On 5/12/19 11:51 PM, google-urqzgfyzkpiwjxpxxpr...@public.gmane.org wrote:
related:
https://www.mail-archive.com/qubes-users-/jypxa39uh5tlh3mboc...@public.gmane.org/msg27890.html
system may appear stable for over a month then flat-out reboot or may
reboot within days. quite unpredictable.
tr
On Wed, May 15, 2019 at 11:44:40PM -0700, Eccentric Butterfly wrote:
> Services include for example: clocksync, cups, qubes-firewall.
>
> I would in particular like to know what meminfo-writer does as
> https://qubes-os.org/doc/disposablevm-customization/ tells you to disable the
> service on an
On Thu, 16 May 2019, g80vmgm...@riseup.net wrote:
> From XSA297:
> """
> Work is ongoing on xen-devel to develop core-aware scheduling, which
> will mitigate the cross-domain leak by ensuring that vcpus from
> different domains are never concurrently scheduled on sibling threads.
> However, this a
Eccentric Butterfly:
I'm curious if and how someone could hack into your appVMs if there is a
firewall VM in the way. How would they detect that there is a VM on your PC
that is accessing the network connection provided by that VM? Would it just
appear to them that all the network traffic is c
Eccentric Butterfly:
Services include for example: clocksync, cups, qubes-firewall.
I would in particular like to know what meminfo-writer does as
https://qubes-os.org/doc/disposablevm-customization/ tells you to disable the
service on any new sys-net VM that you create. This is confusing beca
Hello is there any way to see the date an AppVM/s were created ? This
would be convenient.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+uns
Ilpo Järvinen:
> On Thu, 16 May 2019, g80vmgm...@riseup.net wrote:
>
>> From XSA297:
>> """
>> Work is ongoing on xen-devel to develop core-aware scheduling, which
>> will mitigate the cross-domain leak by ensuring that vcpus from
>> different domains are never concurrently scheduled on sibling th
On 2019-05-15 12:48, unman wrote:
x230 i7 16GB on docking station.
x230 i7 16GB - coreboot
x230 i7 12GB
alright, i'll report back once i've done some testing. thank you unman!
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from
On 2019-05-14 11:33, goo...@subvertising.org wrote:
calling unman et al. : what systems are sporting 60+
days uptime?
according to unman, the i7 X230 does not reboot spontaneously.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe
Marek Marczykowski-Górecki:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> Dear Qubes Community,
>
> We have just published Qubes Security Bulletin (QSB) #49: Microarchitectural
> Data Sampling speculative side channel (XSA-297).
> The text of this QSB is reproduced below.
> This QSB and
For the newest security updates mention in
https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-049-2019.txt how
can I install the security updates from security-testing repo but from source
code? I prefer to compile or install everything from source code. I do not
trust pre-baked bin
On Tue, May 7, 2019 at 12:51 PM wrote:
> Hello everyone!
>
> I would like to know if it's possible to use Bluetooth devices (mouse,
> keyboard...) on Qubes OS?
>
> I use Qubes 4.0 on a SanDisk Extreme Pro 256gb USB 3.1 key.
>
>
There is no way to get any form of security with bluetooth. So it is
I'm getting a hash sum error when updating my whonix-gw-14 template
today. No error occurred when updating whonix-ws-14.
See below for the apt-get output...
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106
On 5/15/19 6:24 PM, Marek Marczykowski-Górecki wrote:
Only Intel processors are affected.
I think the pattern showing AMD to be more conscientious in their
processor designs is now undeniable. Even if its only a matter of
degree, the difference appears to be rather substantial.
You should con
I already have all the patches installed including the ones fixing MDS. And all
CVEs are reported to be NOT VULNERABLE by this tool.
https://github.com/speed47/spectre-meltdown-checker
Also, same result by the one whonix provides.
But this poc still works, why?
https://github.com/crozone/Spectre
On Thursday, 16 May 2019 09:49:25 UTC+3, Eccentric Butterfly wrote:
> There seems to not be much information on this. Are there any steps you can
> or should take to harden your firewall vm? There are services in the qube
> settings called: qubes-firewall, qubes-network, qubes-update-check,
> q
16 matches
Mail list logo