Re: [qubes-users] Re: Duplicate MAC address error

2017-12-19 Thread cooloutac
boom, was just aobut to suggest this. its the beauty of qubes. do it for any anomaly. when in doubt delete it and recreate it in seconds. its the most suspect vm of them all. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To

Re: [qubes-users] Re: USB Keyboard thoughts...

2017-12-12 Thread cooloutac
On Monday, December 4, 2017 at 11:09:24 PM UTC-5, tai...@gmx.com wrote: > On 12/04/2017 07:31 PM, cooloutac wrote: > > > I use a usb to ps2 adapter for my keyboard. > I assume with the mistaken impression that PS/2 is more secure for some > reason - for the record it sends y

[qubes-users] Re: USB Keyboard thoughts...

2017-12-04 Thread cooloutac
I use a usb to ps2 adapter for my keyboard. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send

Re: [qubes-users] Re: Failed to load Kernel Modules

2017-11-29 Thread cooloutac
On Tuesday, November 28, 2017 at 11:04:06 AM UTC-5, Tom Zander wrote: > On Tuesday, 28 November 2017 14:18:44 CET cooloutac wrote: > > Of course many feel Qubes is for more advanced users, and apparently that > > will become a self fulfilling prophecy in version 4. > >

[qubes-users] Re: Eve V - nice QubesOS platform?

2017-11-28 Thread cooloutac
I'd want something with more ram for Qubes. I'd say 8 is minimum, 32gb recommended. I had 8 on a desktop and was hitting limit sometimes so I added another 8. A laptop would probably use more. And most importantly to know if iommu protections work on it. You would either have to look at

Re: [qubes-users] Re: Qubes support Secure Boot

2017-11-28 Thread cooloutac
On Thursday, November 23, 2017 at 7:55:21 AM UTC-5, Leo Gaspard wrote: > On 11/23/2017 03:35 AM, taii...@gmx.com wrote: > > On 11/22/2017 07:25 PM, xeph...@gmail.com wrote: > >> This is quite late, but now that UEFI is supported...is secure boot?  > >> Wasn't quite sure what key or signature to

Re: [qubes-users] Re: Qubes support Secure Boot

2017-11-28 Thread cooloutac
> > > This is quite late, but now that UEFI is supported...is secure boot? > > Wasn't quite sure what key or signature to import. > Why are all the newbies here so obsessed with a microsoft technology? > > Just shut it off, it provides no benefit to you. If their code is so > great and

[qubes-users] Re: Failed to load Kernel Modules

2017-11-28 Thread cooloutac
On Wednesday, November 22, 2017 at 10:44:58 AM UTC-5, haaber wrote: > This is the first line while booting. So I checked systemctl status > systemd-modules-load.service that says the below. I see no errors .. all > OK then?? > > Thank you, Bernhard > > [me @dom0 ] > >

Re: [qubes-users] Random sudden reboots

2017-11-28 Thread cooloutac
On Monday, November 27, 2017 at 2:09:12 PM UTC-5, David Hobach wrote: > On 11/27/2017 07:57 PM, David Hobach wrote: > > On 11/27/2017 07:47 AM, Wael Nasreddine wrote: > >> I'm running 4.0-RC2 on Asrock Z170 pro4/i7-6700k and I got two hard > >> reboots in the last few hours, often around the time

[qubes-users] Re: Does VT-d protect against this?

2017-11-13 Thread cooloutac
On Friday, November 10, 2017 at 6:45:07 PM UTC-5, David Schissler wrote: > Researchers find almost EVERY computer with an Intel Skylake and above CPU > can be owned via USB >

[qubes-users] Re: Does VT-d protect against this?

2017-11-13 Thread cooloutac
On Friday, November 10, 2017 at 6:45:07 PM UTC-5, David Schissler wrote: > Researchers find almost EVERY computer with an Intel Skylake and above CPU > can be owned via USB >

Re: [qubes-users] Is there a way to use secure boot with qubes?

2017-11-13 Thread cooloutac
On Wednesday, November 8, 2017 at 11:06:28 PM UTC-5, tai...@gmx.com wrote: > On 11/08/2017 03:52 PM, Guerlan wrote: > > > My computer complains about bad signature when I try to install qubes. Is > > there a way to install it without disabling secure boot? Does qubes support > > secure boot? Is

[qubes-users] Re: Is there a way to use secure boot with qubes?

2017-11-13 Thread cooloutac
On Thursday, November 9, 2017 at 6:27:01 AM UTC-5, blacklight wrote: > On Wednesday, 8 November 2017 20:52:14 UTC, Guerlan wrote: > > My computer complains about bad signature when I try to install qubes. Is > > there a way to install it without disabling secure boot? Does qubes support > >

Re: [qubes-users] Re: Qubes 4.0-rc2 :: VMs fail to start

2017-11-02 Thread cooloutac
On Thursday, November 2, 2017 at 4:21:38 AM UTC-4, [799] wrote: > Hello, > > >> Did you make it permanently ? > > Yes of course :-) but thank you for the reminder, I edited in once in grub > for the first boot after installation and then applied it in the Grub > configuration. > Same results,

Re: Re: [qubes-users] Why is there no qubes manager in V4.0?

2017-10-28 Thread cooloutac
I mean maybe there is security implications? I dunno does gui automatically equal risk? lol but like 799 say options is good. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it,

[qubes-users] Re: Is Qubes OS compatible w/ Dell Inspiron 15R N5110?

2017-10-28 Thread cooloutac
On Friday, October 27, 2017 at 12:58:13 AM UTC-4, anthon...@gmail.com wrote: > Is Qubes OS compatible w/ Dell Inspiron 15R N5110? > http://www.dell.com/support/home/ca/en/cabsdt1/product-support/servicetag/6h9clp1/configuration > > Please let me know. Thanks. download the live usb and try it

Re: Re: [qubes-users] Why is there no qubes manager in V4.0?

2017-10-28 Thread cooloutac
On Saturday, October 28, 2017 at 7:50:54 AM UTC-4, [799] wrote: > Hello, > > > What original Qubes Manager did wrong: > > Didn't expose all per-VM settings (qvm-prefs) > > Didn't expose all global settings (guid.conf) > > Didn't expose all device options (USB mostly, > > block devices were

Re: [qubes-users] Why is there no qubes manager in V4.0?

2017-10-28 Thread cooloutac
On Saturday, October 28, 2017 at 7:35:20 AM UTC-4, Yethal wrote: > W dniu sobota, 28 października 2017 13:14:29 UTC+2 użytkownik [799] napisał: > > Hello, > > > > > While I do know how to use the cli tools I > > > enjoy a gui for at a glance viewing and tasks, > > > it is much easier to press

Re: [qubes-users] Re: Update sys-net and sys-firewall to fedora-25?

2017-10-27 Thread cooloutac
On Saturday, October 21, 2017 at 9:39:44 AM UTC-4, [799] wrote: > Hello, > > > > here you can find my scripts, which will rebuild all your sys-vms: > > All scripts must be made executable with chmod +x FILENAME > > > > 1) qvm-destroy.sh > > this script  is a helper script which can be used

Re: [qubes-users] Re: Update sys-net and sys-firewall to fedora-25?

2017-10-27 Thread cooloutac
On Saturday, October 21, 2017 at 9:39:44 AM UTC-4, [799] wrote: > Hello, > > > > here you can find my scripts, which will rebuild all your sys-vms: > > All scripts must be made executable with chmod +x FILENAME > > > > 1) qvm-destroy.sh > > this script  is a helper script which can be used

[qubes-users] Re: Logitech C920 Webcam with Qubes?

2017-10-25 Thread cooloutac
On Tuesday, October 24, 2017 at 1:42:25 PM UTC-4, evo wrote: > ... do nobody has any USB webcam in use with qubes??? > > it shows me on sys-usb (lsusb) that the webcam is attached, but i can > not find it over attach/detach devices and i have no idea, how can i > mount it on another VM. how

[qubes-users] Re: Sub-menus using xfce4

2017-10-25 Thread cooloutac
On Wednesday, October 25, 2017 at 8:50:56 PM UTC-4, cooloutac wrote: > On Wednesday, October 25, 2017 at 7:53:46 PM UTC-4, Sam Hentschel wrote: > > I am trying to make a VM that is going to have a lot of applications. I > > would like to be able to put these applications into gr

[qubes-users] Re: Sub-menus using xfce4

2017-10-25 Thread cooloutac
On Wednesday, October 25, 2017 at 7:53:46 PM UTC-4, Sam Hentschel wrote: > I am trying to make a VM that is going to have a lot of applications. I > would like to be able to put these applications into groups (sub-menus) > in the main qubes menu using xfce4. > > I've looked at the xfce wiki[1]

[qubes-users] Re: USB error

2017-10-08 Thread cooloutac
On Sunday, October 1, 2017 at 6:09:41 AM UTC-4, dr.giz.jd wrote: > hi > > I am having a usb qube issue, I keep getting an error message when trying to > start the qube > > Erro starting VM ‘sys-usb’: Requested operation is not valid: PCI device > :00: 14.0 is in use by driver xenlight,

Re: [qubes-users] Fedora25 fails updates unless I reboot the machine 9.13.17

2017-10-08 Thread cooloutac
On Thursday, October 5, 2017 at 9:38:50 AM UTC-4, Bill Wether wrote: > On my thinkpad 430, I fix this by setting sys-firewall's netvm to 'none', > restarting sys-net, and setting it back. Works every time so far. > > Cheers > > BillW what about just removing the sys-net and recreating it. --

[qubes-users] Re: Installation "Couldn't obtain the File System Protocol Interface."

2017-10-08 Thread cooloutac
On Saturday, September 23, 2017 at 8:53:09 PM UTC-4, janchristop...@gmail.com wrote: > Hey folks, > > currently trying to install QubesOS 3.2 from USB which I created using rufus. > After booting the installation medium, I get the message "Couldn't obtain the > File System Protocol Interface."

[qubes-users] Re: How to check total storage used by VM?

2017-09-29 Thread cooloutac
On Thursday, September 28, 2017 at 7:11:05 AM UTC-4, Jerry wrote: > I need to see how much room I have on my ssd preferrably by vm. Seems I > created and deleted several vms but I seem to have missing space I should > have. Any help or add on would be appreciated. qvm-ls -d from dom0. --

Re: [qubes-users] Re: Unable to uninstall or reinstall Whonix

2017-09-29 Thread cooloutac
On Friday, September 29, 2017 at 9:46:01 AM UTC-4, cooloutac wrote: > On Tuesday, September 26, 2017 at 7:33:06 PM UTC-4, Person wrote: > > On Monday, September 25, 2017 at 7:52:22 AM UTC+8, cooloutac wrote: > > > On Sunday, September 24, 2017 at 3:59:28 PM UTC-4, Person wrote

Re: [qubes-users] Re: Unable to uninstall or reinstall Whonix

2017-09-29 Thread cooloutac
On Tuesday, September 26, 2017 at 7:33:06 PM UTC-4, Person wrote: > On Monday, September 25, 2017 at 7:52:22 AM UTC+8, cooloutac wrote: > > On Sunday, September 24, 2017 at 3:59:28 PM UTC-4, Person wrote: > > > It seems that the VMs have already been replaced. Which is good

Re: [qubes-users] Anyone disabled the Intel ME yet?

2017-09-24 Thread cooloutac
On Sunday, September 24, 2017 at 8:24:44 PM UTC-4, cooloutac wrote: > On Thursday, September 21, 2017 at 12:08:41 PM UTC-4, Hugo Costa wrote: > > On Thursday, 21 September 2017 07:23:01 UTC+1, Alex wrote: > > > Replying to this thread to report that somebody DID ACTUALLY find an

Re: [qubes-users] Anyone disabled the Intel ME yet?

2017-09-24 Thread cooloutac
On Thursday, September 21, 2017 at 12:08:41 PM UTC-4, Hugo Costa wrote: > On Thursday, 21 September 2017 07:23:01 UTC+1, Alex wrote: > > Replying to this thread to report that somebody DID ACTUALLY find an > > exploitable vulnerability in the latest IME 11+, and they will be > > sharing nothing

Re: [qubes-users] Re: Unable to uninstall or reinstall Whonix

2017-09-24 Thread cooloutac
On Sunday, September 24, 2017 at 3:59:28 PM UTC-4, Person wrote: > It seems that the VMs have already been replaced. Which is good considering > that then I don't need to delete the old templates. > > However, the system didn't automatically give me an anon-Whonix or sys-Whonix > templates, so

Re: [qubes-users] Re: Unable to uninstall or reinstall Whonix

2017-09-24 Thread cooloutac
On Saturday, September 23, 2017 at 10:31:08 PM UTC-4, Person wrote: > You were correct (thank you so much!). Apparently I set the Update VM to > "none" in the Global Settings, so it didn't work. Now installing Whonix works > fine. > > However, uninstalling the old templates still does not work.

[qubes-users] Re: How to recover Qubes when keyboard / mice is dysfunctional due to USB qube setup issues?

2017-09-24 Thread cooloutac
On Sunday, September 24, 2017 at 12:23:23 PM UTC-4, cooloutac wrote: > On Sunday, September 24, 2017 at 9:25:24 AM UTC-4, Patrick Schleizer wrote: > > Quote from https://www.qubes-os.org/doc/usb/ > > > > > Caution: By assigning a USB controller to a USB qube, it will no

[qubes-users] Re: How to recover Qubes when keyboard / mice is dysfunctional due to USB qube setup issues?

2017-09-24 Thread cooloutac
On Sunday, September 24, 2017 at 9:25:24 AM UTC-4, Patrick Schleizer wrote: > Quote from https://www.qubes-os.org/doc/usb/ > > > Caution: By assigning a USB controller to a USB qube, it will no > longer be available to dom0. This can make your system unusable if, for > example, you have only one

[qubes-users] Re: Has anyone tried to activate SELINUX in Fedora 25?

2017-09-24 Thread cooloutac
On Sunday, September 24, 2017 at 12:17:33 PM UTC-4, cooloutac wrote: > On Sunday, September 24, 2017 at 12:16:34 PM UTC-4, cooloutac wrote: > > On Thursday, September 21, 2017 at 4:40:42 AM UTC-4, pels wrote: > > > On Wednesday, September 20, 2017 at 2:54:31 PM UTC+

[qubes-users] Re: Has anyone tried to activate SELINUX in Fedora 25?

2017-09-24 Thread cooloutac
On Sunday, September 24, 2017 at 12:16:34 PM UTC-4, cooloutac wrote: > On Thursday, September 21, 2017 at 4:40:42 AM UTC-4, pels wrote: > > On Wednesday, September 20, 2017 at 2:54:31 PM UTC+2, cooloutac wrote: > > > On Wednesday, September 20, 2017 at 4:41:58 AM UTC-4, pels

[qubes-users] Re: Privacy in Qubes

2017-09-24 Thread cooloutac
On Friday, September 22, 2017 at 9:39:31 PM UTC-4, Person wrote: > These are all very good tips, but to be honest, I'm not actually doing > anything too serious on Qubes so tracking is not that bad (but privacy is > still valuable). > > How would changing the web user agent fare? I tried it,

[qubes-users] Re: Privacy in Qubes

2017-09-20 Thread cooloutac
On Wednesday, September 20, 2017 at 8:50:46 AM UTC-4, Dominique St-Pierre Boucher wrote: > On Wednesday, September 20, 2017 at 8:27:40 AM UTC-4, cooloutac wrote: > > On Monday, September 18, 2017 at 11:02:50 PM UTC-4, Person wrote: > > > Let's say you have an online identity tha

[qubes-users] Re: Unable to uninstall or reinstall Whonix

2017-09-20 Thread cooloutac
On Tuesday, September 19, 2017 at 6:13:19 PM UTC-4, Person wrote: > On Tuesday, September 19, 2017 at 10:59:33 AM UTC+8, Person wrote: > > I use Qubes-Whonix (precisely Qubes 3.2), and when I try to remove the > > Whonix Template VMs after removing the anon-whonix VM, it says that the > >

[qubes-users] Re: Privacy in Qubes

2017-09-20 Thread cooloutac
On Wednesday, September 20, 2017 at 8:27:40 AM UTC-4, cooloutac wrote: > On Monday, September 18, 2017 at 11:02:50 PM UTC-4, Person wrote: > > Let's say you have an online identity that you want to keep separate from > > your personal information. On Qubes, is it possible to kee

[qubes-users] Re: Privacy in Qubes

2017-09-20 Thread cooloutac
On Monday, September 18, 2017 at 11:02:50 PM UTC-4, Person wrote: > Let's say you have an online identity that you want to keep separate from > your personal information. On Qubes, is it possible to keep i information > completely separate without physical separation? I have considered using a

[qubes-users] Re: every fedora25 template update fails if one has done 'suspend' ** is this NOW expected behavior?

2017-09-20 Thread cooloutac
On Tuesday, September 19, 2017 at 9:47:49 PM UTC-4, yre...@riseup.net wrote: > every fedora25 template update fails ** is this NOW expected behavior? > > it fails unless I reboot, after I've done even 1 suspend > > really a big pita, as there are so many silly emacs updates, and libthis > and

Re: [qubes-users] Can't get disposable VMs to work

2017-09-11 Thread cooloutac
On Sunday, September 10, 2017 at 7:21:19 PM UTC-4, Selton wrote: > Am Dienstag, 4. Oktober 2016 18:53:36 UTC+2 schrieb cooloutac: > > have you rebooted machine? is it just the default firefox dispvm entry? > > What if you load a terminal from a vm, then try to load

Re: [qubes-users] Re: secure hardware after purchase but before qubes installation

2017-09-08 Thread cooloutac
On Friday, September 8, 2017 at 10:10:01 AM UTC-4, cooloutac wrote: > On Thursday, September 7, 2017 at 11:00:14 PM UTC-4, tai...@gmx.com wrote: > > On 09/07/2017 02:40 PM, pixel fairy wrote: > > > > > sun microsystems, now part of oracle, used capsules with beads and

Re: [qubes-users] Re: secure hardware after purchase but before qubes installation

2017-09-08 Thread cooloutac
On Thursday, September 7, 2017 at 11:00:14 PM UTC-4, tai...@gmx.com wrote: > On 09/07/2017 02:40 PM, pixel fairy wrote: > > > sun microsystems, now part of oracle, used capsules with beads and adhesive > > to detect rough handling in shipment. have not seen anyone else adopt that. > > > > purism

Re: [qubes-users] Re: secure hardware after purchase but before qubes installation

2017-09-08 Thread cooloutac
On Friday, September 8, 2017 at 9:40:23 AM UTC-4, cooloutac wrote: > On Thursday, September 7, 2017 at 11:00:14 PM UTC-4, tai...@gmx.com wrote: > > On 09/07/2017 02:40 PM, pixel fairy wrote: > > > > > sun microsystems, now part of oracle, used capsules with beads and

Re: [qubes-users] Re: secure hardware after purchase but before qubes installation

2017-09-08 Thread cooloutac
On Thursday, September 7, 2017 at 11:00:14 PM UTC-4, tai...@gmx.com wrote: > On 09/07/2017 02:40 PM, pixel fairy wrote: > > > sun microsystems, now part of oracle, used capsules with beads and adhesive > > to detect rough handling in shipment. have not seen anyone else adopt that. > > > > purism

Re: [qubes-users] Options for securing /boot

2017-09-07 Thread cooloutac
On Thursday, September 7, 2017 at 12:49:05 PM UTC-4, cooloutac wrote: > On Thursday, September 7, 2017 at 9:40:47 AM UTC-4, Patrik Hagara wrote: > > -BEGIN PGP SIGNED MESSAGE- > > Hash: SHA256 > > > > On 09/07/2017 03:21 PM, cooloutac wrote: > > > On

Re: [qubes-users] Options for securing /boot

2017-09-07 Thread cooloutac
On Thursday, September 7, 2017 at 9:40:47 AM UTC-4, Patrik Hagara wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On 09/07/2017 03:21 PM, cooloutac wrote: > > On Tuesday, August 29, 2017 at 12:46:04 PM UTC-4, Patrik Hagara > > wrote: On 08/29/2017 0

[qubes-users] Re: secure hardware after purchase but before qubes installation

2017-09-07 Thread cooloutac
On Thursday, September 7, 2017 at 9:27:35 AM UTC-4, cooloutac wrote: > On Friday, September 1, 2017 at 10:46:04 AM UTC-4, James Miller wrote: > > For those that run Qubes on an off the shelf computer, did you go through > > any special steps to insure the hardware was clean afte

[qubes-users] Re: secure hardware after purchase but before qubes installation

2017-09-07 Thread cooloutac
On Friday, September 1, 2017 at 10:46:04 AM UTC-4, James Miller wrote: > For those that run Qubes on an off the shelf computer, did you go through any > special steps to insure the hardware was clean after you purchased, but > before you installed qubes? I'm about to buy new hardware for my >

Re: [qubes-users] Options for securing /boot

2017-09-07 Thread cooloutac
On Tuesday, August 29, 2017 at 12:46:04 PM UTC-4, Patrik Hagara wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On 08/29/2017 06:25 PM, cooloutac wrote: > > On Tuesday, August 29, 2017 at 11:38:59 AM UTC-4, Patrik Hagara > > wrote: On 08/29

Re: [qubes-users] Options for securing /boot

2017-09-07 Thread cooloutac
On Thursday, September 7, 2017 at 9:15:31 AM UTC-4, cooloutac wrote: > On Tuesday, August 29, 2017 at 1:09:36 PM UTC-4, Leo Gaspard wrote: > > On 08/29/2017 04:01 PM, cooloutac wrote: > > > On Monday, August 28, 2017 at 6:36:08 PM UTC-4, Leo Gaspard wrote: > > >> Jus

Re: [qubes-users] Options for securing /boot

2017-09-07 Thread cooloutac
On Tuesday, August 29, 2017 at 1:09:36 PM UTC-4, Leo Gaspard wrote: > On 08/29/2017 04:01 PM, cooloutac wrote: > > On Monday, August 28, 2017 at 6:36:08 PM UTC-4, Leo Gaspard wrote: > >> Just encrypting /boot would bring little, as it would still be possible > >> to

Re: [qubes-users] Options for securing /boot

2017-08-29 Thread cooloutac
On Tuesday, August 29, 2017 at 12:25:51 PM UTC-4, cooloutac wrote: > On Tuesday, August 29, 2017 at 11:38:59 AM UTC-4, Patrik Hagara wrote: > > -BEGIN PGP SIGNED MESSAGE- > > Hash: SHA256 > > > > On 08/29/2017 04:50 PM, cyberian@national.shitposting.agen

Re: [qubes-users] Options for securing /boot

2017-08-29 Thread cooloutac
On Tuesday, August 29, 2017 at 11:38:59 AM UTC-4, Patrik Hagara wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On 08/29/2017 04:50 PM, cyberian@national.shitposting.agency wrote: > > Leo Gaspard, > > > > I have read about AEM but have never used it, it seems like it is > > geared

[qubes-users] Re: Options for securing /boot

2017-08-29 Thread cooloutac
On Tuesday, August 29, 2017 at 12:18:45 PM UTC-4, cooloutac wrote: > On Tuesday, August 29, 2017 at 10:47:14 AM UTC-4, > cybe...@national.shitposting.agency wrote: > > I dont dual boot, as implied earlier. I have had suspicious activity > > happen before in Qubes3.2 at

[qubes-users] Re: Options for securing /boot

2017-08-29 Thread cooloutac
On Tuesday, August 29, 2017 at 10:47:14 AM UTC-4, cybe...@national.shitposting.agency wrote: > I dont dual boot, as implied earlier. I have had suspicious activity happen > before in Qubes3.2 at a certain location several times; errors from Xen > saying that my machine is not returning all of

Re: [qubes-users] Options for securing /boot

2017-08-29 Thread cooloutac
On Monday, August 28, 2017 at 6:36:08 PM UTC-4, Leo Gaspard wrote: > Just encrypting /boot would bring little, as it would still be possible > to modify the unencrypted part of GRUB (that decrypts /boot) to have it > overwrite the /boot with malicious kernel images (or even to not use the > ones

[qubes-users] Re: UEFI secureboot issue

2017-08-28 Thread cooloutac
On Monday, August 28, 2017 at 3:36:56 PM UTC-4, socks wrote: > > But Qubes still relies alot on user habits, and in fact the user learning > > new habits. So Qubes does require even more discipline then linux or > > windows, to get the full benefits of using it, imo. But I think the avg > >

[qubes-users] Re: UEFI secureboot issue

2017-08-28 Thread cooloutac
On Tuesday, August 22, 2017 at 1:30:39 AM UTC-4, qubester wrote: > On 08/20/2017 05:48 AM, cooloutac wrote: > > On Sunday, August 20, 2017 at 11:44:42 AM UTC-4, cooloutac wrote: > >> On Sunday, August 20, 2017 at 12:42:55 AM UTC-4, qubester wrote: > >> The guy Brad S

[qubes-users] Re: Options for securing /boot

2017-08-28 Thread cooloutac
On Saturday, August 26, 2017 at 11:39:23 AM UTC-4, cybe...@national.shitposting.agency wrote: > Does Qubes offer a method of securing /boot? not just against USB evil maid > attacks, but from tampering in general? > > for example, while a laptop is off, what would stop a malicious user from >

[qubes-users] Re: UEFI secureboot issue

2017-08-20 Thread cooloutac
On Sunday, August 20, 2017 at 12:42:55 AM UTC-4, qubester wrote: > On 08/16/2017 05:55 AM, cooloutac wrote: > > I'm glad Bruce Schneier changed his tune and is no longer encouraging kids > > to learn how to hack in live environments, cause I think that breeds > > sociopa

[qubes-users] Re: Suggestions for video card

2017-08-20 Thread cooloutac
On Sunday, August 20, 2017 at 10:05:39 AM UTC-4, gall...@gmail.com wrote: > On Sunday, July 23, 2017 at 3:02:43 PM UTC+2, Fun Zork wrote: > > On Friday, July 21, 2017 at 7:05:56 PM UTC-4, pixel fairy wrote: > > > have you tried the 4.0 alpha? thats based on fedora 25, which should be > > > able

Re: [qubes-users] UEFI secureboot issue

2017-08-19 Thread cooloutac
On Tuesday, August 15, 2017 at 9:23:14 PM UTC-4, Wim Vervoorn wrote: > -Original Message- > From: taii...@gmx.com [mailto:taii...@gmx.com] > Sent: Tuesday, August 15, 2017 2:50 AM > To: Wim Vervoorn ; qubes-users > > Cc:

Re: [qubes-users] UEFI secureboot issue

2017-08-16 Thread cooloutac
I'm glad Bruce Schneier changed his tune and is no longer encouraging kids to learn how to hack in live environments, cause I think that breeds sociopaths, and is dangerous. (and we are living in an epidemic) Now he has to stop calling secure boot security theater, because alot of people

Re: [qubes-users] UEFI secureboot issue

2017-08-16 Thread cooloutac
One of the reasons I liked Qubes, is first of all it seems like the ITL people use it for their daily personal use. Its more then a fanatical hobby for them. Thats number one. Number two, They have a respected reputation in the industry. 3. they don't seem to get involved in industry

Re: [qubes-users] UEFI secureboot issue

2017-08-16 Thread cooloutac
On Monday, August 14, 2017 at 8:50:20 PM UTC-4, tai...@gmx.com wrote: > Secure boot is a stupid Microsoft controlled project to eventually > remove the ability for commercial PC's to run non windows operating systems. > > SB 1.0 specs mandate owner controlled (an option to shut it off), SB2.0 >

Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-16 Thread cooloutac
On Friday, August 11, 2017 at 11:02:13 AM UTC-4, yura...@gmail.com wrote: > On Friday, August 11, 2017 at 2:07:44 PM UTC, cooloutac wrote: > > On Saturday, August 5, 2017 at 12:48:29 PM UTC-4, yura...@gmail.com wrote: > > > On Saturday, August 5, 2017 at 4:38:23 PM UT

Re: [qubes-users] UEFI secureboot issue

2017-08-16 Thread cooloutac
On Wednesday, August 16, 2017 at 10:18:34 AM UTC-4, cooloutac wrote: > On Monday, August 14, 2017 at 8:50:20 PM UTC-4, tai...@gmx.com wrote: > > Secure boot is a stupid Microsoft controlled project to eventually > > remove the ability for commercial PC's to run non windows op

Re: [qubes-users] UEFI secureboot issue

2017-08-16 Thread cooloutac
On Monday, August 14, 2017 at 8:50:20 PM UTC-4, tai...@gmx.com wrote: > Secure boot is a stupid Microsoft controlled project to eventually > remove the ability for commercial PC's to run non windows operating systems. > > SB 1.0 specs mandate owner controlled (an option to shut it off), SB2.0 >

Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-11 Thread cooloutac
On Saturday, August 5, 2017 at 12:48:29 PM UTC-4, yura...@gmail.com wrote: > On Saturday, August 5, 2017 at 4:38:23 PM UTC, cooloutac wrote: > > On Saturday, August 5, 2017 at 12:28:32 PM UTC-4, yura...@gmail.com wrote: > > > On Saturday, August 5, 2017 at 4:15:43 PM UT

Re: [qubes-users] UEFI secureboot issue

2017-08-11 Thread cooloutac
On Tuesday, August 1, 2017 at 9:15:26 PM UTC-4, Jean-Philippe Ouellet wrote: > On Tue, Aug 1, 2017 at 7:50 PM, cooloutac <raahe...@gmail.com> wrote: > > Qubes doesn't support secure boot unfortunately. I think its batshit crazy > > to consider a pc even reasonably secure wi

Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-05 Thread cooloutac
On Saturday, August 5, 2017 at 12:28:32 PM UTC-4, yura...@gmail.com wrote: > On Saturday, August 5, 2017 at 4:15:43 PM UTC, cooloutac wrote: > > On Saturday, August 5, 2017 at 12:05:58 PM UTC-4, yura...@gmail.com wrote: > > > On Saturday, August 5, 2017 at 3:56:25 PM UT

Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-05 Thread cooloutac
On Saturday, August 5, 2017 at 12:05:58 PM UTC-4, yura...@gmail.com wrote: > On Saturday, August 5, 2017 at 3:56:25 PM UTC, cooloutac wrote: > > On Saturday, August 5, 2017 at 11:34:32 AM UTC-4, yura...@gmail.com wrote: > > > On Saturday, August 5, 2017 at 3:26:05 PM UT

Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-05 Thread cooloutac
ever hear of the saying cut your nose to spite your face? Linux communities are the epitome of that. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to

Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-05 Thread cooloutac
The reason why redhat, ubuntu, and gentoo jumped on the secure boot train, not just for the security benefits, but because they know if they didn't linux would indeed be left out in the cold with nothing to live on. -- You received this message because you are subscribed to the Google Groups

Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-05 Thread cooloutac
On Saturday, August 5, 2017 at 11:59:19 AM UTC-4, yura...@gmail.com wrote: > On Saturday, August 5, 2017 at 3:50:18 PM UTC, cooloutac wrote: > > On Saturday, August 5, 2017 at 11:31:27 AM UTC-4, PR wrote: > > > Hello, > > > > > > > > > I think

Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-05 Thread cooloutac
On Saturday, August 5, 2017 at 11:34:32 AM UTC-4, yura...@gmail.com wrote: > On Saturday, August 5, 2017 at 3:26:05 PM UTC, cooloutac wrote: > > I'll be disappointed but I'm not going to be mad at them for trying to get > > paid, they deserve it. > > > > But I also w

Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-05 Thread cooloutac
> > > We can and should have both: > 1) API/terminal commands for 'advanced users' and > 2) a simple GUI for normal users who just want to use a PC that protects > their privacy somewhat better than their current Windows 10 Laptop. > > > > Am 05.08.2017 5:02

Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-05 Thread cooloutac
I'll be disappointed but I'm not going to be mad at them for trying to get paid, they deserve it. But I also wouldn't mind if they turned me into a money asset like windows so they can keep designing it for home users...lol I look at things differently. You are referring to linux

Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-05 Thread cooloutac
I remember when the tor dev Isis on irc, when I asked if anyone used Qubes, told me she was going to try it out but thought it was too hard to use. She started asking me how easy it was to install and use. I was in total shock! This someone who is a genius compared to me and she thought

Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-05 Thread cooloutac
On Saturday, August 5, 2017 at 10:48:22 AM UTC-4, yura...@gmail.com wrote: > On Saturday, August 5, 2017 at 2:34:53 PM UTC, cooloutac wrote: > > On Wednesday, August 2, 2017 at 11:43:34 PM UTC-4, Francesco wrote: > > > On Wed, Aug 2, 2017 at 9:47 PM, Eva Star <eva...@o

Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-05 Thread cooloutac
;eva...@openmailbox.org> wrote: > > > > > > > -BEGIN PGP SIGNED MESSAGE- > > > > Hash: SHA256 > > > > > > > > On 08/02/2017 03:04 AM, cooloutac wrote: > > > > > > > > > oh ok I see,  so a taskbar widget or someth

Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-05 Thread cooloutac
On Wednesday, August 2, 2017 at 11:43:34 PM UTC-4, Francesco wrote: > On Wed, Aug 2, 2017 at 9:47 PM, Eva Star <eva...@openmailbox.org> wrote: > -BEGIN PGP SIGNED MESSAGE- > > Hash: SHA256 > > > > On 08/02/2017 03:04 AM, cooloutac wrote: > > >

Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-05 Thread cooloutac
On Wednesday, August 2, 2017 at 11:43:34 PM UTC-4, Francesco wrote: > On Wed, Aug 2, 2017 at 9:47 PM, Eva Star <eva...@openmailbox.org> wrote: > -BEGIN PGP SIGNED MESSAGE- > > Hash: SHA256 > > > > On 08/02/2017 03:04 AM, cooloutac wrote: > > >

[qubes-users] Re: heads up, qubes 3.2 still vuln to cve-2016-4484 (minor severity)

2017-08-01 Thread cooloutac
On Wednesday, July 19, 2017 at 6:26:16 PM UTC-4, yreb-qusw wrote: > On 07/19/2017 12:17 PM, cooloutac wrote: > > > > > > secure boot isn't supported on qubes unfortunately. Hacking teams insyde > > bios exploit could be used remotely according to experts, so secure boot

Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-01 Thread cooloutac
On Tuesday, August 1, 2017 at 7:53:45 PM UTC-4, Jean-Philippe Ouellet wrote: > On Tue, Aug 1, 2017 at 7:46 PM, cooloutac <raahe...@gmail.com> wrote: > > am I reading this right? There is no qubes-manager in 4.0? Does that mean > > everything must be done in a terminal? Tell

Re: [qubes-users] UEFI secureboot issue

2017-08-01 Thread cooloutac
Qubes doesn't support secure boot unfortunately. I think its batshit crazy to consider a pc even reasonably secure without it. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it,

[qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-01 Thread cooloutac
am I reading this right? There is no qubes-manager in 4.0? Does that mean everything must be done in a terminal? Tell me I read that wrong lol. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving

Re: [qubes-users] Seeking moderators for unofficial Qubes IRC channels on Freenode and OFTC

2017-07-28 Thread cooloutac
On Friday, July 28, 2017 at 8:58:30 AM UTC-4, Noor Christensen wrote: > On Thu, Jul 27, 2017 at 12:00:37PM -0700, cooloutac wrote: > > sounds like a waste of time, freenode is an abandoned cesspool. If > > you care about your security you wouldn't even be using it.The >

Re: [qubes-users] Seeking moderators for unofficial Qubes IRC channels on Freenode and OFTC

2017-07-27 Thread cooloutac
On Friday, July 21, 2017 at 12:26:35 PM UTC-4, PR wrote: > Hello > > > > Am 21.07.2017 9:39 vorm. schrieb "Noor Christensen" : > > > > > > > > The IRC channels are unofficial, and should probably continue to be so > > since we already have the mailing lists as

Re: [qubes-users] Seeking moderators for unofficial Qubes IRC channels on Freenode and OFTC

2017-07-27 Thread cooloutac
sounds like a waste of time, freenode is an abandoned cesspool. If you care about your security you wouldn't even be using it.The google mailing list is great though, because it already deters the deplorables... -- You received this message because you are subscribed to the Google Groups

Re: [qubes-users] dvm starting extremly slow -> guid

2017-07-27 Thread cooloutac
same thing has been happening to me and I was going to make a post about it, but then it just fixed itself. I'm also using fedora-25 for the dvm. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop

[qubes-users] Re: backup data from multiple VMs to a single USB-storage device

2017-07-19 Thread cooloutac
On Wednesday, July 19, 2017 at 11:17:38 AM UTC-4, josefh...@hushmail.com wrote: > Hello List > > > Due to different security concerns I will install Mail and Internet-browsing > in different dedicated Windows VM's. > > Is there a way to share the USB-storage device between different VM's for >

[qubes-users] Re: heads up, qubes 3.2 still vuln to cve-2016-4484 (minor severity)

2017-07-19 Thread cooloutac
secure boot isn't supported on qubes unfortunately. Hacking teams insyde bios exploit could be used remotely according to experts, so secure boot would actually defend against something like that remotely as well. I hope people get over the anti microsoft and redhat notions about it.

[qubes-users] Re: Printing and scanning with Qubes - a love story

2017-07-19 Thread cooloutac
On Wednesday, July 19, 2017 at 4:02:06 PM UTC-4, Jean-Philippe Ouellet wrote: > Hello fellow Qubesers, > > Qubes continues to make me feel all warm and fuzzy inside, and makes > me want to share it with the world. > > I've been quite busy with real-world things recently and had to use > several

Re: [qubes-users] Re: Keepass vault password no worky

2017-07-19 Thread cooloutac
On Wednesday, July 19, 2017 at 5:43:39 PM UTC-4, 0brand wrote: > Which Keepass? On debian: > > I use the same as you Keepassx. > > > > I'm thinking it may have something to do with dom0 backup/restore. I have > multiple 512 Gib usb drives i do backups on. I don't want to try to restore >

[qubes-users] Re: heads up, qubes 3.2 still vuln to cve-2016-4484 (minor severity)

2017-07-18 Thread cooloutac
On Monday, July 17, 2017 at 8:31:42 PM UTC-4, pixel fairy wrote: > On Sunday, July 16, 2017 at 9:55:55 AM UTC-7, yreb-qusw wrote: > > On 07/16/2017 01:27 AM, pixel fairy wrote: > > > --- > > > In Dom0 install anti-evil-maid: > > > > > > sudo qubes-dom0-update anti-evil-maid > > > --- > > Doesn't

<    1   2   3   4   5   6   7   8   >