Re: [qubes-users] Me (anon-whonix AppVM) -> Tor -> VPN, settup with Mullvad VPN

2020-04-01 Thread scurge1tl
Chris Laprise: > On 3/29/20 5:16 AM, scurge1tl wrote: >> >> >> Chris Laprise: >>> On 3/27/20 5:02 AM, scurge1tl wrote: >> >>>> >>>> Hello all, >>>> >>>> I would like to ask about proper setting of AppVM flow

Re: [qubes-users] Me (anon-whonix AppVM) -> Tor -> VPN, settup with Mullvad VPN

2020-03-31 Thread scurge1tl
Chris Laprise: > On 3/29/20 5:16 AM, scurge1tl wrote: >> >> >> Chris Laprise: >>> On 3/27/20 5:02 AM, scurge1tl wrote: >> >>>> >>>> Hello all, >>>> >>>> I would like to ask about proper setting of AppVM flow

Re: [qubes-users] Me (anon-whonix AppVM) -> Tor -> VPN, settup with Mullvad VPN

2020-03-29 Thread scurge1tl
Chris Laprise: > On 3/27/20 5:02 AM, scurge1tl wrote: >> >> Hello all, >> >> I would like to ask about proper setting of AppVM flow if using >> Mullvad VPN. I would like to connect to the clearnet following way: Me >> - -> Tor -> VPN -> clearnet.

Re: [qubes-users] Backup/Restore issue

2020-03-27 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Claudio Chinicz: > Hi, > > I've created an oathtool AppVM following instructions from here: > https://www.qubes-os.org/doc/multifactor-authentication/ > > On the Fedora-30-minimal template I've also installed Nautilus file > manager and Gedit to

[qubes-users] Me (anon-whonix AppVM) -> Tor -> VPN, settup with Mullvad VPN

2020-03-27 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hello all, I would like to ask about proper setting of AppVM flow if using Mullvad VPN. I would like to connect to the clearnet following way: Me - -> Tor -> VPN -> clearnet. When setting up mullvad in their web page, I set the parameters for

Re: [qubes-users] Privacy Screen. How to

2020-03-26 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Catacombs: > I have just installed Qubes on a Lenovo X230 with original Intel > WiFi. I go McDonalds to try to use public WiFi. I power up. I get > A box to start Tor connection. Which I am pretty sure will not > work. I cancel. I start Debian

Re: [qubes-users] Lexar Professional SDXC not opening in sys-usb

2020-01-23 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 unman: > On Thu, Jan 23, 2020 at 02:06:39PM +0000, scurge1tl wrote: Hi, I am > trying to open my Lexar Professional SDXC 128GB in sys-usb, but it > returns error, on all USB ports and SD card reader as well. Other > SD cards read nicel

[qubes-users] Lexar Professional SDXC not opening in sys-usb

2020-01-23 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi, I am trying to open my Lexar Professional SDXC 128GB in sys-usb, but it returns error, on all USB ports and SD card reader as well. Other SD cards read nicely. The error I get after trying to open it, is: Error mounting filesystem Error

[qubes-users] Split GPG refresh keys in work-email

2020-01-08 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 I am trying to refresh public keys of my contacts that I previously imported to the backend work-gpg with [user@work ~]$ qubes-gpg-import-key ~/Downloads/whateverkey.asc. How do I refresh the keys, sitting in the offline work-gpg now? I tried to

[qubes-users] App through apt of dnf to add subtitles to video in template

2019-12-09 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 I would like to apt or dnf install some app able to create, edit and hardcode subtitles to the mp4 video, to be not forced to use unsigned programs and utilize the sudo apt updte feature without need to do otherwise. Is there possibly any such good

Re: [qubes-users] Has anybody gotten increased scrutiny at an international checkpoint because of having qubes installed?

2019-12-09 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 haaber: > I I will be doing some international travel in the upcoming months. > In >> the past, I have had to turn on my laptop, and once I had to >> bring the system fully up and allow people to see my desktop -- >> though nobody has actually

[qubes-users] Android on Qubes

2019-12-06 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 I would like to ask if there is any reliable way to get Android template into Qubes, so that I could create AppVMs for different android apps (from google play too). I know about the project of Daniel Micay who is working on a hardened version of

Re: [qubes-users] Bug Thunderbird: kills addons after last update

2019-11-19 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 scurge1tl: > > > scurge1tl: >> Today's upgrade of Thunderbird to 68.2.2 (64-bit) killed all >> addons in Whonix-ws-15 AppVMs. >> >> Enigmail seems to be already running, but Torbirdy and Qubes >> ad

Re: [qubes-users] Bug Thunderbird: kills addons after last update

2019-11-18 Thread scurge1tl
scurge1tl: > Today's upgrade of Thunderbird to 68.2.2 (64-bit) killed all addons in > Whonix-ws-15 AppVMs. > > Enigmail seems to be already running, but Torbirdy and Qubes addon > for Attachments opening in a DispVM disappeared. > > Update. Newly created anon-whonix

[qubes-users] Bug Thunderbird: kills addons after last update

2019-11-18 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Today's upgrade of Thunderbird to 68.2.2 (64-bit) killed all addons in Whonix-ws-15 AppVMs. Enigmail seems to be already running, but Torbirdy and Qubes addon for Attachments opening in a DispVM disappeared. -BEGIN PGP SIGNATURE-

Re: [qubes-users] Tor qubes-r4.list returning error

2019-11-10 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 'Jackie' via qubes-users: > scurge1tl: >> -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 >> >> I try to onionize the debian-10, but Tor main qubes-r4.list is >> returning error. Qubes is set to onionize ever

[qubes-users] Tor qubes-r4.list returning error

2019-11-08 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 I try to onionize the debian-10, but Tor main qubes-r4.list is returning error. Qubes is set to onionize everything, Whonix onionized and working well. I un-comment this line in my /etc/apt/sources.list.d/qubes-r4.list (and comment everything

Re: [qubes-users] whonix-15 TB in dvm on Safest has whitelisted sites in NoScript by default

2019-09-19 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Patrick Schleizer: > Whonix source code doesn't write literally googlevideo, netflix, > outlook, etc. anywhere. It does not do anything to give special > treatment to any websites. > > By policy, for simplicity, clean implementation and

[qubes-users] whonix-15 TB in dvm on Safest has whitelisted sites in NoScript by default

2019-09-17 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi, Current behavior: - - start TB in a whonix-15-dvm AppVM (Q -> whonix-ws-15-dvm -> Tor Browser (Anon Dist) - - set Advanced security settings on Safest (click Yes) - - about:addons -> NoScript Preferences -> Per-site Permissions - - there are

Re: [qubes-users] Re: Whonix Tor Browser Starter safest setting fails

2019-09-16 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 'awokd' via qubes-users: > 'b17b7bdb' via qubes-users: >> On 9/13/19 9:31 AM, 'awokd' via qubes-users wrote:> 'b17b7bdb' >> via qubes-users: Setting tb_security_slider_safest=true (either by selecting Yes in the Tor Browser Starter

Re: [qubes-users] Anonymous as possible

2019-08-27 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 GT500Shlby: > Recently I went looking for as high as humanly possible anonymity > but quickly deployed. > > For a purely hypothetical example, say I have evidence on a > prominent person. Think got mistress prego, mistress no want > abortion,

Re: [qubes-users] Done with Qubes

2019-08-25 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 O K: > Thanks for all the help but I've been trying to figure out how to > get Qubes running for months and I've decided it's just a giant > waste of my time because every time I get one bug fixed, two more > show up to take it's place. I think

[qubes-users] ~/.gnupg/gpg.conf not existing in debian 9 and 10 by default?

2019-08-23 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 hi, I tried to set up gpg in my Vault AppVM based on debian 9 and 10, and learned that the ~/.gnupg/gpg.conf is returning an empty file. It is the case for the debian 10 as well. In whonix-15 AppVMs I get the file ~/.gnupg/gpg.conf full of settings

[qubes-users] How to update debian-10

2019-08-22 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 I installed debian-10 by executing command sudo qubes-dom0-update - --enablerepo=qubes-templates-itl-testing qubes-template-debian-10 After installation it pops up update, but I get this error: user@debian-10:~$ sudo apt update Hit:1

[qubes-users] error: when upating dom0

2019-08-16 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi, I am getting following error when sudo qube-dom0-update: error: could not delete old database at /var/lib/qubes/dom0-updates/home/user/.rpmdbold.3822 The update than finishes without any issue. But the error is persistent throughout every

[qubes-users] Error on update on whonix-15 templates

2019-07-02 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi, I made a fresh install of Qubes 4. I followed carefully the instructions on the whonix website for fresh installation of the new whonix-gw-15 and whonix-ws-15 (with previous complete uninstall of the whonix-14 templates and its VMs including

Re: [qubes-users] Re: Any issues with changing template for sys-usb?

2019-06-16 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 unman: > On Sun, Jun 16, 2019 at 06:16:00PM +, 'awokd' via qubes-users > wrote: >> jules.die...@gmail.com: >>> Le samedi 8 juin 2019 15:19:00 UTC+2, Stumpy a écrit : I have a sys-usb that is currently based on fedora but i need to

Re: [qubes-users] gpg-split, what am I signing/encrypting

2019-06-13 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 > On 07/06/2019 10.04 AM, scurge1tl wrote: >> I have been playing with the gpg-split and would like to know, >> if there is an option to see precisely for what specific task the >> work-email AppVM is connecting

[qubes-users] gpg-split, what am I signing/encrypting

2019-06-07 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 I have been playing with the gpg-split and would like to know, if there is an option to see precisely for what specific task the work-email AppVM is connecting to the work-gpg AppVM. Currently I let the work-email to have a blank access to the

Re: [qubes-users] How to automate cloud backups of trusted vault files?

2019-06-01 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 'Side Realiq' via qubes-users: >> From: Andrew David Wong >> Sent: Sat Jun 01 03:33:28 CEST 2019 To: Side >> Realiq Cc: >> Subject: [qubes-users] How to >> automate cloud backups of trusted vault files?

Re: [qubes-users] Weird icon in Applications, behavior of the deleted VMs

2019-06-01 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 > On 31/05/2019 2.58 AM, scurge1tl wrote: >>> On 30/05/2019 7.43 AM, scurge1tl wrote: >>>> Yesterday I was experimenting with monero gui. I just >>>> unpacked the monero-gui-linux-x64-v0.14.0.0.tar.bz2 (the has

Re: [qubes-users] Weird icon in Applications, behavior of the deleted VMs

2019-05-31 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 > On 30/05/2019 7.43 AM, scurge1tl wrote: >> Yesterday I was experimenting with monero gui. I just unpacked >> the monero-gui-linux-x64-v0.14.0.0.tar.bz2 (the hash and PGP >> verifications were ok) in the AppVM named monero-on

[qubes-users] Weird icon in Applications, behavior of the deleted VMs

2019-05-30 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Yesterday I was experimenting with monero gui. I just unpacked the monero-gui-linux-x64-v0.14.0.0.tar.bz2 (the hash and PGP verifications were ok) in the AppVM named monero-on based on whonix-ws-14 and played with it for some time. Than I deleted

Re: [qubes-users] Global Setting return error

2019-05-30 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 'awokd' via qubes-users: > scurge1tl: >> The only thing I spotted to have issues, is the Global Settings >> button, which is not reacting. > > Check https://github.com/QubesOS/qubes-issues/issues/4988. Use > "qu

[qubes-users] Global Setting return error

2019-05-29 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 After yesterday's dom0 update all works well. Even my login gui screen returned from afterlife. The only thing I spotted to have issues, is the Global Settings button, which is not reacting. Also the Applications -> System Tools -> Qubes Global

Re: [qubes-users] X230 vs Purism - real world attack probability

2019-05-29 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 'awokd' via qubes-users: > scurge1tl: > >> Can the G505S be bought in the setup you mentioned, with CPU/RAM >> HW init opensource and so on, or it is needed to hack it myself? >> What is the performance of the

Re: [qubes-users] X230 vs Purism - real world attack probability

2019-05-28 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 taii...@gmx.com: > On 05/21/2019 09:52 AM, scurge1tl wrote: >> I have a question related to the decision about what laptop is >> the better option for Qubes usage, from the security point of >> view, in the real world

Re: [qubes-users] Updating Fedora-template

2019-05-28 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 josefh.maier via qubes-users: > Hello forum. I am new to Qubes and Fedora... is there an equivalent > to the Debian 'apt-get update upgrade' ? Thank's a lot for your > feedback! > > Joe > apt-get of debian is equal to dnf in fedora -BEGIN

Re: [qubes-users] Is it safe to update dom0 now?

2019-05-28 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 > > > 'awokd' via qubes-users: >>>> scurge1tl: >>>>> I am reading the threads related to the issues with the >>>>> dom0 update. Do I understand it properly that now it is >

Re: [qubes-users] Is it safe to update dom0 now?

2019-05-27 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 > > > 'awokd' via qubes-users: >>>> scurge1tl: >>>>> I am reading the threads related to the issues with the >>>>> dom0 update. Do I understand it properly that now it is >

Re: [qubes-users] sys-usb not showing up for attached USB

2019-05-27 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 > I attach my USB key I use for the backup of my USB port. It gets > recognized as Device available. But when I want to attach it to my > running sys-usb, it doesn't give me the option. > > I tried to create a new AppVM, and it shows me the

[qubes-users] sys-usb not showing up for attached USB

2019-05-27 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 I attach my USB key I use for the backup of my USB port. It gets recognized as Device available. But when I want to attach it to my running sys-usb, it doesn't give me the option. I tried to create a new AppVM, and it shows me the option to attach

Re: [qubes-users] Is it safe to update dom0 now?

2019-05-27 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 'awokd' via qubes-users: > scurge1tl: >> I am reading the threads related to the issues with the dom0 >> update. Do I understand it properly that now it is safe to >> update the dom0 and the mentioned issues are no

Re: [qubes-users] Qubes not updating

2019-05-27 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 'awokd' via qubes-users: > scurge1tl: > >> http://deb.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.o nion/r4.0/vm >> >> >> >> stretch InRelease >> Err:7 >> http://deb.qubesosfasa4zl4

[qubes-users] Qubes not updating

2019-05-27 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 I tried to update my templates and none of it updates (fedora 29, debian 9 and whonix-ws and gw). I didn't change anything from few days ago and now get this error: user@debian-9:~$ sudo apt update Ign:1 http://vwakviie2ienjx6t.onion/debian stretch

[qubes-users] Is it safe to update dom0 now?

2019-05-27 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 I am reading the threads related to the issues with the dom0 update. Do I understand it properly that now it is safe to update the dom0 and the mentioned issues are not spawning anymore? Should I better backup my qubes before proceeding to the USB?

[qubes-users] X230 vs Purism - real world attack probability

2019-05-21 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 I have a question related to the decision about what laptop is the better option for Qubes usage, from the security point of view, in the real world. The question is related to the IME on Intel, PSP on AMD and other Hardware holes. I took these

[qubes-users] No gui on disk encryption

2019-05-21 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 During boot operation where I am required to enter the disk password, I dont get the gui password field, but I get terminal like field. I have this issue for few weeks now, and I thought that after some dom0 updates it gets solved, but the issue

Re: [qubes-users] Global settings button stopped working on Qube Manager

2019-05-13 Thread scurge1tl
global_settings.py. 'awokd' via qubes-users: > scurge1tl: >> The button Global settings, stopped working in my Qubes manager >> window. Once I press the button, nothing happens. I run latest >> Qubes 4. The issue appeared after latest dom0 update. > > Have heard that

[qubes-users] Global settings button stopped working on Qube Manager

2019-05-12 Thread scurge1tl
The button Global settings, stopped working in my Qubes manager window. Once I press the button, nothing happens. I run latest Qubes 4. The issue appeared after latest dom0 update. Any ideas welcome! -- You received this message because you are subscribed to the Google Groups "qubes-users"

[qubes-users] loula

2019-05-09 Thread scurge1tl
-- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To