[qubes-users] Re: XFCE Application menu

2016-10-02 Thread raahelps
On Sunday, October 2, 2016 at 10:57:36 PM UTC-4, raah...@gmail.com wrote:
> On Saturday, October 1, 2016 at 5:04:22 PM UTC-4, cubit wrote:
> > hello everyone.  just upgraded to 3.2 and liking it.   one question I 
> > have..
> > 
> > Is there any reason (other than trust) not to install MenuLibre 
> > (https://smdavis.us/projects/menulibre) to dom0 so I can organize the 
> > application menu to do things like group the templates?   Or perhaps I am 
> > missing some already installed way with out having to manually edit config 
> > files?
> 
> I find xfce a little confusing too.  In KDE I changed disposable vm browser 
> entry, and also added disposable app menu entries under diff vms, so they'd 
> retain  certain firewall settings.  But I can't figure out how to do this in 
> kde lol without some 3rd party tool as well...  I mean this is confusing > 
> https://askubuntu.com/questions/76042/how-can-i-add-items-to-xfce-root-menu

ah alt f3 is letting me edit the default disposable vm entry now,  but it still 
doesn't let you create a new one.  in kde to create a new disposable vm entry 
under a certain vm domain was a simple right click.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e8bf5371-fcc7-4278-836a-607217263eb3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can't get disposable VMs to work

2016-10-02 Thread raahelps
On Monday, October 3, 2016 at 12:05:43 AM UTC-4, Chris Mays wrote:
> On Sunday, October 2, 2016 at 10:53:06 PM UTC-5, Andrew David Wong wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA512
> > 
> > On 2016-10-02 20:45, Chris Mays wrote:
> > > I just installed Qubes OS for the first time today, and am having 
> > > troubles getting a disposable VM to run.  The system menu for Firefox and 
> > > XTerm just stall.  Is there something I am missing?
> > > 
> > > Regards
> > > 
> > 
> > Try running this command in dom0:
> > 
> >   $ qvm-create-default-dvm --default-template
> > 
> > If the final line of output is "DVM savefile created successfully," then it 
> > has completed successfully, and you should try starting a new DispVM again.
> > 
> > If it doesn't complete successfully, post the output here.
> > 
> > - -- 
> > Andrew David Wong (Axon)
> > Community Manager, Qubes OS
> > https://www.qubes-os.org
> > -BEGIN PGP SIGNATURE-
> > 
> > iQIcBAEBCgAGBQJX8dYUAAoJENtN07w5UDAwPy0P/iJjIMO2vtUvWp2h6/J0FRmN
> > 9AFFmtupc9vjEfw6XYeD52EryZANNKwNs1NIHKFUxr+NVY/n48egM7+uWtbwdWSz
> > y4EBUV5ajAfZOT/PbuwoW20lKf17fNFdqUELJ7GPjW9JrO33/Kx7NBkvlhzTCiln
> > Lk9ZqtXZXNtLZ8T2Afz1879HFotIBRCknzdSZF4BO7gO7ZckojfK/tEDdQLoB5BV
> > vyQu3X+9FBe2pdmNfmdvFytcn7k+16koZRX2tlLa0RdN8EdP523mVS3Q6mx39rh9
> > 7oTWQDR4IAxIMpLMf53ZF/Ow7DRzpWv8eETOC+SnwWB5Gfgu2d4Vj1NsyLFxu/n4
> > YjGpdlTGz+JGoZtC18uLsMkAiayTXUj06HFla33fY8Sz/zjyjtPl6FRaqnKFKiHF
> > XfZAFIANbUvTpMM+9B2Z6qaj/Q2LJ3naE87jlliEGFsoEiFRUI6VQti7Lg5/qNS8
> > BvJatz31NGfN6hKmp815z/K2AWIqBrLFqmASEZlwbhjGcCxyOhrJCnDt/Uxu2r+2
> > k5kJis8EVtQ8q+BhRHjWQjCV2ZgHiHpnGYRZcWrMQQkfoT35xnww/v8QkRC9dO8Z
> > Zt7/JRRkvZuJo6ZdQHw4aco84dTiXuAvKl/JQY6O6iili+JQql5i4jtNfT5JI9Jc
> > LysDD4aOYfQK3umMkEbP
> > =0BEc
> > -END PGP SIGNATURE-
> 
> That command ran successfully.
> 
> > DVM savefile created successfully.
> 
> The DispVM still fails to start.  When clicked from the XFCE menu, I see a 
> notification "Starting new DispVM..." and nothing happens after that.

go to qubes-manager and view menu and select show hide internal vms,   and 
delete all the dvm ones.  then try  qvm-create-default-dvm fedora-23

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0340488e-95a2-41bf-8ef3-cdef2c91bffa%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can't get disposable VMs to work

2016-10-02 Thread Chris Mays
On Sunday, October 2, 2016 at 10:53:06 PM UTC-5, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> On 2016-10-02 20:45, Chris Mays wrote:
> > I just installed Qubes OS for the first time today, and am having troubles 
> > getting a disposable VM to run.  The system menu for Firefox and XTerm just 
> > stall.  Is there something I am missing?
> > 
> > Regards
> > 
> 
> Try running this command in dom0:
> 
>   $ qvm-create-default-dvm --default-template
> 
> If the final line of output is "DVM savefile created successfully," then it 
> has completed successfully, and you should try starting a new DispVM again.
> 
> If it doesn't complete successfully, post the output here.
> 
> - -- 
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> -BEGIN PGP SIGNATURE-
> 
> iQIcBAEBCgAGBQJX8dYUAAoJENtN07w5UDAwPy0P/iJjIMO2vtUvWp2h6/J0FRmN
> 9AFFmtupc9vjEfw6XYeD52EryZANNKwNs1NIHKFUxr+NVY/n48egM7+uWtbwdWSz
> y4EBUV5ajAfZOT/PbuwoW20lKf17fNFdqUELJ7GPjW9JrO33/Kx7NBkvlhzTCiln
> Lk9ZqtXZXNtLZ8T2Afz1879HFotIBRCknzdSZF4BO7gO7ZckojfK/tEDdQLoB5BV
> vyQu3X+9FBe2pdmNfmdvFytcn7k+16koZRX2tlLa0RdN8EdP523mVS3Q6mx39rh9
> 7oTWQDR4IAxIMpLMf53ZF/Ow7DRzpWv8eETOC+SnwWB5Gfgu2d4Vj1NsyLFxu/n4
> YjGpdlTGz+JGoZtC18uLsMkAiayTXUj06HFla33fY8Sz/zjyjtPl6FRaqnKFKiHF
> XfZAFIANbUvTpMM+9B2Z6qaj/Q2LJ3naE87jlliEGFsoEiFRUI6VQti7Lg5/qNS8
> BvJatz31NGfN6hKmp815z/K2AWIqBrLFqmASEZlwbhjGcCxyOhrJCnDt/Uxu2r+2
> k5kJis8EVtQ8q+BhRHjWQjCV2ZgHiHpnGYRZcWrMQQkfoT35xnww/v8QkRC9dO8Z
> Zt7/JRRkvZuJo6ZdQHw4aco84dTiXuAvKl/JQY6O6iili+JQql5i4jtNfT5JI9Jc
> LysDD4aOYfQK3umMkEbP
> =0BEc
> -END PGP SIGNATURE-

That command ran successfully.

> DVM savefile created successfully.

The DispVM still fails to start.  When clicked from the XFCE menu, I see a 
notification "Starting new DispVM..." and nothing happens after that.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9a3a20a0-b9b0-4cdb-8122-a4759dc1889f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can't get disposable VMs to work

2016-10-02 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-10-02 20:45, Chris Mays wrote:
> I just installed Qubes OS for the first time today, and am having troubles 
> getting a disposable VM to run.  The system menu for Firefox and XTerm just 
> stall.  Is there something I am missing?
> 
> Regards
> 

Try running this command in dom0:

  $ qvm-create-default-dvm --default-template

If the final line of output is "DVM savefile created successfully," then it has 
completed successfully, and you should try starting a new DispVM again.

If it doesn't complete successfully, post the output here.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=0BEc
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fbeb2e80-3582-16f2-93d9-3a3397a0e6a4%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: XFCE Application menu

2016-10-02 Thread raahelps
On Saturday, October 1, 2016 at 5:04:22 PM UTC-4, cubit wrote:
> hello everyone.  just upgraded to 3.2 and liking it.   one question I 
> have..
> 
> Is there any reason (other than trust) not to install MenuLibre 
> (https://smdavis.us/projects/menulibre) to dom0 so I can organize the 
> application menu to do things like group the templates?   Or perhaps I am 
> missing some already installed way with out having to manually edit config 
> files?

I find xfce a little confusing too.  In KDE I changed disposable vm browser 
entry, and also added disposable app menu entries under diff vms, so they'd 
retain  certain firewall settings.  But I can't figure out how to do this in 
kde lol without some 3rd party tool as well...  I mean this is confusing > 
https://askubuntu.com/questions/76042/how-can-i-add-items-to-xfce-root-menu

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a5f2493f-b581-495d-9c97-3e98d7cc9b94%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Install templates (debian or whonix) from install iso in running qubes 3.2

2016-10-02 Thread raahelps
On Sunday, October 2, 2016 at 2:20:10 PM UTC-4, dede wrote:
> Hello,
> 
> i ask myself if its possible to install the debian or whonix template 
> after i install qubes 3.2 from usb stick without download templates "again"?

yes like this https://www.qubes-os.org/doc/templates/debian/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cc8e7e11-4030-4291-94c7-6f634cd9630c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Firewall outbount

2016-10-02 Thread raahelps
On Sunday, October 2, 2016 at 3:26:18 PM UTC-4, 
709245782094578209435780924357809432578 wrote:
> Hello,
> 
> I like to limit the VM network-traffic to some specific IP's. 
> 
> So I like to use the FW rules deny network access except ...
> 
> How I can see the blocked Outound traffic, so I can build up the firewall 
> rules for this?
> 
> Can I define also IP-ranges, so it will work more efficient to block ranges 
> in an easy way?
> 
> Kind Regards

doesn't it go to  dmesg or journalctl  I gave up trying to monitor every vm 
lol. your vms gonna grow.  I just stick to sys-net and firewall.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/df24b179-8c95-4fb2-b643-cd9a551b15c1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: I can't disable ipv6 on Debian Template

2016-10-02 Thread raahelps
On Sunday, October 2, 2016 at 10:37:45 PM UTC-4, raah...@gmail.com wrote:
> On Sunday, October 2, 2016 at 9:03:03 PM UTC-4, nishi...@gmail.com wrote:
> > Uh ok, this ipv6 listening on my template set me in full paranoid mode. I 
> > have found disappointing to see ipv6 wasn't disabled on Debian template, 
> > but yea sorry, I went completely mad & full retard mode about Qubes on the 
> > rest.
> > 
> > I thought I was betrayed. I have been betrayed a lot by relatives but that 
> > doesn't mean I'm supposed to react like a dumbass and think of conspiracy 
> > if I got one port listening... Sadly my imagination went crazy mode. I 
> > guess you can call it a defense mechanism, but nevertheless, I am sorry 
> > about that.
> > 
> > My boot problem is in fact related to "sudo dd if=/file.iso of=/dev/sdX" 
> > ends up burning a UDF partition that refuses to boot. I tried your advices 
> > except the ArchLinux one, but I guess I just have to keep trying. Also I 
> > read somewhere I need to enter "bs=512" to burn more little fragments than 
> > the original size to avoid boot problem with UDF. This might fix my issue, 
> > I will try tomorrow.
> > 
> > Fun part is that I want to go back to Windows only very briefly, to install 
> > my mouse drivers and fix its sensitivity being too fast, as Linux drivers 
> > are really painful to install for this model (I did it on Debian, it took 
> > me a lot of efforts to make it work).
> > 
> > Then I think I will probably join back in the future Qubes, as indeed it is 
> > a very innovative OS. It's just I am interested on trying BSD systems. I 
> > found a great guide to learn Korn shell scripting, watched all videos 
> > https://m.youtube.com/playlist?list=PLCAFDE9B81B30388E
> > It was very interesting and very well made, allows you to understand better 
> > how command line work and the logics behind programs !
> > 
> > In fact I just want to learn to use a different Unix-based system than 
> > Linux and try there what I have learnt on this great tutorial. It's easier 
> > when your mouse isn't on steroids ^^
> 
> fedora is the default man. but its easy to disable on debian and all the 
> other processes. I understand your assumption though, its common sense.

I personally use fedora as my default sys-net and firewall still for those 
reasons as well.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/08a7dee8-e118-493e-9e68-15f929897803%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: I can't disable ipv6 on Debian Template

2016-10-02 Thread raahelps
On Sunday, October 2, 2016 at 9:03:03 PM UTC-4, nishi...@gmail.com wrote:
> Uh ok, this ipv6 listening on my template set me in full paranoid mode. I 
> have found disappointing to see ipv6 wasn't disabled on Debian template, but 
> yea sorry, I went completely mad & full retard mode about Qubes on the rest.
> 
> I thought I was betrayed. I have been betrayed a lot by relatives but that 
> doesn't mean I'm supposed to react like a dumbass and think of conspiracy if 
> I got one port listening... Sadly my imagination went crazy mode. I guess you 
> can call it a defense mechanism, but nevertheless, I am sorry about that.
> 
> My boot problem is in fact related to "sudo dd if=/file.iso of=/dev/sdX" ends 
> up burning a UDF partition that refuses to boot. I tried your advices except 
> the ArchLinux one, but I guess I just have to keep trying. Also I read 
> somewhere I need to enter "bs=512" to burn more little fragments than the 
> original size to avoid boot problem with UDF. This might fix my issue, I will 
> try tomorrow.
> 
> Fun part is that I want to go back to Windows only very briefly, to install 
> my mouse drivers and fix its sensitivity being too fast, as Linux drivers are 
> really painful to install for this model (I did it on Debian, it took me a 
> lot of efforts to make it work).
> 
> Then I think I will probably join back in the future Qubes, as indeed it is a 
> very innovative OS. It's just I am interested on trying BSD systems. I found 
> a great guide to learn Korn shell scripting, watched all videos 
> https://m.youtube.com/playlist?list=PLCAFDE9B81B30388E
> It was very interesting and very well made, allows you to understand better 
> how command line work and the logics behind programs !
> 
> In fact I just want to learn to use a different Unix-based system than Linux 
> and try there what I have learnt on this great tutorial. It's easier when 
> your mouse isn't on steroids ^^

fedora is the default man. but its easy to disable on debian and all the other 
processes. I understand your assumption though, its common sense.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cdb1638c-e4cb-4d97-893c-8be0b1fa10ae%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes on a dedicated server

2016-10-02 Thread J. Eppler
On Friday, September 30, 2016 at 9:05:31 AM UTC-4, Patrick Schleizer wrote:
> Does anyone ever try this?
> 
> Did it work? Any experiences?

Qubes is a desktop operating system. If you want to use the Qubes technology on 
a server install Xen. 

If you want to have a graphical management interface for your Xen server than 
you can use:

- XenServer (Citrix)
- Xen Orchestra (web based)
- VirtManager

or what ever else you like. 

Xen is widely used in the server world. Amazon, Netflix, IBM softlayer etc. use 
Xen as part of their cloud infrastructure. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ef8721fb-430f-4688-90e7-9206867b1528%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: I can't disable ipv6 on Debian Template

2016-10-02 Thread Jeremy Rand
nishiwak...@gmail.com:
> Uh ok, this ipv6 listening on my template set me in full paranoid mode. I 
> have found disappointing to see ipv6 wasn't disabled on Debian template, but 
> yea sorry, I went completely mad & full retard mode about Qubes on the rest.
> 
> I thought I was betrayed. I have been betrayed a lot by relatives but that 
> doesn't mean I'm supposed to react like a dumbass and think of conspiracy if 
> I got one port listening... Sadly my imagination went crazy mode. I guess you 
> can call it a defense mechanism, but nevertheless, I am sorry about that.
> 
> My boot problem is in fact related to "sudo dd if=/file.iso of=/dev/sdX" ends 
> up burning a UDF partition that refuses to boot. I tried your advices except 
> the ArchLinux one, but I guess I just have to keep trying. Also I read 
> somewhere I need to enter "bs=512" to burn more little fragments than the 
> original size to avoid boot problem with UDF. This might fix my issue, I will 
> try tomorrow.
> 
> Fun part is that I want to go back to Windows only very briefly, to install 
> my mouse drivers and fix its sensitivity being too fast, as Linux drivers are 
> really painful to install for this model (I did it on Debian, it took me a 
> lot of efforts to make it work).
> 
> Then I think I will probably join back in the future Qubes, as indeed it is a 
> very innovative OS. It's just I am interested on trying BSD systems. I found 
> a great guide to learn Korn shell scripting, watched all videos 
> https://m.youtube.com/playlist?list=PLCAFDE9B81B30388E
> It was very interesting and very well made, allows you to understand better 
> how command line work and the logics behind programs !
> 
> In fact I just want to learn to use a different Unix-based system than Linux 
> and try there what I have learnt on this great tutorial. It's easier when 
> your mouse isn't on steroids ^^

Sincere apologies for making the inference about the agenda thing.

Cheers,
-Jeremy

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/01c8c10c-fac3-63dc-a349-727aaa0d78cf%40airmail.cc.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


Re: [qubes-users] Re: I can't disable ipv6 on Debian Template

2016-10-02 Thread nishiwaka46
Uh ok, this ipv6 listening on my template set me in full paranoid mode. I have 
found disappointing to see ipv6 wasn't disabled on Debian template, but yea 
sorry, I went completely mad & full retard mode about Qubes on the rest.

I thought I was betrayed. I have been betrayed a lot by relatives but that 
doesn't mean I'm supposed to react like a dumbass and think of conspiracy if I 
got one port listening... Sadly my imagination went crazy mode. I guess you can 
call it a defense mechanism, but nevertheless, I am sorry about that.

My boot problem is in fact related to "sudo dd if=/file.iso of=/dev/sdX" ends 
up burning a UDF partition that refuses to boot. I tried your advices except 
the ArchLinux one, but I guess I just have to keep trying. Also I read 
somewhere I need to enter "bs=512" to burn more little fragments than the 
original size to avoid boot problem with UDF. This might fix my issue, I will 
try tomorrow.

Fun part is that I want to go back to Windows only very briefly, to install my 
mouse drivers and fix its sensitivity being too fast, as Linux drivers are 
really painful to install for this model (I did it on Debian, it took me a lot 
of efforts to make it work).

Then I think I will probably join back in the future Qubes, as indeed it is a 
very innovative OS. It's just I am interested on trying BSD systems. I found a 
great guide to learn Korn shell scripting, watched all videos 
https://m.youtube.com/playlist?list=PLCAFDE9B81B30388E
It was very interesting and very well made, allows you to understand better how 
command line work and the logics behind programs !

In fact I just want to learn to use a different Unix-based system than Linux 
and try there what I have learnt on this great tutorial. It's easier when your 
mouse isn't on steroids ^^

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1045ea1b-c02f-41b5-b615-e2eb1fe9a0a5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Installing Chrome

2016-10-02 Thread Ted Brenner
Ah! The problem with my file was that it specified i386 which is no longer
supported. Once I change the base url to x86_64, it worked. Thanks for the
help everyone.

On Fri, Sep 30, 2016 at 11:34 PM,  wrote:

> https://www.google.com/chrome/browser/desktop/  chrome automatically
> has flash. I would run chrome in the untrusted vm.   chromium with apparmor
> on debian8 in the trusted one.
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/
> msgid/qubes-users/0a1428ac-0e90-467a-9ff5-1737fa3582c8%40googlegroups.com.
> For more options, visit https://groups.google.com/d/optout.
>



-- 
Sent from my Desktop

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CANKZutyi4V1sh4Jw__MAuT-X-RuETHARzUCBc9u2TpbF_Eqxig%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL - Dell System XPS L502X

2016-10-02 Thread Quentin Bourgeois
Hi, 

Please find attached the output of qubes-hcl-report. For now
everything is working (slowly).

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161002235529.GA32694%40totoro.intra.bourgeois.eu.
For more options, visit https://groups.google.com/d/optout.
---
layout:
  'hcl'
type:
  'portable'
hvm:
  'yes'
iommu:
  'no'
slat:
  'yes'
tpm:
  'unknown'
brand: |
  Dell Inc. 
model: |
  Dell System XPS L502X
bios: |
  A06
cpu: |
  Intel(R) Core(TM) i7-2630QM CPU @ 2.00GHz
cpu-short: |
  FIXME
chipset: |
  Intel Corporation 2nd Generation Core Processor Family DRAM Controller 
[8086:0104] (rev 09)
chipset-short: |
  FIXME
gpu: |
  Intel Corporation 2nd Generation Core Processor Family Integrated Graphics 
Controller [8086:0116] (rev 09) (prog-if 00 [VGA controller])
  NVIDIA Corporation GF108M [GeForce GT 525M] [10de:0df5] (rev a1) (prog-if 00 
[VGA controller])
gpu-short: |
  FIXME
network: |
  Intel Corporation Centrino Wireless-N 1030 [Rainbow Peak] (rev 34)
  Realtek Semiconductor Co., Ltd. RTL8111/8168/8411 PCI Express Gigabit 
Ethernet Controller (rev 06)
memory: |
  3990
scsi: |
  TOSHIBA MK3261GS Rev: 1D  
  DVD+-RW GT32NRev: A203

versions:

- works:
'FIXME:yes|no|partial'
  qubes: |
R3.2
  xen: |
4.6.1
  kernel: |
4.4.14-11
  remark: |
FIXME
  credit: |
FIXAUTHOR
  link: |
FIXLINK

---



signature.asc
Description: PGP signature


Re: [qubes-users] Firewall outbount

2016-10-02 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-10-02 12:26, 709245782094578209435780924357809432578 wrote:
> Hello,
> 
> I like to limit the VM network-traffic to some specific IP's. 
> 
> So I like to use the FW rules deny network access except ...
> 
> How I can see the blocked Outound traffic, so I can build up the firewall 
> rules for this?
> 

You may need to use some kind of tool (tcpdump?) to monitor this.

> Can I define also IP-ranges, so it will work more efficient to block ranges 
> in an easy way?
> 

Yes, you can specify IP ranges, CIDR blocks, etc.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=04+Z
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f730828c-7e02-e302-7e50-353cb2736de4%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] QR32 audio by default?

2016-10-02 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-10-02 09:50, 0982709527834095278094357 wrote:
> Hello,
> 
> will QR32 out of the box support the audio, like in youtube videos?
> 
> Kind Regards
> 

I'm not entirely sure what you're asking, but audio should work normally in 
Qubes R3.2 for things like YouTube videos, as it did in R3.1. Of course, it's 
not uncommon for people to run into hardware compatibility issues depending on 
their specific hardware. We can't guarantee that audio will work out-of-the-box 
on *your* machine.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=Mx9F
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a0740486-62f4-a813-2d6f-fe8ddf66e179%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] ORWL Tamper-Proof Qubes PC - Pro & Cons?

2016-10-02 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-10-02 04:16, 089273045270457824578204789504578 wrote:
> Hello,
> 
> ORWL 'Tamper-Proof' PC tries to give a new level of "physical protection" 
> with it security mesh around the PC. If this is broken the encryption key of 
> the disc get wiped. 
> 
> http://www.tomshardware.com/news/orwl-secure-microcontrollers-tampering-protection,32690.html
> 
> Would this be a good device to run a web-server under qubes in a normal 
> unprotected environment (instead inside a data center)?
> 
> What are the Pro and Cons due to a higher level of Cybersecurity?
> 
> Nice is the idea to get an extra level of physical protection with a mix 
> between authentication, encryption, wipeing, security chip and an active 
> mesh. But always you must be aware of any kind of backdoors, many things look 
> quite well in the first view, but others really work to harden the system 
> substancially.
> 
> So I hope all security engineering was well for the ORWL-Qubes PC (but please 
> insert 64 or 32 GB of RAM). 
> 
> Kind Regards
> 

Joanna recently wrote a post about ORWL:

http://blog.invisiblethings.org/2016/09/03/thoughts-about-orwl.html

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=AuLf
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/14ec6c00-5eb5-e150-594d-f6b4b1932d25%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Certain HTTP requests repeatedly hang

2016-10-02 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-10-02 00:55, Robin Green wrote:
> Some examples:
> 
> * Emacs fails to update packages and always hangs on the same package - at 
> least over the period of a few hours. A few weeks ago it was hanging midway 
> trying to download haskell-mode, most recently it was markdown-mode.
> 
> * The sbt launcher jar can't download sbt. This is a very easy to reproduce 
> case. It hangs straight away.
> 
> * An AJAX request on inthe.am always hangs. It's always the same URL.
> 
> I don't have this problem in a non-Qubes Linux machine on the same Wifi 
> network. I am guessing something like a checksum handling error - maybe a 
> certain checksum value is handled incorrectly and this is causing packets to 
> be incorrectly dropped somewhere inside my PC.
> 
> How would people suggest I track this issue down? My plan is to start with 
> wireshark inside the AppVM, then look at wireshark on the FirewallVM, then on 
> the NetVM, until I find where packets are being dropped or modified or 
> whatever the issue is.
> 

Could it have something to do with the firewall rules you're using in your 
AppVM(s)?

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=L7SL
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/47071ce7-4fa9-f3ff-5b9e-8c0653bfe9bc%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Issues with Qubes 3.2 interface

2016-10-02 Thread katerimmel
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-09-29 16:31, katerim...@sigaint.org wrote:
>> Hello
>> After upgrading to 3.2 I noticed some features that I don't like.
>>
>> 1)I want to select the VPNs that I saved in network manager but the
>> windows where there is the list go out of screen and I don't see them
>>
>
> What's your screen resolution?
>
>> 2)Message like (when VPN connect, when start a VM..) appear only one
>> time,
>> then disappear
>>
>
> Added as comment to tracking issue:
>
> https://github.com/QubesOS/qubes-issues/issues/2154#issuecomment-250707100
>
>> 3)Every time that start a VM shows up this message: Error starting VM
>> .: integer division or modulo by zero (the VM works the same)
>>
>
> Tracking:
>
> https://github.com/QubesOS/qubes-issues/issues/2348#issue-180266982
>
> - --
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> -BEGIN PGP SIGNATURE-
>
> iQIcBAEBCgAGBQJX7jjiAAoJENtN07w5UDAwjlAP/12JBe5X2Kjzy1O5q9w/FBA7
> 9ggogJl0voMg0p0Rqpp9cL53nXPvhLGFbGIA+pP3GRU9iDZzuZpnSwOOgJ+ZV8cV
> 9WKIPMkW6RPF1YSqt6Gzri/lvBOOMxU5iflY7Pa8fm+irnBZ3Eoa+3n75AG7gOtc
> 1A2hW/3HRnVdpK9kxLdbSw+7Y/2WG9Z6ZYKv0z1TGGCYNpD1BJUML4SVqRWR2hnY
> aVawnFYYnGUHn9FWtPdqzYKhIUp8dfHpxE6BbSOW/VuV7q6wAA3FdTBq+Tu3qz24
> HyKxvjr42ymJM0GQAlmXiPyxoujlNvBIfL1D4BAbXBPn7vv+uxcrOSAnMi1isW7o
> W38UgdOf1aS19XwfUJJKDcrJbQwbHjFgHN0JXGf+MAUPPFBLpOWLzqO+HUv2ZueG
> ptxrocgor3LSeiAAk9daPW4XQp3OMSlVJ9e5Mkd9MqEtIfV3eviuVVcA6NDLmsu1
> WvqcSs2mtZ7lpW6MQVBZYYm7gqVlLpGXrOBnX0YZKsZ+BTm3APJB6AdnKJlirz/E
> mLu9FnQKaIjTNY5d/7jkvYPKfJ/rWaTzIVx93Xgo7VqbLAn4fIgpIieY0E4t1ECy
> IK6HXDDooVJB+gT5rO4iqESjcLRxa6NenyZmyZSwmUVhrvJ58RUS4jCwVDz+T+iu
> UCJ9P5xREXhhvvrSwuyo
> =k7jW
> -END PGP SIGNATURE-
>
>
Now the time is over the arrow show hidden icon and the button to open
widget.

Tips?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ed259eb0e2fe664bde897a0dbcb6cfca.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 3.2 has been released!

2016-10-02 Thread yaqu
On Fri, 30 Sep 2016 14:06:14 -0300, Franz <169...@gmail.com> wrote:

> On Fri, Sep 30, 2016 at 1:56 PM,  wrote:
> > I just did a clean install from a usb.  restored my vms and custom
> > templates from my 3.1 backup everything working good.
> >
> 
> thanks, I was really wondering if it was possible to restore 3.1
> templates. Documentation only mentions applVMs

Upgrading templates is documented there:
https://www.qubes-os.org/doc/upgrade-to-r3.2/

BTW I was restoring my fedora templates from R3.0 to R3.2 and it worked
well. All I had to do was upgrade templates to 3.1, then upgrade to 3.2,
and then install missing packages:

$ sudo dnf install qubes-upgrade-vm
$ sudo dnf update
$ sudo dnf install qubes-upgrade-vm
$ sudo dnf update
$ sudo dnf install qubes-img-converter qubes-input-proxy-sender
qubes-mgmt-salt-vm-connector qubes-usb-proxy

Regards,

-- 
yaqu

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161002195955.DFEA2106F09%40mail2.openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] QR32 & Mulitasking?

2016-10-02 Thread 17093284710924378091432780943178
Hello,

my QR32 is running currently with 4% CPU and 34% RAM.

And suddenly I get an input gap of 10-20 seconds - only for tying this text.

This seems not dependent on the lack of hardware. 

Can I speed up this delay times?

But it seems if I click short on a dom0 window it wakes up for 3 seconds.

Kind Regards


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bed7f182-b9d1-4ce2-b5cf-42a5b7ff94ce%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Firewall outbount

2016-10-02 Thread 709245782094578209435780924357809432578
Hello,

I like to limit the VM network-traffic to some specific IP's. 

So I like to use the FW rules deny network access except ...

How I can see the blocked Outound traffic, so I can build up the firewall rules 
for this?

Can I define also IP-ranges, so it will work more efficient to block ranges in 
an easy way?

Kind Regards 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/15e35732-8a2d-4a74-8296-1559afa5891a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Install templates (debian or whonix) from install iso in running qubes 3.2

2016-10-02 Thread dede

Hello,

i ask myself if its possible to install the debian or whonix template 
after i install qubes 3.2 from usb stick without download templates "again"?



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/nsri3c%24vdf%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] QR32 audio by default?

2016-10-02 Thread 0982709527834095278094357
Hello,

will QR32 out of the box support the audio, like in youtube videos?

Kind Regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/09fbbdf3-20a3-4d8e-af86-17596ae975d1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] QR32 & Mulitasking?

2016-10-02 Thread Eva Star

On 10/02/2016 04:49 PM, 09132784091378409137842098 wrote:

Hello,

my CPU is running with 14% and my RAM is in usage by 21%.

And if I like to type something in the text-editor, the QSystem seems to sleep.

How I can check quite simple of the multitasking is running fine?

Is there something like Multi-Tasking-Check, Multi-Tasking-Diagnostics?

For me it seams strange, because the responsiveness of the brandnew QR32 is low 
on my system.

Kind Regards

Run the top on the dom0 terminal at background and try to do something. 
I guess you will see process that slow down the system.


--
Regards

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/692c5332-1f56-296d-e534-e9119d88db71%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Performance under Intel Skylake?

2016-10-02 Thread Fabian Wloch
I just installed Qubes 3.1 on the same hardware, and the performance was 
"how it should be". Then I made the in-place-upgrade to Qubes 3.2, which 
resulted in the same problems as I mentioned in the first mail.
So I guess its not the Kernel, but some kind of software that causes the 
problem.


Anyone knows what I could try?
It is quite ok to work with, but also quit annoying over time when 
everything is so laggy, so its not something reall problematic to me.



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/15785c44900.275d.db864a7b1d5e2becb017b42ae5cd9fc6%40posteo.de.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes Windows Tools

2016-10-02 Thread Drew White
On Friday, 30 September 2016 18:34:29 UTC+10, Dave Ewart  wrote:
> As I said previously, the version of Windows is not usually discussed
> (since it just depends on which updates have been installed) and you
> would have got a better answer the first time if you'd included - for
> example - "My version number is currently Version 6.1.7601 for my
> Windows 7 Guest" in your original question.  That better question would
> have got you a better answer.
 
That is true, but I find often providing more information just gets bad 
responses from people. sometimes I say one thing and provide the information 
and I get told that they have nothing to do with one another, and yet one is 
related to the other directly. yet I get told otherwise.

As far as version goes, my statement was about version, not edition. Thus when 
I was provided information about edition not version, I had to make them 
understand.



> Serious advice: whether you intend it or not, Drew, a large number of
> your posts come across to many people here as impolite, aggressive &
> demanding.  This is not generally the case with other posters.  The fact
> that many people feel the same about your posts should tell you
> something.

Often, in the past, when I have posted, I added in information saying not to 
take my posts the wrong way. And yet people still did.

Because I've had that problem in the past, but people just don't read, and thus 
they interpret my posts when there is no interpretation to be made. And so they 
misunderstand or take offense. My posts are most often explicitly to the point, 
no beating around the bush.


> For example, here's how your current question could have been asked in a
> better way.
> 
> 
> === THE RIGHT WAY ===
> 
> 
> > > > Does QWT require any specific version of Windows 7?
> > >
> > > That's covered here: https://www.qubes-os.org/doc/windows-tools-3/
> >
> > Ah, sorry, you misunderstand me: I meant version as in 'Windows 7
> > version 6.1.7601', not the Edition.  Are there any specific
> > requirements relating to that?
> >
> > ...
> 
> 
> Whereas your discussion went like this
> 
> 
> === THE WRONG WAY ===
> 
> 
> > > > Does QWT require any specific version of Windows 7?
> > >
> > > That's covered here: https://www.qubes-os.org/doc/windows-tools-3/
> >
> > Doesn't even BEGIN to answer the question.
> 
> 
> You see the difference?  Your follow-up reply was inappropriate.  It
> didn't actually explain what you wanted, it didn't help them to help
> you, and it led to this ridiculous thread.
> 
> Hope this helps, genuinely.


My reply made them use their brain to try to find the reason why, or else to 
ASK the reason why IF they couldn't figure it out. Yours just provided them 
information that made them not need to think or anything.

What I wanted was explained in the original question. there was no need for 
explanation of it because the question was "version" not "edition".

I see the fact that it may have been worded the wrong way, but I just get 
straight to the point, and say it as it is without beating around the bush, as 
I said earlier in the post.

My posts are not meant to be taken the wrong way. When there is nothing to be 
interpreted people interpret it and thus causing it to be offensive.

Or else they read it and don't think of it as informative (as per your example 
of my reply), and that they should just query, and not have everyone go off the 
deep end about it.

I had figured that by now everyone had already known about the things I 
normally put into my post to say not to misunderstand.

I will have to put that statement back in to avoid the harassment that I am 
getting again from people, since that is the reason once again.

thank you for bringing it to my attention, I will endeavor to be more careful 
in the future regarding the way I word the replies, and I will beat around the 
bush a little to be more polite rather than stating it as it is.

In this post the statement isn't here, because I have not gone to find it yet 
in pasts posts. thanks again for brining the actual issue to my attention so 
that I can improve myself and work on that.

Sincerely,
Drew.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/60562699-895f-48a1-a814-f3c67f315692%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] ORWL Tamper-Proof Qubes PC - Pro & Cons?

2016-10-02 Thread 089273045270457824578204789504578
Hello,

ORWL 'Tamper-Proof' PC tries to give a new level of "physical protection" with 
it security mesh around the PC. If this is broken the encryption key of the 
disc get wiped. 

http://www.tomshardware.com/news/orwl-secure-microcontrollers-tampering-protection,32690.html

Would this be a good device to run a web-server under qubes in a normal 
unprotected environment (instead inside a data center)?

What are the Pro and Cons due to a higher level of Cybersecurity?

Nice is the idea to get an extra level of physical protection with a mix 
between authentication, encryption, wipeing, security chip and an active mesh. 
But always you must be aware of any kind of backdoors, many things look quite 
well in the first view, but others really work to harden the system 
substancially.

So I hope all security engineering was well for the ORWL-Qubes PC (but please 
insert 64 or 32 GB of RAM). 

Kind Regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5cec3800-b567-4c6e-8558-892cc93f518f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.