Re: [qubes-users] Why is there no built-in nvidia driver support? aka GTX 980 issues

2016-09-16 Thread almightylaxz
> > Qubes was working flawlessly on my GTX 670, > > So why did you change anything if things were working? > > > Achim Qubes isn't my main OS and I wanted an upgrade -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this

Re: [qubes-users] Encfs + Dropbox: How to keep your cloud files secure?!

2016-09-16 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-09-15 14:45, mara.kuens...@gmail.com wrote: > Hi, > > I just installed Qubes OS and I feel its freakin awesome! > > I am trying to set it up the way I want and one thing on my list is having a > dropbox vm that provides simply just the

Re: [qubes-users] Fullscreen mode and/or single mouse pointer with Linux HVM?

2016-09-16 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-09-16 10:36, Otto Kratik wrote: > With a Windows 7 HVM, initially upon creation it is a fixed small > window size and shows two mouse pointers chasing each other within > that HVM window. By installing Qubes Windows Tools, both of these >

Re: [qubes-users] R3.2_rc3.iso Corrupt Download?

2016-09-16 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-09-16 04:41, amadaus wrote: > I have downloaded Qubes R3.2-rc3 iso and in the course of verifying > signatures received the following output: > [user@rubbish ~]$ gpg -v --verify > '/home/user/Downloads/Qubes-R3.2-rc3-x86_64.iso.asc' >

Re: [qubes-users] Bitcoin Qubes tutorial

2016-09-16 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-09-15 17:50, Franz wrote: > On Thu, Sep 15, 2016 at 5:26 AM, Andrew David Wong wrote: > > On 2016-09-14 19:11, Franz wrote: On Wed, Sep 14, 2016 at 8:54 PM, Marek Marczykowski-Górecki <

Re: [qubes-users] Spoof MAC address

2016-09-16 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-09-14 09:30, katerim...@sigaint.org wrote: > Hello > Little issue > After running: > cd /var/run/qubes-service/ > sudo touch macspoof-enp0s0 > sudo touch macspoof-wlp0s1 > > I see the files, but when I shutdown the VM and restart there

Re: [qubes-users] Why is there no built-in nvidia driver support? aka GTX 980 issues

2016-09-16 Thread Achim Patzner
> Am 16.09.2016 um 09:09 schrieb almightyl...@gmail.com: > > Qubes was working flawlessly on my GTX 670, So why did you change anything if things were working? Achim -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this

Re: Re: [qubes-users] how to get appVM colour for customizing bash prompt's colours

2016-09-16 Thread Robert
> On 09/16/2016 01:18 PM, Robert wrote: > > Hi! > > > > I wonder if there is a command-line way to get the name (or any > > other id) of appVM's colour, used for window borders and such, from > > within the same appVM (not dom0)? It could be useful for > > customizing bash prompt's colours. > >

Re: [qubes-users] how to get appVM colour for customizing bash prompt's colours

2016-09-16 Thread Nicklaus McClendon
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 09/16/2016 01:18 PM, Robert wrote: > Hi! > > I wonder if there is a command-line way to get the name (or any > other id) of appVM's colour, used for window borders and such, from > within the same appVM (not dom0)? It could be useful for >

Re: [qubes-users] Encfs + Dropbox: How to keep your cloud files secure?!

2016-09-16 Thread mara . kuenster
Am Freitag, 16. September 2016 20:11:48 UTC+2 schrieb Chris Laprise: > On 09/16/2016 09:58 AM, mara.kuens...@gmail.com wrote: > > Am Freitag, 16. September 2016 09:52:40 UTC+2 schrieb Drew White: > >> If they can get access, whether encrypted or not, it means it's insecure. > >> > >> Encryption

[qubes-users] how to get appVM colour for customizing bash prompt's colours

2016-09-16 Thread Robert
Hi! I wonder if there is a command-line way to get the name (or any other id) of appVM's colour, used for window borders and such, from within the same appVM (not dom0)? It could be useful for customizing bash prompt's colours. I guess, I'd not be surprised if the answer was no due to security

Re: [qubes-users] Encfs + Dropbox: How to keep your cloud files secure?!

2016-09-16 Thread Chris Laprise
On 09/16/2016 09:58 AM, mara.kuens...@gmail.com wrote: Am Freitag, 16. September 2016 09:52:40 UTC+2 schrieb Drew White: If they can get access, whether encrypted or not, it means it's insecure. Encryption just takes time to break. If you have encrypted files, encrypted with a STRONG password

Re: [qubes-users] Problems attampting to test/install on a Lenovo 11e Yoga - 3.2 rc3

2016-09-16 Thread Mike Schowalter
> > Looks like either the iso or the boot media is bad. > > Did you verify the iso with gpg? And is the DVD or USB stick big enough > (should be at least 7GB)? > > Chris Thanks for responding, Chris. I verified the ISO with gpg, cross-referencing the signatures from various reliable

Re: [qubes-users] Problems attampting to test/install on a Lenovo 11e Yoga - 3.2 rc3

2016-09-16 Thread Chris Laprise
On 09/16/2016 01:33 PM, Mike Schowalter wrote: I've had a heck of a time trying to get an installtion going on a little Lenovo 11e Yoga. I know it doesn't have vt-d, but I want to install it to at least get comfortable with Qubes. Release candidate 3 of 3.2 has actually been more promising

[qubes-users] Fullscreen mode and/or single mouse pointer with Linux HVM?

2016-09-16 Thread Otto Kratik
With a Windows 7 HVM, initially upon creation it is a fixed small window size and shows two mouse pointers chasing each other within that HVM window. By installing Qubes Windows Tools, both of these limitations are removed. One single mouse pointer and full screen resolution are achieved - as

[qubes-users] /dev/root does not exist trying to run installation on MacBookPro8,2 with both Qubes R3.1 and R3.2

2016-09-16 Thread Tobias Abenius
Dear all, When I'm trying to boot Qubes on my MacBookPro8,2 from ca 2011 using the steps 1. put qubes on USB-stick using dd if=Downloads/Qubes-R3.1-x86_64/Qubes-R3.1-x86_64.iso of=/dev/disk2 bs=100m 2. reboot 3. in the previously installed refind choose either xen.efi or the penguin if I

[qubes-users] HCL - MSI-MS-7917

2016-09-16 Thread 'TigerZA' via qubes-users
sit https://groups.google.com/d/msgid/qubes-users/awKE859ZionvG-EWWpKGSuCZf1-MdE1oakt9vNUc_jJ_Wlw-Cux0n-ULmBPua5lq10k44m6oJm0HYizTRmrvgwMQrsTe_-q3C5wFdyws-Vw%3D%40protonmail.com. For more options, visit https://groups.google.com/d/optout. Qubes-HCL-MSI-MS_7917-20160916-093919.yml Description: application/ya

Re: [qubes-users] Encfs + Dropbox: How to keep your cloud files secure?!

2016-09-16 Thread mara . kuenster
Am Freitag, 16. September 2016 09:27:26 UTC+2 schrieb Raphael Susewind: > IMHO the safest option is indeed to use a split-dm kind of approach, as > suggested before: create a loopback file in the dropbox VM, expose this > via qvm-block to your working VM where you then do all the encryption >

Re: [qubes-users] Encfs + Dropbox: How to keep your cloud files secure?!

2016-09-16 Thread mara . kuenster
Am Freitag, 16. September 2016 09:52:40 UTC+2 schrieb Drew White: > If they can get access, whether encrypted or not, it means it's insecure. > > Encryption just takes time to break. > > If you have encrypted files, encrypted with a STRONG password THEN a 2048 bit > cypher, THEN it will

Re: [qubes-users] Re: Usb device

2016-09-16 Thread Franz
On Fri, Sep 16, 2016 at 6:38 AM, wrote: > > On Friday, 16 September 2016 06:53:25 UTC+10, kater...@sigaint.org > wrote: > >> > On Tuesday, September 13, 2016 at 12:48:50 PM UTC+2, > >> kater...@sigaint.org > >> > wrote: > >> >> Hello > >> >> I haven't understood yet how

Re: [qubes-users] R3.2_rc3.iso Corrupt Download?

2016-09-16 Thread Konstantin Ryabitsev
On Fri, Sep 16, 2016 at 11:41:30AM +, amadaus wrote: > I have downloaded Qubes R3.2-rc3 iso and in the course of verifying > signatures received the following output: > [user@rubbish ~]$ gpg -v --verify > '/home/user/Downloads/Qubes-R3.2-rc3-x86_64.iso.asc' >

[qubes-users] R3.2_rc3.iso Corrupt Download?

2016-09-16 Thread amadaus
I have downloaded Qubes R3.2-rc3 iso and in the course of verifying signatures received the following output: [user@rubbish ~]$ gpg -v --verify '/home/user/Downloads/Qubes-R3.2-rc3-x86_64.iso.asc' '/home/user/Downloads/Qubes-R3.2-rc3-x86_64.iso' gpg: armor header: Version: GnuPG v2 gpg: Signature

[qubes-users] Re: Usb device

2016-09-16 Thread katerimmel
> On Friday, 16 September 2016 06:53:25 UTC+10, kater...@sigaint.org wrote: >> > On Tuesday, September 13, 2016 at 12:48:50 PM UTC+2, >> kater...@sigaint.org >> > wrote: >> >> Hello >> >> I haven't understood yet how open an usb device in Qubes (or in VM >> that >> >> I >> >> choose). >> >> Can

Re: Negative test result for fedora 24... Was: Re: Request for test: Re: [qubes-users] Fedora 24?

2016-09-16 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Sep 15, 2016 at 09:41:37PM -0700, J. Eppler wrote: > Is it a good idea to spend time on fedora 24? Fedora 25 should be released in > November/December and will use Wayland per default. Would it not be better to > skip Fedora 24 and focus

Re: [qubes-users] VGPU output access

2016-09-16 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Sep 15, 2016 at 08:27:05PM -0700, Drew White wrote: > Hi folks, > > I'm trying to access the VGPU output for a guest, and wondering where I would > go to find out how to access it, or what file I had to read, or what data > stream I had

Re: [qubes-users] Encfs + Dropbox: How to keep your cloud files secure?!

2016-09-16 Thread Drew White
If they can get access, whether encrypted or not, it means it's insecure. Encryption just takes time to break. If you have encrypted files, encrypted with a STRONG password THEN a 2048 bit cypher, THEN it will probably take about 6 months to decypher it and get the data out. -- You received

Re: [qubes-users] Encfs + Dropbox: How to keep your cloud files secure?!

2016-09-16 Thread Drew White
On Friday, 16 September 2016 16:37:47 UTC+10, mara.k...@gmail.com wrote: > @Chris > > Thanks I will think about this block-level approach. > > @Drew > > I don't agree... Storing encrypted files on dropbox IS secure in the sense > that nobody in the world will be able to decrypt them (as long

Re: [qubes-users] Encfs + Dropbox: How to keep your cloud files secure?!

2016-09-16 Thread Raphael Susewind
IMHO the safest option is indeed to use a split-dm kind of approach, as suggested before: create a loopback file in the dropbox VM, expose this via qvm-block to your working VM where you then do all the encryption (using standard LUKS) and can either mount the thing right there or - for extra

Re: [qubes-users] Encfs + Dropbox: How to keep your cloud files secure?!

2016-09-16 Thread mara . kuenster
PS: SSH alone is of course not very ideal, because this could mean I am running rsync of the dropbox qube. Instead I could use SSHFS to mount the dropbox qube's folder in encfs and then use the rsync of the encfs qube to sync the files via SSHFS. This is like super indirect, but probably

Re: [qubes-users] Encfs + Dropbox: How to keep your cloud files secure?!

2016-09-16 Thread mara . kuenster
> > Hi, > > > > I just installed Qubes OS and I feel its freakin awesome! > > > > I am trying to set it up the way I want and one thing on my list is having > > a dropbox vm that provides simply just the cloud storage... I would like to > > run the actual encryption on a different qube because

[qubes-users] Re: Why is there no built-in nvidia driver support? aka GTX 980 issues

2016-09-16 Thread almightylaxz
Qubes was working flawlessly on my GTX 670, recently upgraded to a GTX 1070 and now I can't even load the installer -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email

Re: [qubes-users] Encfs + Dropbox: How to keep your cloud files secure?!

2016-09-16 Thread mara . kuenster
@Chris Thanks I will think about this block-level approach. @Drew I don't agree... Storing encrypted files on dropbox IS secure in the sense that nobody in the world will be able to decrypt them (as long as the encryption step is not exposed to the dropbox process, which might be

[qubes-users] Re: Compiling Archlinux Template failed on make qubes-vm/vmm-xen-vm

2016-09-16 Thread necrokulto
Start recompiling it again by deleted all the folders. Now i get different error like Jovan (https://groups.google.com/forum/?nomobile=true#!msg/qubes-users/43cDUEWz8M4/wFO8F_rPAQAJ;context-place=forum/qubes-users) ==> Starting build()... + patch -s -F0 -E -p1 --no-backup-if-mismatch -i