[qubes-users] Display
How do you split a 4k monitor into 4 virtual monitors and or work spaces? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/X3XRZEASCPfG9cpqzh5wHJdBqXx3ZuHaYEa_N0Rc4M7T79EWrSnSj7CpFulpGK1q6GnVdflnFXB6VDcR3F3I4LuiNaStK4uLeDiN4733n8g%3D%40protonmail.com.
[qubes-users] Re: Fw: qubes arch template
Le 10/31/20 à 6:15 PM, fargubz a écrit : I have a large 4k monitor. How do I split the screen into 4 virtual screens and or work spaces? ‐‐‐ Original Message ‐‐‐ On Thursday, July 16, 2020 3:16 PM, Frédéric Pierret wrote: On 2020-07-16 16:51, fargubz wrote: Hi Frederic, Having the https://github.com/QubesOS/qubes-issues/issues/5503 issue. Hi, please don't ask directly to any member of the Qubes OS project (including me :)). Ask to the list directly for which I CC it. Hi, I've already asked you to don't request help directly please. I've forwarded your previous email to the appropriate list. Please see: https://www.qubes-os.org/support/ Regards. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0aed498f-ed42-185c-f2de-95886914d717%40qubes-os.org. OpenPGP_0x484010B5CDC576E2.asc Description: application/pgp-keys OpenPGP_signature Description: OpenPGP digital signature
Re: [qubes-users] [PoC] Qubes SleepKeeper - auto shutdown your Qubes if no password entered after wake up
On 10/30/20 5:51 AM, evado...@gmail.com wrote: interesting but threat model unclear. If the attacker can force you to enter one password after suspend, why would he not force you to enter LUKS and user password 5 minutes later? There are a lot of more attack vectors when system is booted and only protected by xscreensaver. The attacker can use some hardware backdoors, xscreensaver bugs/backdoors/kill it to receive access: dump your memory on hardware level, receive access to memory from vulnerable hardware, guess screensaver password etc. If the system will automatically shutdown then there is only one attack vector: LUKS password There's no disagreement that shut down is more secure than suspended, but the devil is in the details. How exactly is it supposed to work? 1. Attacker forces you to wake up computer (e.g., open laptop lid). 2. Attacker forces you to enter password. 3. You enter incorrect password? 4. Attacker tells you to enter correct password this time? 5. Qubes shuts down because it's been too long? Why not just have an alternate passphrase that, when entered, shuts down the PC (or, as you suggest, wipes the LUKS header)? Why a timer? Perhaps the alternate passphrase, when entered, also sends out an SOS message? пятница, 30 октября 2020 г. в 07:54:14 UTC, haa...@web.de: On 10/29/20 11:06 PM, evado...@gmail.com wrote: Proof of Concept. github.com/evadogstar/qubes-sleepkeeper Qubes-Sleepkeeper protects you from physical attack when the attacker force you to enter the password of your Qubes after it wakeup from sleep or from password guessing after wakeup. The attacker have very limited time to do so or Qubes will shutdown automaticaly. Interesting but threat model unclear. If the attacker can force you to enter one password after suspend, why would he not force you to enter LUKS and user password 5 minutes later? Please explain. Rather an evil maid "attempt detection" (not protection) by "laptop is down instead of sleeping"? I think it really could help as additional data protection in case of normal, criminal theft... -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/43f252c2-f34c-202a-9775-37c45cb762c2%40qubes-os.org. OpenPGP_signature Description: OpenPGP digital signature
[qubes-users] "Pane is dead" 4.0.3 Intel Nuc
"Pane is dead" is result trying to install Qubes 4.0.3. Different solutions have not worked on Nuc. Some said that Nuc's BIOS settings need to be changed. Not know what is needed to change. "X startup failed, aborting installation X startup failed, aborting installation The installation cannot continue and the system will be rebooted Press ENTER to continue Pane is dead" Have booted in both UEFI and Legacy, nothing. Thank you. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/bih-ngEoiQfGXcvR7OJDV0Un-tfAsKsJbWI9SSTB_6DLHhkm-hvMweW8K8RoFA8ml0-cs3Z75pmLRiJ5vcS3Pu6H7m9dpPim-pk_wQOrXpQ%3D%40protonmail.com.