-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-27 10:50, Cube wrote:
> This would be more in the style of Tails - no persistent state.
>
This has been proposed and is being tracked here:
https://github.com/QubesOS/qubes-issues/issues/2024
You can find some interesting discussion in
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-27 16:35, Adi Carlisle wrote:
> Message in Qubes VM manager -- Error starting
> VM: Internal error: Unable to reset PCI device :00:1f.3: no
> FLR, PM reset or bus reset available --
>
> The ma
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-27 08:59, Cube wrote:
> Assume you have a disconnected Vault VM with your passwords, and a
> Shopping VM where you access Amazon, etc. Highest security is to
> copy/paste passwords over from the Vault as needed. Less secure
> (but still
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-27 13:09, B, Pat wrote:
> Following the Recipe
>
> https://www.qubes-os.org/doc/uefi-troubleshooting/ Note: The
> recipe isn't quite correct, it says to hit 'e' from GRUB menu. The
> 'e' option is only available after you select 1. Tro
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-27 07:22, Achim Patzner wrote:
> Am 25.08.2016 um 21:33 schrieb johnyju...@sigaint.org:
>
>> While it's a bit slower, I prefer booting from DVD, a read-only
>> medium.
>
> There are verifyably hardware-controlled (physical switch)
> unwr
Cube:
> On Saturday, August 27, 2016 at 10:50:20 AM UTC-7, Cube wrote:
>> This would be more in the style of Tails - no persistent state.
>
> Wups, there is some thought on this already
>
> https://www.whonix.org/wiki/Qubes/Disposable_VM
>
> There are issues, anybody try this?
I use Whonix as a
If I install LibreOffice in a Fedora 23 Template using Qubes 3.2, the
"Presentation Display" setting works properly with no issues, so I can
see my notes on my main display and the presentation shows up on my
external display.
However, this doesn't work properly under Debian 8 or Whonix 13. It
se
Hi is there any thing I can do to get Asus g752vl touch-pad working in Qubes?
Also laptop has a i7-6700HQ & a Nivda gtx 965m - can the igpu be made to work
instead of the Nvida gpu?
Thanks for any help!
--
You received this message because you are subscribed to the Google Groups
"qubes-user
On Saturday, 27 August 2016 18:50:20 UTC+1, Cube wrote:
> This would be more in the style of Tails - no persistent state.
TAILS hvm?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from i
Message in Qubes VM manager
--
Error starting VM: Internal error: Unable to reset PCI device :00:1f.3: no
FLR, PM reset or bus reset available
--
The machine is from custom built from PCspecialist: Lafitte ii 13'
Can someone help me with a workaround o
On Saturday, August 27, 2016 at 1:50:22 PM UTC-7, johny...@sigaint.org wrote:
> BTW, keepassx rocks. I'm working on some scripts to make it a little less
> painful with all the Ctrl-Alt-C and Ctrl-Alt-V'ing (which also conflicts
> with the standard konsole paste shortcuts).
I have no problem with
On 08/27/2016 08:09 PM, B, Pat wrote:
Following the Recipe
https://www.qubes-os.org/doc/uefi-troubleshooting/
Note: The recipe isn't quite correct, it says to hit 'e' from GRUB menu.
The 'e' option is only available after you select
1. Troubleshoot
2. Boot from device
Was able to install an
Hey, does anyone have any luck with getting any form of OSX to fire up
under Qubes?
After several other failures, I was able to get some iPC ISO build to get
to a certain point in an HVM, but the mouse didn't work, so I couldn't do
much, and I couldn't figure out how to get it to any kind of comma
> On 08/27/2016 07:36 PM, Cube wrote:
>> On Saturday, August 27, 2016 at 9:31:31 AM UTC-7, Alex wrote:
>>> On 08/27/2016 05:59 PM, Cube wrote: For specific services (say, the
>>> mentioned Amazon) I keep a keepassx database on the specific AppVM
>>> in which the service is expected to be used - the
.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/qubes-users/CAFCr0KGP6z_Fa%3DPm6x9JoUcXZnOSfAewyS-dcDJRLDqmDh1r2g%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.
Qubes-HC
Yes Cube, indeed, btw I just realized you have evil people sniffing around
between your local AppVMs if you want to link them, for some reason (I did a
tcpdump on 1 VM that I linked to another one using documentation and I think I
had probably someone in between, an MITM, but obviously both VMs
On 08/27/2016 07:36 PM, Cube wrote:
> On Saturday, August 27, 2016 at 9:31:31 AM UTC-7, Alex wrote:
>> On 08/27/2016 05:59 PM, Cube wrote: For specific services (say, the
>> mentioned Amazon) I keep a keepassx database on the specific AppVM
>> in which the service is expected to be used - the Amazo
On Saturday, August 27, 2016 at 10:50:20 AM UTC-7, Cube wrote:
> This would be more in the style of Tails - no persistent state.
Wups, there is some thought on this already
https://www.whonix.org/wiki/Qubes/Disposable_VM
There are issues, anybody try this?
--
You received this message because
On Saturday, August 27, 2016 at 5:13:34 AM UTC-7, a.fel...@gmail.com wrote:
> Same problem..., manual and katooling with option full, and
> misplaced desktop with last available kali iso.
> My video card is also a nvidia (GT330M)
Same problem with either Intel and AMD graphics cards (dual GPU l
On Saturday, August 27, 2016 at 2:49:52 PM UTC, johny...@sigaint.org wrote:
> >> Whether using an "isolating proxy" (multiple machines) or not, using a
> >> white-listing proxy like Corridor can help ensure all of your traffic
> >> passes through Tor (Entry Guard, at least).
> >>
> >
> > That's rig
This would be more in the style of Tails - no persistent state.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post
On Saturday, August 27, 2016 at 9:31:31 AM UTC-7, Alex wrote:
> On 08/27/2016 05:59 PM, Cube wrote:
> For specific services (say, the mentioned Amazon) I keep a keepassx
> database on the specific AppVM in which the service is expected to be
> used - the Amazon account I use to buy work stuff is sa
On 08/27/2016 05:59 PM, Cube wrote:
> Assume you have a disconnected Vault VM with your passwords, and a
> Shopping VM where you access Amazon, etc. Highest security is to
> copy/paste passwords over from the Vault as needed. Less secure (but
> still highly secure) is to cache them in the Firefox d
Yes, could be. I've had 2 other Intel NUC units running fine so but I'll check
the firmware revisions and BIOS settings.
On Saturday, 27 August 2016 04:05:21 UTC+1, Andrew David Wong wrote:
>
> Could it have something to do with power-saving settings (not just OS-level,
> but BIOS-level)?
>
>
On Wednesday, August 24, 2016 at 6:17:39 PM UTC-7, angelo "angico" costa wrote:
> Hi, all!
>
> I'm using Qubes 3.1 and I'm new with all this compartimented system idea.
>
> I use Node.js for my work and study, and several of its modules should to be
> installed globally. My question is: Should I
Assume you have a disconnected Vault VM with your passwords, and a Shopping VM
where you access Amazon, etc. Highest security is to copy/paste passwords over
from the Vault as needed. Less secure (but still highly secure) is to cache
them in the Firefox database.
What path do people generally t
On Friday, August 26, 2016 at 4:09:34 PM UTC-7, Connor Page wrote:
> you should use the drive as normal in sys-usb. just make the private image
> large enough and copy whatever it is you want to burn to that vm.
Thanks! I had forgotten now that with Salt Qubes has a nice way of doing USB
VM's.
Figure it out, documented here for others.
The problem is for whatever reason the kernel module for my card (Intel laptop
WIFI) wasn't being properly probed for and loaded. So I added the following
line to /rw/config/rc.local and made the file executable
cp /rw/config/iwlwifi-net.conf /etc/modu
after giving it a thought I decided keep usb devices out of dom0. the solution
for debian is real 2FA but ykfde is for lazy people. I gave it as an example of
dracut hooks. theoretically you can rearrange hooks so that yubikey
authentification happens before rd.qubes.hide_all_usb is processed bu
>> Whether using an "isolating proxy" (multiple machines) or not, using a
>> white-listing proxy like Corridor can help ensure all of your traffic
>> passes through Tor (Entry Guard, at least).
>>
>
> That's right. Also, using Firefox with those extensions is *not* the same
> as
> using Tor Browser
> Am 25.08.2016 um 21:33 schrieb johnyju...@sigaint.org:
>
>> While it's a bit slower, I prefer booting from DVD, a read-only medium.
>
> There are verifyably hardware-controlled (physical switch) unwritable
> USB storage devices. A bit expensive but you can get one.
I might look into that, it wou
Am 25.08.2016 um 21:33 schrieb johnyju...@sigaint.org:
> While it's a bit slower, I prefer booting from DVD, a read-only medium.
There are verifyably hardware-controlled (physical switch) unwritable
USB storage devices. A bit expensive but you can get one.
Achim
--
You received this message b
Il giorno giovedì 4 agosto 2016 09:55:49 UTC+2, NewbieG ha scritto:
> On Thursday, August 4, 2016 at 5:29:45 AM UTC, J. Eppler wrote:
> > On Monday, August 1, 2016 at 8:58:56 AM UTC-5, NewbieG wrote:
> > > Hello list,
> > >
> > > I'm running Qubes OS 3.1 and I'm trying to have a Kali VM (2016.1).
> this is an interesting idea. initramfs is generated by dracut. read this
> https://github.com/nj0y/ykfde/blob/master/README-dracut.md
Yes, I gave ykfde a try. Problem is that Qubes still shows its custom
FDE password screen on startup, and never the ykfde second factor one...
(possibly - but j
34 matches
Mail list logo