> > Qubes was working flawlessly on my GTX 670,
>
> So why did you change anything if things were working?
>
>
> Achim
Qubes isn't my main OS and I wanted an upgrade
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this gro
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-09-15 14:45, mara.kuens...@gmail.com wrote:
> Hi,
>
> I just installed Qubes OS and I feel its freakin awesome!
>
> I am trying to set it up the way I want and one thing on my list is having a
> dropbox vm that provides simply just the clo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-09-16 10:36, Otto Kratik wrote:
> With a Windows 7 HVM, initially upon creation it is a fixed small
> window size and shows two mouse pointers chasing each other within
> that HVM window. By installing Qubes Windows Tools, both of these
> lim
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-09-16 04:41, amadaus wrote:
> I have downloaded Qubes R3.2-rc3 iso and in the course of verifying
> signatures received the following output:
> [user@rubbish ~]$ gpg -v --verify
> '/home/user/Downloads/Qubes-R3.2-rc3-x86_64.iso.asc'
> '/home/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-09-15 17:50, Franz wrote:
> On Thu, Sep 15, 2016 at 5:26 AM, Andrew David Wong wrote:
>
> On 2016-09-14 19:11, Franz wrote:
On Wed, Sep 14, 2016 at 8:54 PM, Marek Marczykowski-Górecki <
marma...@invisiblethingslab.com> wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-09-14 09:30, katerim...@sigaint.org wrote:
> Hello
> Little issue
> After running:
> cd /var/run/qubes-service/
> sudo touch macspoof-enp0s0
> sudo touch macspoof-wlp0s1
>
> I see the files, but when I shutdown the VM and restart there aren'
> Am 16.09.2016 um 09:09 schrieb almightyl...@gmail.com:
>
> Qubes was working flawlessly on my GTX 670,
So why did you change anything if things were working?
Achim
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this gr
> On 09/16/2016 01:18 PM, Robert wrote:
> > Hi!
> >
> > I wonder if there is a command-line way to get the name (or any
> > other id) of appVM's colour, used for window borders and such, from
> > within the same appVM (not dom0)? It could be useful for
> > customizing bash prompt's colours.
> >
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 09/16/2016 01:18 PM, Robert wrote:
> Hi!
>
> I wonder if there is a command-line way to get the name (or any
> other id) of appVM's colour, used for window borders and such, from
> within the same appVM (not dom0)? It could be useful for
> custom
Am Freitag, 16. September 2016 20:11:48 UTC+2 schrieb Chris Laprise:
> On 09/16/2016 09:58 AM, mara.kuens...@gmail.com wrote:
> > Am Freitag, 16. September 2016 09:52:40 UTC+2 schrieb Drew White:
> >> If they can get access, whether encrypted or not, it means it's insecure.
> >>
> >> Encryption jus
Hi!
I wonder if there is a command-line way to get the name (or any other id) of
appVM's colour, used for window borders and such, from within the same appVM
(not dom0)?
It could be useful for customizing bash prompt's colours.
I guess, I'd not be surprised if the answer was no due to security
On 09/16/2016 09:58 AM, mara.kuens...@gmail.com wrote:
Am Freitag, 16. September 2016 09:52:40 UTC+2 schrieb Drew White:
If they can get access, whether encrypted or not, it means it's insecure.
Encryption just takes time to break.
If you have encrypted files, encrypted with a STRONG password
>
> Looks like either the iso or the boot media is bad.
>
> Did you verify the iso with gpg? And is the DVD or USB stick big enough
> (should be at least 7GB)?
>
> Chris
Thanks for responding, Chris.
I verified the ISO with gpg, cross-referencing the signatures from various
reliable sources
On 09/16/2016 01:33 PM, Mike Schowalter wrote:
I've had a heck of a time trying to get an installtion going on a little Lenovo
11e Yoga. I know it doesn't have vt-d, but I want to install it to at least get
comfortable with Qubes. Release candidate 3 of 3.2 has actually been more
promising tha
With a Windows 7 HVM, initially upon creation it is a fixed small window size
and shows two mouse pointers chasing each other within that HVM window. By
installing Qubes Windows Tools, both of these limitations are removed. One
single mouse pointer and full screen resolution are achieved - as we
Dear all,
When I'm trying to boot Qubes on my MacBookPro8,2 from ca 2011 using the
steps
1. put qubes on USB-stick using dd
if=Downloads/Qubes-R3.1-x86_64/Qubes-R3.1-x86_64.iso of=/dev/disk2 bs=100m
2. reboot
3. in the previously installed refind choose either xen.efi or the penguin
if I bo
the web visit
https://groups.google.com/d/msgid/qubes-users/awKE859ZionvG-EWWpKGSuCZf1-MdE1oakt9vNUc_jJ_Wlw-Cux0n-ULmBPua5lq10k44m6oJm0HYizTRmrvgwMQrsTe_-q3C5wFdyws-Vw%3D%40protonmail.com.
For more options, visit https://groups.google.com/d/optout.
Qubes-HCL-MSI-MS_7917-20160916-093919.yml
Description: appl
Am Freitag, 16. September 2016 09:27:26 UTC+2 schrieb Raphael Susewind:
> IMHO the safest option is indeed to use a split-dm kind of approach, as
> suggested before: create a loopback file in the dropbox VM, expose this
> via qvm-block to your working VM where you then do all the encryption
> (usin
Am Freitag, 16. September 2016 09:52:40 UTC+2 schrieb Drew White:
> If they can get access, whether encrypted or not, it means it's insecure.
>
> Encryption just takes time to break.
>
> If you have encrypted files, encrypted with a STRONG password THEN a 2048 bit
> cypher, THEN it will probably
On Fri, Sep 16, 2016 at 6:38 AM, wrote:
> > On Friday, 16 September 2016 06:53:25 UTC+10, kater...@sigaint.org
> wrote:
> >> > On Tuesday, September 13, 2016 at 12:48:50 PM UTC+2,
> >> kater...@sigaint.org
> >> > wrote:
> >> >> Hello
> >> >> I haven't understood yet how open an usb device in Qube
On Fri, Sep 16, 2016 at 11:41:30AM +, amadaus wrote:
> I have downloaded Qubes R3.2-rc3 iso and in the course of verifying
> signatures received the following output:
> [user@rubbish ~]$ gpg -v --verify
> '/home/user/Downloads/Qubes-R3.2-rc3-x86_64.iso.asc'
> '/home/user/Downloads/Qubes-R3.2-rc
I have downloaded Qubes R3.2-rc3 iso and in the course of verifying
signatures received the following output:
[user@rubbish ~]$ gpg -v --verify
'/home/user/Downloads/Qubes-R3.2-rc3-x86_64.iso.asc'
'/home/user/Downloads/Qubes-R3.2-rc3-x86_64.iso'
gpg: armor header: Version: GnuPG v2
gpg: Signature m
> On Friday, 16 September 2016 06:53:25 UTC+10, kater...@sigaint.org wrote:
>> > On Tuesday, September 13, 2016 at 12:48:50 PM UTC+2,
>> kater...@sigaint.org
>> > wrote:
>> >> Hello
>> >> I haven't understood yet how open an usb device in Qubes (or in VM
>> that
>> >> I
>> >> choose).
>> >> Can so
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Thu, Sep 15, 2016 at 09:41:37PM -0700, J. Eppler wrote:
> Is it a good idea to spend time on fedora 24? Fedora 25 should be released in
> November/December and will use Wayland per default. Would it not be better to
> skip Fedora 24 and focus on
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Thu, Sep 15, 2016 at 08:27:05PM -0700, Drew White wrote:
> Hi folks,
>
> I'm trying to access the VGPU output for a guest, and wondering where I would
> go to find out how to access it, or what file I had to read, or what data
> stream I had to
If they can get access, whether encrypted or not, it means it's insecure.
Encryption just takes time to break.
If you have encrypted files, encrypted with a STRONG password THEN a 2048 bit
cypher, THEN it will probably take about 6 months to decypher it and get the
data out.
--
You received t
On Friday, 16 September 2016 16:37:47 UTC+10, mara.k...@gmail.com wrote:
> @Chris
>
> Thanks I will think about this block-level approach.
>
> @Drew
>
> I don't agree... Storing encrypted files on dropbox IS secure in the sense
> that nobody in the world will be able to decrypt them (as long a
IMHO the safest option is indeed to use a split-dm kind of approach, as
suggested before: create a loopback file in the dropbox VM, expose this
via qvm-block to your working VM where you then do all the encryption
(using standard LUKS) and can either mount the thing right there or -
for extra secur
PS: SSH alone is of course not very ideal, because this could mean I am running
rsync of the dropbox qube. Instead I could use SSHFS to mount the dropbox
qube's folder in encfs and then use the rsync of the encfs qube to sync the
files via SSHFS. This is like super indirect, but probably safer?!
> > Hi,
> >
> > I just installed Qubes OS and I feel its freakin awesome!
> >
> > I am trying to set it up the way I want and one thing on my list is having
> > a dropbox vm that provides simply just the cloud storage... I would like to
> > run the actual encryption on a different qube because I
Qubes was working flawlessly on my GTX 670, recently upgraded to a GTX 1070 and
now I can't even load the installer
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
31 matches
Mail list logo