied earlier. I have had suspicious activity
> > happen before in Qubes3.2 at
On Tuesday, August 29, 2017 at 10:47:14 AM UTC-4,
cybe...@national.shitposting.agency wrote:
> I dont dual boot, as implied earlier. I have had suspicious activity happen
> before in Qubes3.2 at a certain location several times; errors from Xen
> saying that my machine is not returning all of
On Monday, August 28, 2017 at 6:36:08 PM UTC-4, Leo Gaspard wrote:
> Just encrypting /boot would bring little, as it would still be possible
> to modify the unencrypted part of GRUB (that decrypts /boot) to have it
> overwrite the /boot with malicious kernel images (or even to not use the
> ones
On Monday, August 28, 2017 at 3:36:56 PM UTC-4, socks wrote:
> > But Qubes still relies alot on user habits, and in fact the user learning
> > new habits. So Qubes does require even more discipline then linux or
> > windows, to get the full benefits of using it, imo. But I think the avg
> >
On Tuesday, August 22, 2017 at 1:30:39 AM UTC-4, qubester wrote:
> On 08/20/2017 05:48 AM, cooloutac wrote:
> > On Sunday, August 20, 2017 at 11:44:42 AM UTC-4, cooloutac wrote:
> >> On Sunday, August 20, 2017 at 12:42:55 AM UTC-4, qubester wrote:
> >> The guy Brad S
On Saturday, August 26, 2017 at 11:39:23 AM UTC-4,
cybe...@national.shitposting.agency wrote:
> Does Qubes offer a method of securing /boot? not just against USB evil maid
> attacks, but from tampering in general?
>
> for example, while a laptop is off, what would stop a malicious user from
>
On Sunday, August 20, 2017 at 12:42:55 AM UTC-4, qubester wrote:
> On 08/16/2017 05:55 AM, cooloutac wrote:
> > I'm glad Bruce Schneier changed his tune and is no longer encouraging kids
> > to learn how to hack in live environments, cause I think that breeds
> > sociopa
On Sunday, August 20, 2017 at 10:05:39 AM UTC-4, gall...@gmail.com wrote:
> On Sunday, July 23, 2017 at 3:02:43 PM UTC+2, Fun Zork wrote:
> > On Friday, July 21, 2017 at 7:05:56 PM UTC-4, pixel fairy wrote:
> > > have you tried the 4.0 alpha? thats based on fedora 25, which should be
> > > able
On Tuesday, August 15, 2017 at 9:23:14 PM UTC-4, Wim Vervoorn wrote:
> -Original Message-
> From: taii...@gmx.com [mailto:taii...@gmx.com]
> Sent: Tuesday, August 15, 2017 2:50 AM
> To: Wim Vervoorn ; qubes-users
>
> Cc:
I'm glad Bruce Schneier changed his tune and is no longer encouraging kids to
learn how to hack in live environments, cause I think that breeds sociopaths,
and is dangerous. (and we are living in an epidemic)
Now he has to stop calling secure boot security theater, because alot of
people
One of the reasons I liked Qubes, is first of all it seems like the ITL people
use it for their daily personal use. Its more then a fanatical hobby for them.
Thats number one.
Number two, They have a respected reputation in the industry.
3. they don't seem to get involved in industry
On Monday, August 14, 2017 at 8:50:20 PM UTC-4, tai...@gmx.com wrote:
> Secure boot is a stupid Microsoft controlled project to eventually
> remove the ability for commercial PC's to run non windows operating systems.
>
> SB 1.0 specs mandate owner controlled (an option to shut it off), SB2.0
>
On Friday, August 11, 2017 at 11:02:13 AM UTC-4, yura...@gmail.com wrote:
> On Friday, August 11, 2017 at 2:07:44 PM UTC, cooloutac wrote:
> > On Saturday, August 5, 2017 at 12:48:29 PM UTC-4, yura...@gmail.com wrote:
> > > On Saturday, August 5, 2017 at 4:38:23 PM UT
On Wednesday, August 16, 2017 at 10:18:34 AM UTC-4, cooloutac wrote:
> On Monday, August 14, 2017 at 8:50:20 PM UTC-4, tai...@gmx.com wrote:
> > Secure boot is a stupid Microsoft controlled project to eventually
> > remove the ability for commercial PC's to run non windows op
On Monday, August 14, 2017 at 8:50:20 PM UTC-4, tai...@gmx.com wrote:
> Secure boot is a stupid Microsoft controlled project to eventually
> remove the ability for commercial PC's to run non windows operating systems.
>
> SB 1.0 specs mandate owner controlled (an option to shut it off), SB2.0
>
On Saturday, August 5, 2017 at 12:48:29 PM UTC-4, yura...@gmail.com wrote:
> On Saturday, August 5, 2017 at 4:38:23 PM UTC, cooloutac wrote:
> > On Saturday, August 5, 2017 at 12:28:32 PM UTC-4, yura...@gmail.com wrote:
> > > On Saturday, August 5, 2017 at 4:15:43 PM UT
On Tuesday, August 1, 2017 at 9:15:26 PM UTC-4, Jean-Philippe Ouellet wrote:
> On Tue, Aug 1, 2017 at 7:50 PM, cooloutac <raahe...@gmail.com> wrote:
> > Qubes doesn't support secure boot unfortunately. I think its batshit crazy
> > to consider a pc even reasonably secure wi
On Saturday, August 5, 2017 at 12:28:32 PM UTC-4, yura...@gmail.com wrote:
> On Saturday, August 5, 2017 at 4:15:43 PM UTC, cooloutac wrote:
> > On Saturday, August 5, 2017 at 12:05:58 PM UTC-4, yura...@gmail.com wrote:
> > > On Saturday, August 5, 2017 at 3:56:25 PM UT
On Saturday, August 5, 2017 at 12:05:58 PM UTC-4, yura...@gmail.com wrote:
> On Saturday, August 5, 2017 at 3:56:25 PM UTC, cooloutac wrote:
> > On Saturday, August 5, 2017 at 11:34:32 AM UTC-4, yura...@gmail.com wrote:
> > > On Saturday, August 5, 2017 at 3:26:05 PM UT
ever hear of the saying cut your nose to spite your face? Linux communities
are the epitome of that.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
The reason why redhat, ubuntu, and gentoo jumped on the secure boot train, not
just for the security benefits, but because they know if they didn't linux
would indeed be left out in the cold with nothing to live on.
--
You received this message because you are subscribed to the Google Groups
On Saturday, August 5, 2017 at 11:59:19 AM UTC-4, yura...@gmail.com wrote:
> On Saturday, August 5, 2017 at 3:50:18 PM UTC, cooloutac wrote:
> > On Saturday, August 5, 2017 at 11:31:27 AM UTC-4, PR wrote:
> > > Hello,
> > >
> > >
> > > I think
On Saturday, August 5, 2017 at 11:34:32 AM UTC-4, yura...@gmail.com wrote:
> On Saturday, August 5, 2017 at 3:26:05 PM UTC, cooloutac wrote:
> > I'll be disappointed but I'm not going to be mad at them for trying to get
> > paid, they deserve it.
> >
> > But I also w
>
>
> We can and should have both:
> 1) API/terminal commands for 'advanced users' and
> 2) a simple GUI for normal users who just want to use a PC that protects
> their privacy somewhat better than their current Windows 10 Laptop.
>
>
>
> Am 05.08.2017 5:02
I'll be disappointed but I'm not going to be mad at them for trying to get
paid, they deserve it.
But I also wouldn't mind if they turned me into a money asset like windows so
they can keep designing it for home users...lol
I look at things differently. You are referring to linux
I remember when the tor dev Isis on irc, when I asked if anyone used Qubes,
told me she was going to try it out but thought it was too hard to use. She
started asking me how easy it was to install and use. I was in total shock!
This someone who is a genius compared to me and she thought
On Saturday, August 5, 2017 at 10:48:22 AM UTC-4, yura...@gmail.com wrote:
> On Saturday, August 5, 2017 at 2:34:53 PM UTC, cooloutac wrote:
> > On Wednesday, August 2, 2017 at 11:43:34 PM UTC-4, Francesco wrote:
> > > On Wed, Aug 2, 2017 at 9:47 PM, Eva Star <eva...@o
;eva...@openmailbox.org> wrote:
>
> >
>
> > > -BEGIN PGP SIGNED MESSAGE-
>
> > > Hash: SHA256
>
> > >
>
> > > On 08/02/2017 03:04 AM, cooloutac wrote:
>
> > >
>
> > > > oh ok I see, so a taskbar widget or someth
On Wednesday, August 2, 2017 at 11:43:34 PM UTC-4, Francesco wrote:
> On Wed, Aug 2, 2017 at 9:47 PM, Eva Star <eva...@openmailbox.org> wrote:
> -BEGIN PGP SIGNED MESSAGE-
>
> Hash: SHA256
>
>
>
> On 08/02/2017 03:04 AM, cooloutac wrote:
>
>
>
On Wednesday, August 2, 2017 at 11:43:34 PM UTC-4, Francesco wrote:
> On Wed, Aug 2, 2017 at 9:47 PM, Eva Star <eva...@openmailbox.org> wrote:
> -BEGIN PGP SIGNED MESSAGE-
>
> Hash: SHA256
>
>
>
> On 08/02/2017 03:04 AM, cooloutac wrote:
>
>
>
On Wednesday, July 19, 2017 at 6:26:16 PM UTC-4, yreb-qusw wrote:
> On 07/19/2017 12:17 PM, cooloutac wrote:
> >
> >
> > secure boot isn't supported on qubes unfortunately. Hacking teams insyde
> > bios exploit could be used remotely according to experts, so secure boot
On Tuesday, August 1, 2017 at 7:53:45 PM UTC-4, Jean-Philippe Ouellet wrote:
> On Tue, Aug 1, 2017 at 7:46 PM, cooloutac <raahe...@gmail.com> wrote:
> > am I reading this right? There is no qubes-manager in 4.0? Does that mean
> > everything must be done in a terminal? Tell
Qubes doesn't support secure boot unfortunately. I think its batshit crazy to
consider a pc even reasonably secure without it.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it,
am I reading this right? There is no qubes-manager in 4.0? Does that mean
everything must be done in a terminal? Tell me I read that wrong lol.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving
On Friday, July 28, 2017 at 8:58:30 AM UTC-4, Noor Christensen wrote:
> On Thu, Jul 27, 2017 at 12:00:37PM -0700, cooloutac wrote:
> > sounds like a waste of time, freenode is an abandoned cesspool. If
> > you care about your security you wouldn't even be using it.The
>
On Friday, July 21, 2017 at 12:26:35 PM UTC-4, PR wrote:
> Hello
>
>
>
> Am 21.07.2017 9:39 vorm. schrieb "Noor Christensen" :
>
>
>
>
>
>
>
> The IRC channels are unofficial, and should probably continue to be so
>
> since we already have the mailing lists as
sounds like a waste of time, freenode is an abandoned cesspool. If you care
about your security you wouldn't even be using it.The google mailing list
is great though, because it already deters the deplorables...
--
You received this message because you are subscribed to the Google Groups
same thing has been happening to me and I was going to make a post about it,
but then it just fixed itself. I'm also using fedora-25 for the dvm.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop
On Wednesday, July 19, 2017 at 11:17:38 AM UTC-4, josefh...@hushmail.com wrote:
> Hello List
>
>
> Due to different security concerns I will install Mail and Internet-browsing
> in different dedicated Windows VM's.
>
> Is there a way to share the USB-storage device between different VM's for
>
secure boot isn't supported on qubes unfortunately. Hacking teams insyde bios
exploit could be used remotely according to experts, so secure boot would
actually defend against something like that remotely as well. I hope people
get over the anti microsoft and redhat notions about it.
On Wednesday, July 19, 2017 at 4:02:06 PM UTC-4, Jean-Philippe Ouellet wrote:
> Hello fellow Qubesers,
>
> Qubes continues to make me feel all warm and fuzzy inside, and makes
> me want to share it with the world.
>
> I've been quite busy with real-world things recently and had to use
> several
On Wednesday, July 19, 2017 at 5:43:39 PM UTC-4, 0brand wrote:
> Which Keepass? On debian:
>
> I use the same as you Keepassx.
>
>
>
> I'm thinking it may have something to do with dom0 backup/restore. I have
> multiple 512 Gib usb drives i do backups on. I don't want to try to restore
>
On Monday, July 17, 2017 at 8:31:42 PM UTC-4, pixel fairy wrote:
> On Sunday, July 16, 2017 at 9:55:55 AM UTC-7, yreb-qusw wrote:
> > On 07/16/2017 01:27 AM, pixel fairy wrote:
> > > ---
> > > In Dom0 install anti-evil-maid:
> > >
> > > sudo qubes-dom0-update anti-evil-maid
> > > ---
> > Doesn't
301 - 400 of 779 matches
Mail list logo