[qubes-users] xfce-question and -problem

2016-07-01 Thread Niels Kobschätzki
Hi, since there are plans to move away from kde to xfce (or is it now lxde?), I am trying to use xfce more. But I have a problem. I usually start my programs via krunner or in i3 via dmenu. I can just start typing something like: untrusted: google-chrome, hit enter and the application will start

[qubes-users] Re: issues in 3.2

2016-07-01 Thread Drew White
KDE crashes EVERY TIME I change the RAM of a guest. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this

[qubes-users] Re: issues in 3.2

2016-07-01 Thread Drew White
> > 4. No terminal access, have to go to next window > Well, at least I have a workaround for this. But it still needs a menu system. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails

[qubes-users] Re: issues in 3.2

2016-07-01 Thread Drew White
At least I can run things using the alternate consoles in the GUI. Even though it's a waste of time when you use 5 monitors, it's at least working I guess -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group

[qubes-users] issues in 3.2

2016-07-01 Thread Drew White
1. During initial configuration, if you don't create the NetVMs because you want to set everything yourself, it has error running a command because no matter what, it will try to run the command on the sys-net and sys-firewall. 2. No desktop 3. No taskpar/panels 4. No terminal access, have to

[qubes-users] Qubes OS Installation Fail

2016-07-01 Thread 'Danny Davenport' via qubes-users
 Everything installs fine except when I get to the end of the installation process that includes creating VMs. I get an error message that says  Setting up network failure!  ['/usr/sbin/service', 'qubes-netvm', 'start'] failed Redirecting to  /bin/systemctl start qubes-netvm.servicefor

Re: [qubes-users] Can you update the tutorial for installing nvidia drivers on dom0 ?

2016-07-01 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-07-01 11:13, Orlessan wrote: > I wanted to be a qubes user few month ago but I couldn't because I > have a nvidia graphic card and I couldn't have a dual screen setup. > I wanted to install the drivers but I didn't work. > > Could you

Re: [qubes-users] Suggestion: Allow modification of Firewall Rules of several Vms at once

2016-07-01 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-07-01 11:04, Grzesiek Chodzicki wrote: > @Andrew > > A user has a network share on the internal network. This share > does not require the user to provide any extra credentials to > access it (for the same reason Qubes uses passwordless

Re: [qubes-users] qubes and sugarsync

2016-07-01 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-07-01 08:01, Nicola Schwendener wrote: > Hello all, I wish to move away from my windows pc to qubes os. in > my configuration I still will use windows HVM because I need to run > some software (and some office macro) in it. I've some

[qubes-users] Re: Will KDE be deprecated? Migration for in-place upgrades?

2016-07-01 Thread Eva Star
Sorry for my stupid question, but ksnapshot tool is the part of KDE? Will this tool be available at the system when KDE will be removed by default? I'm almost done the script that upload automatically screenshots from this tool to imgurl hosting via appvm. And I need to know need to continue

[qubes-users] Re: Qubes R3.2 Failed to Load Kernel Modules

2016-07-01 Thread Eva Star
I can confirm. I have the same error while Qubes is loaded. And sudo systemctl status systemd-modules-load also write me about success. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails

Re: [qubes-users] Unable to create arch template

2016-07-01 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Jul 01, 2016 at 03:00:47PM -0700, Jaakko Färm wrote: > Hi, > > I'm following the instructions given here > . Everything seems to be > going great until I get to the last part of make

Re: [qubes-users] Re: Qubes 3.2 rc1 has been released!

2016-07-01 Thread Qubed One
Marek Marczykowski-Górecki: > On Tue, Jun 28, 2016 at 10:36:42AM -0700, raahe...@gmail.com wrote: >> Will we be able to upgrade to 3.2 from dom0 update eventually? Or if we >> choose not to reinstall is there security implications? > > Yes. Experimental instruction already online: >

Re: [qubes-users] qubes-usb-proxy in 3.2?

2016-07-01 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Tue, Jun 28, 2016 at 09:36:13PM +0200, Niels Kobschätzki wrote: > Hi, > > I am trying to install qubes-usb-proxy in my Fedora-23-template in > 3.2RC1 but dnf cannot find it. When I do a "dnf search qubes" I get > listed several qubes-packages

[qubes-users] Unable to create arch template

2016-07-01 Thread Jaakko Färm
Hi, I'm following the instructions given here . Everything seems to be going great until I get to the last part of make qubes-vm, make gui-agent-linux-vm. Then I get the this: error: target not found: pulseaudio<9.0 > warning: skipping

Re: [qubes-users] qubes-usb-proxy in 3.2?

2016-07-01 Thread Qubed One
Niels Kobschätzki: > Hi, > > I am trying to install qubes-usb-proxy in my Fedora-23-template in > 3.2RC1 but dnf cannot find it. When I do a "dnf search qubes" I get > listed several qubes-packages but nothing like qubes-usb-proxy. > Do I need to enable an extra repo, is the problem once again

Re: [qubes-users] manual update dom0 to newest 4.5 kernel

2016-07-01 Thread R F
On Tue, Jun 28, 2016 at 5:07 PM, R F wrote: > Holger, > > Great to hear you managed to upgrade the kernel !! This means I might not > need to buy an other laptop after all. > > I looked back at what you posted but it's a bit confusing. I'm probably > not the only one. > >

Re: [qubes-users] Qubes R3.2 Failed to Load Kernel Modules

2016-07-01 Thread Marek Marczykowski-Górecki
On Fri, Jul 01, 2016 at 07:50:51PM +, amad...@riseup.net wrote: > On 2016-07-01 18:26, Marek Marczykowski-Górecki wrote: > > -BEGIN PGP SIGNED MESSAGE- > > Hash: SHA256 > > > > On Fri, Jul 01, 2016 at 08:13:32AM +, am wrote: > > > During the boot process I get messages Failed to

Re: [qubes-users] dispvms + whonix template = broken in xfce

2016-07-01 Thread J.M. Porup
On Fri, Jul 01, 2016 at 08:17:25PM +0200, Marek Marczykowski-Górecki wrote: > On Fri, Jul 01, 2016 at 02:19:01PM -0400, J.M. Porup wrote: > > So I've been using dispvms based on the whonix-ws template in order to > > get disposable torbrowser working. > > > > This works great in KDE, but when I

[qubes-users] Qubes R3.2 Failed to Load Kernel Modules

2016-07-01 Thread am
During the boot process I get messages Failed to Load Kernel Modules.Is this sometyhing I should be concerned about? It does not appear to have affected the operation of Qubes in any way. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To

Re: [qubes-users] dispvms + whonix template = broken in xfce

2016-07-01 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Jul 01, 2016 at 02:19:01PM -0400, J.M. Porup wrote: > So I've been using dispvms based on the whonix-ws template in order to > get disposable torbrowser working. > > This works great in KDE, but when I switched over to xfce, dispvms >

Re: [qubes-users] Installing XFCE

2016-07-01 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Jul 01, 2016 at 02:14:57PM -0400, J.M. Porup wrote: > On Fri, Jul 01, 2016 at 11:02:49AM -0700, Micah Lee wrote: > > I've installed Qubes 3.2-rc1 with only KDE. How do I install XFCE now as > > well? The docs [1] about this look super

[qubes-users] dispvms + whonix template = broken in xfce

2016-07-01 Thread J.M. Porup
So I've been using dispvms based on the whonix-ws template in order to get disposable torbrowser working. This works great in KDE, but when I switched over to xfce, dispvms refuse to start. The usual workaround is to rebuild the dispvm template, but that didn't work for me in xfce...so I've had

[qubes-users] Can you update the tutorial for installing nvidia drivers on dom0 ?

2016-07-01 Thread Orlessan
I wanted to be a qubes user few month ago but I couldn't because I have a nvidia graphic card and I couldn't have a dual screen setup. I wanted to install the drivers but I didn't work. Could you update the tutorial page for the nvidia driver installation

Re: [qubes-users] Installing XFCE

2016-07-01 Thread J.M. Porup
On Fri, Jul 01, 2016 at 11:02:49AM -0700, Micah Lee wrote: > I've installed Qubes 3.2-rc1 with only KDE. How do I install XFCE now as > well? The docs [1] about this look super outdated. A couple things that > I tried but didn't work: > > sudo qubes-dom0-update xfce4 > sudo qubes-dom0-update

Re: [qubes-users] Installing XFCE

2016-07-01 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Jul 01, 2016 at 11:02:49AM -0700, Micah Lee wrote: > I've installed Qubes 3.2-rc1 with only KDE. How do I install XFCE now as > well? The docs [1] about this look super outdated. A couple things that > I tried but didn't work: > > sudo

Re: [qubes-users] Suggestion: Allow modification of Firewall Rules of several Vms at once

2016-07-01 Thread Grzesiek Chodzicki
@Andrew A user has a network share on the internal network. This share does not require the user to provide any extra credentials to access it (for the same reason Qubes uses passwordless sudo). The user creates a separate AppVM in order to access the share and, in Qubes Firewall, allows the

[qubes-users] Installing XFCE

2016-07-01 Thread Micah Lee
I've installed Qubes 3.2-rc1 with only KDE. How do I install XFCE now as well? The docs [1] about this look super outdated. A couple things that I tried but didn't work: sudo qubes-dom0-update xfce4 sudo qubes-dom0-update @XFCE sudo qubes-dom0-update @xfce-desktop-environment [1]

Re: [qubes-users] Will KDE be deprecated? Migration for in-place upgrades?

2016-07-01 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Jul 01, 2016 at 03:43:00PM +, Patrick Schleizer wrote: > I understand, the port to GNOME did not work out yet, and that now the > decision has been made to make Qubes R3.2 based on LXDE. > > Sources: > -

Re: [qubes-users] Will KDE be deprecated? Migration for in-place upgrades?

2016-07-01 Thread Patrick Schleizer
XFCE. Not LXDE. (Sorry, I messed that up!) Patrick Schleizer: > I understand, the port to GNOME did not work out yet, and that now the > decision has been made to make Qubes R3.2 based on LXDE. > > Sources: > - https://github.com/QubesOS/qubes-issues/issues/1806 > -

Re: [qubes-users] Problems with GUI Agent on Windows (was: Lenovo Thinkpad P50 Qubes)

2016-07-01 Thread Peter M
On Sunday, June 19, 2016 at 5:08:09 PM UTC-6, derfa...@gmail.com wrote: > > hi fellow p50ers, > > On Monday, May 16, 2016 at 2:25:07 PM UTC+2, Achim Patzner wrote: > > > Am 16.05.2016 um 12:57 schrieb derfa...@gmail.com : > > > > > > on another note, i finally ended up deleting my usbvm. it

Re: [qubes-users] Linux-libre in dom0

2016-07-01 Thread raahelps
On Friday, July 1, 2016 at 7:47:11 AM UTC-4, Duncan Guthrie wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > > > On 01/07/16 02:05, raahe...@gmail.com wrote: > > On Thursday, June 30, 2016 at 8:49:16 PM UTC-4, Duncan Guthrie > > wrote: On 01/07/16 00:03, Marek Marczykowski-Górecki

Re: [qubes-users] Re: Will KDE be deprecated? Migration for in-place upgrades?

2016-07-01 Thread Alex
On 07/01/2016 06:49 PM, raahe...@gmail.com wrote: > [...] > But XFCE is definitely the way to go now imo. +1 -- Alex -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an

[qubes-users] Re: Will KDE be deprecated? Migration for in-place upgrades?

2016-07-01 Thread raahelps
On Friday, July 1, 2016 at 11:43:50 AM UTC-4, Patrick Schleizer wrote: > I understand, the port to GNOME did not work out yet, and that now the > decision has been made to make Qubes R3.2 based on LXDE. > > Sources: > - https://github.com/QubesOS/qubes-issues/issues/1806 > -

[qubes-users] Will KDE be deprecated? Migration for in-place upgrades?

2016-07-01 Thread Patrick Schleizer
I understand, the port to GNOME did not work out yet, and that now the decision has been made to make Qubes R3.2 based on LXDE. Sources: - https://github.com/QubesOS/qubes-issues/issues/1806 - https://github.com/QubesOS/qubes-issues/issues/2119 Therefore my question, will KDE be deprecated? Or

[qubes-users] qubes and sugarsync

2016-07-01 Thread Nicola Schwendener
Hello all, I wish to move away from my windows pc to qubes os. in my configuration I still will use windows HVM because I need to run some software (and some office macro) in it. I've some questions about storages and cloud accounts. I've a crashplan account that I wish to continue using in

Re: [qubes-users] Linux-libre in dom0

2016-07-01 Thread Alex
On 07/01/2016 04:03 PM, Duncan Guthrie wrote: > > Thanks for your reply! However, I think I need to clarify some things > here. > Freed-ora is a repository produced by the Linux-libre project which > provides a kernel without the proprietary firmware programs, and a > package which removes and

Re: [qubes-users] Q wipe files

2016-07-01 Thread Chris Laprise
On 07/01/2016 01:14 AM, Andrew David Wong wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-06-30 13:47, 109384'109438'0194328'0914328'098 wrote: Hello, Q security policy don't protect against app-exploits, but give the tools to protect your data. Protect data, but not apps!

Re: [qubes-users] How do I install packages to a template over a VPN?

2016-07-01 Thread Ward... James Ward
I had done that in the past in another scenario. Turns out my employer's idea of a secure workstation and the separate firewall VM do not mesh. There were several ways it failed my employer's security checks, but then they're expecting a standalone system or a standalone VM at most. On Fri, Jul

Re: [qubes-users] Linux-libre in dom0

2016-07-01 Thread Alex
On 07/01/2016 01:46 PM, Duncan Guthrie wrote: > > I understand what Marek is saying. I'm saying that ideally we > shouldn't let any proprietary software by loaded by dom0, because we > simply have no idea what it does. For example, someone could > pressure the people who write the firmware to

Re: [qubes-users] Linux-libre in dom0

2016-07-01 Thread Duncan Guthrie
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 01/07/16 02:05, raahe...@gmail.com wrote: > On Thursday, June 30, 2016 at 8:49:16 PM UTC-4, Duncan Guthrie > wrote: On 01/07/16 00:03, Marek Marczykowski-Górecki wrote: On Thu, Jun 30, 2016 at 10:57:42PM +0100, Duncan Guthrie wrote:

Re: [qubes-users] How do I install packages to a template over a VPN?

2016-07-01 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Jun 23, 2016 at 10:29:16PM -0700, Andrew David Wong wrote: > On 2016-06-23 12:03, James Ward wrote: > > I'm reinstalling to clean up all the experimenting I did yesterday > > just to get a fresh start, but I do have one more question I

[qubes-users] HCL - HP 15-r069no laptop

2016-07-01 Thread ulrik
Hello! I tried Qubes with this laptop a year ago but it failed to boot, now it does. Normal use works without problems using whonix-gw as connection using WLAN. Disk encryption works. Windows 7 installation is very slow (this laptop is incredibly slow sometimes) and hangs at finalizing

Re: [qubes-users] AEM boot option causes hard reboot/partial shutdown (Lenovo T450s)

2016-07-01 Thread Rusty Bird
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi Andrew, > On 2016-06-22 21:58, Todd Lasman wrote: >> On 05/16/2016 11:44 PM, Andrew David Wong wrote: I seem to have >> this exact same problem, but only after installing Qubes 3.2 >> (worked fine with 3.1) on my Thinkpad T430. > > Very

Re: [qubes-users] How do I install packages to a template over a VPN?

2016-07-01 Thread Rusty Bird
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi Zrubi, >> There is an issue with updating a template over a vpn: The >> intercepting updates proxy normally runs in sys-net, which can't >> see inside the encrypted vpn traffic. This may be a cause of the >> problem, however it should really

Re: [qubes-users] AEM boot option causes hard reboot/partial shutdown (Lenovo T450s)

2016-07-01 Thread Rusty Bird
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi Chris & everyone, > On 06/23/2016 06:53 AM, Andrew David Wong wrote: >> On 2016-06-23 03:49, Rusty Bird wrote: >>> Hi Andrew, >>> On 2016-06-22 21:58, Todd Lasman wrote: > On 05/16/2016 11:44 PM, Andrew David Wong wrote: I seem to

Re: Removing template rpms removes kernel-qubes-vm (was: Re: [qubes-users] Qubes R3.2 Rc1 feedback)

2016-07-01 Thread niels
> > On July 1, 2016 at 11:56 AM Marek Marczykowski-Górecki > wrote: > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On Wed, Jun 22, 2016 at 10:32:47AM +0200, Alex wrote: > > > > > > In the meantime, I removed the

Re: [qubes-users] Re: Removing template rpms removes kernel-qubes-vm

2016-07-01 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Jul 01, 2016 at 12:08:42PM +0200, Alex wrote: > On 07/01/2016 11:56 AM, Marek Marczykowski-Górecki wrote: > > On Wed, Jun 22, 2016 at 10:32:47AM +0200, Alex wrote: > >> In the meantime, I removed the RPM templates (that > >> were installed

[qubes-users] Re: Removing template rpms removes kernel-qubes-vm

2016-07-01 Thread Alex
On 07/01/2016 11:56 AM, Marek Marczykowski-Górecki wrote: > On Wed, Jun 22, 2016 at 10:32:47AM +0200, Alex wrote: >> In the meantime, I removed the RPM templates (that >> were installed even if unselected during setup!), reinstalled >> kernel-qubes-vm that was automatically uninstalled when

Removing template rpms removes kernel-qubes-vm (was: Re: [qubes-users] Qubes R3.2 Rc1 feedback)

2016-07-01 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Wed, Jun 22, 2016 at 10:32:47AM +0200, Alex wrote: > In the meantime, I removed the RPM templates (that > were installed even if unselected during setup!), reinstalled > kernel-qubes-vm that was automatically uninstalled when removing the > last

Re: [qubes-users] Re: Unable to install 3.2-rc1 on Thinkpad T450s

2016-07-01 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Mon, Jun 27, 2016 at 09:05:03AM +, 41zxmg+5qvzr7o3u2us via qubes-users wrote: > Ping... > > Anyone knows how to pass these parameters (mapbs=1 & noexitboot=1) onto the > kernel on boot time? Changing the xen.cfg simply does not work.

Re: [qubes-users] Suggestion: Allow modification of Firewall Rules of several Vms at once

2016-07-01 Thread Drew White
Perhaps this is something that can be added in when the manager is fixed and the issues with the memory leak and functionality and many other bugs are resolved? This would be a good addition. As it is something that I believe many people would benefit from. -- You received this message

Re: [qubes-users] [3.2rc1] USB Passthrough debugging

2016-07-01 Thread Alex
On 07/01/2016 10:22 AM, Marek Marczykowski-Górecki wrote: > On Fri, Jul 01, 2016 at 10:15:59AM +0200, Alex wrote: >> On 07/01/2016 10:13 AM, Marek Marczykowski-Górecki wrote: >>> On Fri, Jul 01, 2016 at 10:07:48AM +0200, Alex wrote: which, as far as I can tell, is not meaningful - that file

Re: [qubes-users] [3.2rc1] USB Passthrough debugging

2016-07-01 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Jul 01, 2016 at 10:15:59AM +0200, Alex wrote: > On 07/01/2016 10:13 AM, Marek Marczykowski-Górecki wrote: > > On Fri, Jul 01, 2016 at 10:07:48AM +0200, Alex wrote: > >> which, as far as I can tell, is not meaningful - that file is created by

Re: [qubes-users] Re: [3.2rc1] Bug: Windows disappear, VMs go from green to yellow

2016-07-01 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Jun 30, 2016 at 08:18:31PM -0700, Drew White wrote: > > > On Friday, 1 July 2016 11:56:48 UTC+10, Marek Marczykowski-Górecki wrote: > > > > > > Already fixed in testing repo. > > https://github.com/QubesOS/qubes-issues/issues/2085 > > >

Re: [qubes-users] [3.2rc1] USB Passthrough debugging

2016-07-01 Thread Alex
On 07/01/2016 10:13 AM, Marek Marczykowski-Górecki wrote: > On Fri, Jul 01, 2016 at 10:07:48AM +0200, Alex wrote: >> which, as far as I can tell, is not meaningful - that file is created by >> qubesutils.py in usb_attach() if it does not exist, and then deleted >> afterwards. > > No. This isn't

Re: [qubes-users] [3.2rc1] USB Passthrough debugging

2016-07-01 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Jul 01, 2016 at 10:07:48AM +0200, Alex wrote: > On 07/01/2016 09:56 AM, Marek Marczykowski-Górecki wrote: > > Are you sure you have qubes-usb-proxy package available in both > > source and target VM? If so, take a look at logs in both VMs

Re: [qubes-users] [3.2rc1] USB Passthrough debugging

2016-07-01 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Jul 01, 2016 at 09:27:47AM +0200, Alex wrote: > Hello everybody, > I'm testing the new USB passthrough functions in Qubes 3.2 rc1, namely > I'm trying to pass a whole Android smartphone to an AppVM (a cube? :). > > I can see it in dom0 with

[qubes-users] [3.2rc1] USB Passthrough debugging

2016-07-01 Thread Alex
Hello everybody, I'm testing the new USB passthrough functions in Qubes 3.2 rc1, namely I'm trying to pass a whole Android smartphone to an AppVM (a cube? :). I can see it in dom0 with qvm-usb, and I tried to pass it with a naïve command line like: $ qvm-usb -a work dom0:1-4 Problem is, the

Re: [qubes-users] Suggestion: Allow modification of Firewall Rules of several Vms at once

2016-07-01 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Jun 30, 2016 at 02:15:35PM -0700, grzegorz.chodzi...@gmail.com wrote: > > Preamble > Qubes OS offers an option to restrict network traffic within a VM to a > specific address/domain/website which is a very useful feature as it allows >