-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-11-19 03:43, Andrew David Wong wrote:
> On 2016-11-17 10:05, cubit wrote:
>> 17. Nov 2016 15:33 by dmoer...@gmail.com:
>
>>> On Wednesday, November 16, 2016 at 10:21:33 PM UTC-5, george wrote:
Yes. I get the same issue too. I can read t
I don't like this project at all to be honest.
First thing is that it's closed source, which means he can prove exactly
*nothing* to me in terms of security. As long as I can't check, I don't
believe. Sorry.
Second: He writes it's hacking proof, which is impossible to proof. Yes,
maybe it's har
Wow just been reading about Kaspersky OS.
Dam maybe this could be a new super hardened VM for Qubes..?
Apparently not even based on Linux tho, built from the ground up, 14 year
project.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubs
So using the VM manager i created a Win7 HVM (not a HVM template)
I copied over the Win7.iso to a the user directory in dom0
using "qvm-run --pass-io 'cat /path/to/file_in_src_domain' >
/path/to/file_name_in_dom0"
And ran "qvm-start win7 --cdrom=/home/myusername/Win7.iso"
=
First
sit
https://groups.google.com/d/msgid/qubes-users/1249599975.32906.1479610107263%40office.mailbox.org.
For more options, visit https://groups.google.com/d/optout.
Qubes-HCL-Microsoft_Corporation-Surface_Pro_3-20161119-225602.cpio.gz
Description: application/gzip
Qubes-HCL-Microsoft_Corporation-Surface_Pro_3-20161119-225602.yml
Description: application/yaml
Thanks
On Sat, Nov 19, 2016, 19:46 Chris Laprise wrote:
> On 11/19/2016 06:15 PM, Aaron Jefferson wrote:
> > Hadn't turned it on.
> >
> > On Sat, Nov 19, 2016 at 6:08 PM, Aaron Jefferson
> > mailto:ajefferson1...@gmail.com>> wrote:
> >
> > Thanks, I'll check it out.
> >
> >
> > On Sat, N
On 11/19/2016 06:15 PM, Aaron Jefferson wrote:
Hadn't turned it on.
On Sat, Nov 19, 2016 at 6:08 PM, Aaron Jefferson
mailto:ajefferson1...@gmail.com>> wrote:
Thanks, I'll check it out.
On Sat, Nov 19, 2016, 18:06 Chris Laprise mailto:tas...@openmailbox.org>> wrote:
On 11/19
l to qubes-users@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/qubes-users/CANaC%2BvSTkvt2L7y40wNkR7ECK%3DkMPH-1V4qRfWG8sp%3DHG_rr0w%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.
Qubes-HCL-LENOVO-2325W4K-20161119-181318.yml
Description: application/yaml
you can build a tamplate and give im separate networking then if get some wrong
just shut down networking that this template based.
Lets say Tamplate X give networking X and than abandon networking X to separate
Tamplate X from universe.
--
You received this message because you are subscribed t
Thanks, I'll check it out.
On Sat, Nov 19, 2016, 18:06 Chris Laprise wrote:
> On 11/19/2016 02:02 PM, Aaron Jefferson wrote:
> > First boot wlan didn't work, second boot worked fine.
> >
> >
> >
>
> Most X230s with that CPU have Vt-d capability, but the report says 'no'.
> You may want to check
On 11/19/2016 02:02 PM, Aaron Jefferson wrote:
First boot wlan didn't work, second boot worked fine.
Most X230s with that CPU have Vt-d capability, but the report says 'no'.
You may want to check your BIOS to make sure its switched on.
This affects the security and operation of wlan, ethe
On Saturday, November 12, 2016 at 5:21:18 AM UTC+2, Sec Tester wrote:
> So Im still new to Qubes, but after going through a bit of a learning curve,
> building & customizing VM's to suit my security needs, I have a few thoughts
> on its security.
>
> Firstly I really love the direction Qubes has
On Sat, 19 Nov 2016 09:27:39 -0800 (PST), Pawel Debski
wrote:
> is it possible to somehow block a TemplateVM and all VMs based on
> this template?
>
> I.e. whenever some app would be started in any VM involving this
> template I'd like to get an error messages or at least have the
> operation fa
Hello,
is the new Kaspersky OS programmed with integral securiy able to be a solid
foundation of some stateless laptop?
Or is it using just the standard chipsets the the known hardware backdoors?
Kind Regards
--
You received this message because you are subscribed to the Google Groups
"qubes
Torsten Grote:
> On 11/11/2016 06:01 PM, entr0py wrote:
>> Thanks! With that, some progress... Deleting `> bus='xen'/>` from the config file results in usbtablet being
>> replaced with ps/2 mouse device.
>
> I finally got around to try that and it works indeed!
>
>> Now, the pointer tracks mouse
On 11/19/2016 02:31 PM, Marek Marczykowski-Górecki wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Sat, Nov 19, 2016 at 07:20:56PM +, Fred wrote:
On 2016-11-19 11:54, Andrew David Wong wrote:
On 2016-11-16 13:31, Fred wrote:
A good time to ask if Qubes encrypts /boot in it's LU
On 11/11/2016 06:01 PM, entr0py wrote:
> Thanks! With that, some progress... Deleting ` bus='xen'/>` from the config file results in usbtablet being
> replaced with ps/2 mouse device.
I finally got around to try that and it works indeed!
> Now, the pointer tracks mouse movements automatically ins
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Sat, Nov 19, 2016 at 07:20:56PM +, Fred wrote:
> On 2016-11-19 11:54, Andrew David Wong wrote:
> > On 2016-11-16 13:31, Fred wrote:
> > > A good time to ask if Qubes encrypts /boot in it's LUKS setup. I've
> > > not
> > > checked myself.
> > >
On 2016-11-19 11:54, Andrew David Wong wrote:
On 2016-11-16 13:31, Fred wrote:
A good time to ask if Qubes encrypts /boot in it's LUKS setup. I've
not
checked myself.
By default, Qubes does not encrypt /boot. Traditionally, that's
because doing so would render the
system unbootable. However,
-LENOVO-2325W4K-20161119-135504.yml
Description: application/yaml
On 11/19/2016 06:28 AM, Andrew David Wong wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-11-16 13:27, Loren Rogers wrote:
On 11/16/2016 02:33 PM, Grzesiek Chodzicki wrote:
W dniu środa, 16 listopada 2016 20:04:14 UTC+1 użytkownik Loren Rogers napisał:
Hi all,
I've successf
Folks,
is it possible to somehow block a TemplateVM and all VMs based on this template?
I.e. whenever some app would be started in any VM involving this template I'd
like to get an error messages or at least have the operation fail silently
instead of having Qubes start the VM.
Best regards
PD
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 11/19/2016 06:43 AM, Andrew David Wong wrote:
> Sorry, this is a known issue. Enigmail 1.9 is incompatible with
> Split GPG on Debian 8:
>
> https://github.com/QubesOS/qubes-issues/issues/2170
>
> Until this is resolved, I recommend using the Fe
On Sat, Nov 05, 2016 at 03:58:21PM +0100, Marek Marczykowski-Górecki wrote:
> > > > p.s./btw: https://www.qubes-os.org/doc/upgrade-to-r3.1/ advices one to
> > > > install qubes-mgmt-salt-admin-tools but this package does not exist?!
> > > That's interesting, this step should be in 3.1->3.2 instruct
On Sat, Nov 19, 2016 at 9:15 AM, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-11-19 03:53, Franz wrote:
> > Hello
> > After upgrading to 3.2 and backup restoring electrum VM, which had custom
> > firewall settings to connect only to electrum servers, I'
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-11-19 04:48, Achim Patzner wrote:
> Am 19.11.2016 um 12:58 schrieb Andrew David Wong:
>>> These requirements are probably the worst you can do for corporate
>> users; they prefer "standard hardware"; even I would rather stop using
>> Qubes th
Am 19.11.2016 um 12:54 schrieb Andrew David Wong:
> By default, Qubes does not encrypt /boot. Traditionally, that's
> because doing so would render the
> system unbootable. However, that's no longer true with newer versions
> of GRUB, which are now capable
> of booting from encrypted block devices.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-11-18 15:31, Eva Star wrote:
> Hello,
>
> is it possible to sparse fedora template like Windows template? How to fill
> it with nulls before cleaning?
>
> I have this question because fedora-24 template 1 gb bigger after same
> programs i
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-11-18 09:39, Michael Carbone wrote:
> Marek Marczykowski-Górecki:
>> On Fri, Nov 18, 2016 at 02:49:00PM +, Michael Carbone wrote:
>>> Is there an easy way to disable split-gpg notifications? They are just
>>> screen noise, and in XFCE cov
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-11-16 12:48, Chris Laprise wrote:
> What is the command to do the trusted image conversion?
>
The command is: qvm-convert-img
(Requires Qubes 3.2)
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-11-19 03:53, Franz wrote:
> Hello
> After upgrading to 3.2 and backup restoring electrum VM, which had custom
> firewall settings to connect only to electrum servers, I'm getting the
> error documented in the enclosed photo.
>
> In the error
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-11-17 22:07, Sec Tester wrote:
> I Really dislike Dolphin. Thumbnail previews dont even seem to work, and its
> kinda annoying to use. I'd like to swap it out for something lite and simple
> (like the fedora-23 file browser)
>
Thumbnail p
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-11-17 22:57, Sec Tester wrote:
> Just pointing out that there documentation here needs updating to include
> commands for fedora-24:
>
> https://www.qubes-os.org/doc/templates/
>
Do you mean just the numbers ("23" to "24"), or have some a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-11-16 02:35, Achim Patzner wrote:
> Am 15.11.2016 um 14:46 schrieb Andrew David Wong:
>> If you plan to be using the same machines for Qubes 4.x, you should also
>> take into consideration the updated requirements for Qubes-certified
>> har
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-11-16 13:31, Fred wrote:
> A good time to ask if Qubes encrypts /boot in it's LUKS setup. I've not
> checked myself.
>
By default, Qubes does not encrypt /boot. Traditionally, that's because doing
so would render the
system unbootable. How
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-11-17 10:05, cubit wrote:
> 17. Nov 2016 15:33 by dmoer...@gmail.com:
>
>> On Wednesday, November 16, 2016 at 10:21:33 PM UTC-5, george wrote:
>>> Yes. I get the same issue too. I can read the message, but I can't write,
>>> and I'm also in
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-11-17 04:26, Salmiakki wrote:
> Copy/Paste between dom0 and other domains is intentionally prohibited.
>
> https://www.qubes-os.org/doc/copy-paste/#copypaste-between-dom0-and-other-domains
>
> Or maybe you want this:
>
> https://www.qubes-
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-11-16 04:37, Sec Tester wrote:
> qvm-revert-template-changes debian-8 - didnt fix it. I tried to set an
> earlier date, but --help file and man file didnt specific the option format.
>
qvm-revert-template-changes can only roll back changes
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-11-16 12:10, Loren Rogers wrote:
> I can't seem to update dom0 using the regular updater. The system keeps
> telling me there are updates for dom0, but I can't get anything to actually
> update. Is there something I'm missing here?
>
> Cli
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-11-16 13:27, Loren Rogers wrote:
> On 11/16/2016 02:33 PM, Grzesiek Chodzicki wrote:
>
>> W dniu środa, 16 listopada 2016 20:04:14 UTC+1 użytkownik Loren Rogers
>> napisał:
>>> Hi all,
>>>
>>> I've successfully installed Qubes on my Thinkpa
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-11-16 11:15, '834'109438'1094328'0193284'098 wrote:
> Hello,
>
> Q need enough free disk space in the root partition, as I found in the
> documentation:
>
> https://www.qubes-os.org/doc/out-of-memory/
>
> Check the disk space:
>
> df
>
On 11/19/2016 09:30 AM, Ray Brainer wrote:
> I am having hard time to make desktop sharing in Qubes.
> Within VM I see white screen.
X server in VM does not allow screengrabs at all. Security measure.
> Installing software on dom0 and using it in broadcast is denied.
> What should I do?
>
dom0
On Saturday, November 19, 2016 at 4:30:44 AM UTC-5, Ray Brainer wrote:
> I am having hard time to make desktop sharing in Qubes.
> Within VM I see white screen.
> Installing software on dom0 and using it in broadcast is denied.
> What should I do?
what are you trying to do? dom0 has no internet, s
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Sat, Nov 19, 2016 at 02:44:38AM -0800, Grzesiek Chodzicki wrote:
> AFAIK Qubes uses only LTS kernels for both dom0 and templates. Will Qubes be
> upgraded to the upcoming 4.9 kernel whenver final version is released? 4.9 is
> supposed to be the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-11-16 00:03, nezna...@xy9ce.tk wrote:
> If i have intel processor with the vPro technology - should i afraid some
> "factory vulnerabilities" of that technology and some manipulation with my
> BIOS. Or security of Qubes is higher of that le
AFAIK Qubes uses only LTS kernels for both dom0 and templates. Will Qubes be
upgraded to the upcoming 4.9 kernel whenver final version is released? 4.9 is
supposed to be the next LTS version.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To u
I am having hard time to make desktop sharing in Qubes.
Within VM I see white screen.
Installing software on dom0 and using it in broadcast is denied.
What should I do?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this grou
On Friday, November 18, 2016 at 11:41:56 PM UTC-5, Loren Rogers wrote:
> Very interesting - I'll look into these as options. Out of curiosity,
> would it be possible to post your script to Gist? (To be sure I don't
> miss something.) I'd like to explore this in more detail, and it would
> be r
48 matches
Mail list logo