[qubes-users] Re: HCL - Surface Pro 3 (i5-4300U 4Gb)

2019-09-16 Thread sbh2hume
Installed 4.0.1 to a surface pro 6.  Used rufus to load a 'dd' file instead of 
the default.  Set up a simple "black" partition using Windows "computer 
management" console.  Had upgraded os to win pro.  Had to deal with bitdefender 
before shutting off windows defaults in the UEFI.

The Qubes installation went straight in with a default install.  Wifi worked.  
Firefox worked.  Updates worked.  Does anyone know how to get the text to show 
in a larger font?  Also, if your wifi is cut off by your provider, you get to  
reboot.

This the most straightforward install I have ever done with Linux in 25 years.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/07fb36a6-51c9-4ecb-9bf9-f82addab3994%40googlegroups.com.


[qubes-users] "Root File out of memory warning"?

2019-09-16 Thread V C
Sorry for the noob question but I am getting a pop-up warning that my "Root 
File is almost out of memory"? Its kinda scary...

The error pops up more regularly now...is there any maintenance I can do? I 
have had this set up for over a year, working well...not sure the reason, 
possibly:

The way I am deleting old templates (I recently upgraded whonix and made a 
few clones, deleted a few, etc)
I haven't added to many files or photos but I have added. I am not sure of 
the exact language in the pop-up but it stated "Root", "Low-memory" and 
"File"

Any guidance would be appreciated...

Thanks,
VC

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3d614c33-1a3f-41c0-bbdf-f39d8c5041f4%40googlegroups.com.


Re: [qubes-users] Qubes compability with HP Elitebook 820 G2 i5

2019-09-16 Thread Franz
On Mon, Sep 16, 2019 at 6:34 PM 'awokd' via qubes-users <
qubes-users@googlegroups.com> wrote:

> 'minttu.hopeasuo' via qubes-users:
> > Hej...
> >
> > Any chance to get Q4 to work with this hardware?
> > (HP Elitebook 820 G2 i5 / 16GB RAM / 512 GB SSD)
> >
> > I understood that it should meet the listed hardware requirements, but
> both 4.0.1 and 4.0.2-rc1 installer complains about missing VT-x / Immuo
> support.
>
> Did you see
>
> https://www.qubes-os.org/faq/#can-i-install-qubes-4x-on-a-system-without-vt-x-or-vt-d
> (especially about checking UEFI config.)?
>
> > Found some info in the forums that some hardware is identified wrong and
> some people have circumvented this via editing some parameters on the
> installer and recompiling it to get the installer working properly?
>
> That's sometimes needed with UEFI boots, but sounds like you're getting
> past that point already.
>
>
The CPU of some machine supports vt-d, but the default BIOS does not. You
may need to check if your BIOS requests to check a flag to allow
vitualization.
best

> --
> - don't top post
> Mailing list etiquette:
> - trim quoted reply to only relevant portions
> - when possible, copy and paste text instead of screenshots
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/df864db5-f23f-813a-232f-561f4e7f1249%40danwin1210.me
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCZmuA_EK12hWnQg%2BT2B3mRbrGW-jD2Ty9uLHOuTRZVVg%40mail.gmail.com.


Re: [qubes-users] System and Template updates over Tor

2019-09-16 Thread 'Jackie' via qubes-users

duc...@disroot.org:

'awokd' via qubes-users:

You might want to
https://www.whonix.org/wiki/Onionizing_Repositories while you are at it.



Thanks. I'll pull all the Whonix docs for reference, seems like a good idea.


Using onion repos also provides a good visual confirmation that updates 
really are going over tor (in addition to being more secure also), since 
it won't even be able to connect to the .onion repos if it's not using tor.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6ca97343-febc-313f-59c8-f99a13789af9%40danwin1210.me.


Re: [qubes-users] ProxyVM 'Radio Button'?

2019-09-16 Thread 'awokd' via qubes-users
duc...@disroot.org:

> Can someone confirm that choosing AppVM from the drop-down menu is the
> correct thing to do now? Are there any others steps I should take that
> aren't mentioned in the VPN doc?

See https://github.com/tasket/Qubes-vpn-support for an improved method.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9aac6341-1b32-ff6a-acc6-52b99a814706%40danwin1210.me.


Re: [qubes-users] Qubes compability with HP Elitebook 820 G2 i5

2019-09-16 Thread 'awokd' via qubes-users
'minttu.hopeasuo' via qubes-users:
> Hej...
> 
> Any chance to get Q4 to work with this hardware?
> (HP Elitebook 820 G2 i5 / 16GB RAM / 512 GB SSD)
> 
> I understood that it should meet the listed hardware requirements, but both 
> 4.0.1 and 4.0.2-rc1 installer complains about missing VT-x / Immuo support.

Did you see
https://www.qubes-os.org/faq/#can-i-install-qubes-4x-on-a-system-without-vt-x-or-vt-d
(especially about checking UEFI config.)?

> Found some info in the forums that some hardware is identified wrong and some 
> people have circumvented this via editing some parameters on the installer 
> and recompiling it to get the installer working properly?

That's sometimes needed with UEFI boots, but sounds like you're getting
past that point already.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/df864db5-f23f-813a-232f-561f4e7f1249%40danwin1210.me.


[qubes-users] ProxyVM 'Radio Button'?

2019-09-16 Thread duc01k
Hi.

R4.0.1

The official documentation for creating a VPN AppVM (/docs/vpn) makes
mention of a ProxyVM radio button:

> 1. Create a new VM, name it, click the _ProxyVM radio button_, and
choose a color and template.

I understand what a ProxyVM is, but there doesn't seem to be a way of
specifying a new VM as one. Is this just some legacy text for an old
version of Qubes?

Can someone confirm that choosing AppVM from the drop-down menu is the
correct thing to do now? Are there any others steps I should take that
aren't mentioned in the VPN doc?

Thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/53f1aaa6-e705-9ea6-501e-9e4042559097%40disroot.org.


Re: [qubes-users] HCL - Purism Librem 15 v3 w/ TPM module

2019-09-16 Thread Steve Coleman

On 2019-09-15 02:38, Jeff Warner wrote:
I am brand new to QubesOS and hope to be able to update this entry over 
time. I'm happy to start with this HCL report. The prospects look quite 
promising.


Welcome to Qubes! Let us know if you have any questions


--
You received this message because you are subscribed to the Google 
Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send 
an email to qubes-users+unsubscr...@googlegroups.com 
.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAK4unLo38xunz4DE0DSrZP9_zznjWT%2BSX1dBhvzqySYHV8sVZw%40mail.gmail.com 
.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0a309abb-85c7-a401-28ad-93f534086470%40jhuapl.edu.


Re: [qubes-users] System and Template updates over Tor

2019-09-16 Thread duc01k
'awokd' via qubes-users:
> duc...@disroot.org:
> 
>> Based on the settings I chose, should I have expected the
>> qubes-dom0-update commands to leverage a Tor connection?
> 
> Yes.
> 
>> Does it seem
>> likely that they did in this case?
> 
> No; agree it doesn't sound like it. Did you "sudo qubesctl state.sls
> qvm.updates-via-whonix" as part of upgrading the Whonix templates? Seems
> like it should have been unnecessary, though.
> 

The only CLI tool I used was qubes-dom0-update, once for each template.

>> In future, what steps can I take to
>> verify that performing similar updates will use Tor?
> 
> Check Qubes Global Settings to make sure Dom0's UpdateVM is set to
> sys-whonix. Also, double-check /etc/qubes-rpc/policy/qubes.UpdatesProxy
> and make sure the first line says "$type:TemplateVM $default
> allow,target=sys-whonix". 

I'll check this and post back.

> You might want to
> https://www.whonix.org/wiki/Onionizing_Repositories while you are at it.
> 

Thanks. I'll pull all the Whonix docs for reference, seems like a good idea.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b27e251d-b8e8-527a-48f5-fc15623825bd%40disroot.org.


Re: [qubes-users] No network

2019-09-16 Thread Steve Coleman

On 2019-09-15 12:45, kegd...@gmail.com wrote:


Networking is enabled by state file, and WiFi enabled by radio killswitch; 
enabled by state file.
It se es no network ando manually adding a WiFi does not connect.
Sys-net networkmanager[520] has a new ethernet device detected (vif2.0) but 
network icono says Ethernet: device not managed.



I didn't see where you mentioned what system/model you are using. I had 
a similar WiFi issue just this weekend with an old Lenovo. In my case 
there was a physical RF kill switch that prevented the WiFi interface 
from "being managed" properly by network manager.



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/381da61e-b680-e006-5045-5bbd34f36f66%40jhuapl.edu.


[qubes-users] Re: Fedora 29 HiDPI Resolution

2019-09-16 Thread ahimta


On Sunday, February 3, 2019 at 8:28:13 PM UTC+3, Daniil Travnikov wrote:
>
> Could anyone tell me how to put the Xft.dpi on Fedora 29 only once? 
> Because when I am creating AppVM it is always with another HiDPI option, 
> less then his own Template. I mean changes working only on Template, but 
> not in AppVM's.


I hope this is not too much off topic but I'm stuck on getting dom0/XFCE in 
Qubes R4.0.1 to support HiDPI.

I tried all the documented stuff I could find but they only affect the font 
while HiDPI should affect every pixel of the screen and not just fonts/text.

You can find a detailed explanation of what I tried exactly and more here 
https://github.com/QubesOS/qubes-issues/issues/1951#issuecomment-518917371

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/93f9028b-56c3-4b3f-82dd-e6c41777bc1a%40googlegroups.com.


Re: [qubes-users] Re: Unsure about network device attachment to VMs

2019-09-16 Thread Anil Eklavya
> Your system intermittently freezing sounds like it could be
> https://github.com/QubesOS/qubes-issues/issues/5272 too.

It does seem like it, but one difference is that this time I haven’t even 
updated dom0 yet. I have not connected to internet at all, as I was first 
trying to connect through ethernet.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/F8B6DD60-035A-48BC-BA65-25073AB0D3CE%40gmail.com.


[qubes-users] Qubes compability with HP Elitebook 820 G2 i5

2019-09-16 Thread 'minttu.hopeasuo' via qubes-users
Hej...

Any chance to get Q4 to work with this hardware?
(HP Elitebook 820 G2 i5 / 16GB RAM / 512 GB SSD)

I understood that it should meet the listed hardware requirements, but both 
4.0.1 and 4.0.2-rc1 installer complains about missing VT-x / Immuo support.

Found some info in the forums that some hardware is identified wrong and some 
people have circumvented this via editing some parameters on the installer and 
recompiling it to get the installer working properly?

   - M
___

Sent with [ProtonMail](https://protonmail.com) Secure Email.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/nESARAwDdGrIIwOJ9SBFR0L_gOafxy2ycvE5STnzoBX5AQSNEARAf1eX6aw6urSLKo341EQopQle3iTFax_AK-rWjja3ssjziYbLvgDSSjM%3D%40protonmail.com.


Re: [qubes-users] No network

2019-09-16 Thread 'awokd' via qubes-users
kegd...@gmail.com:
> It's just that sudo ifconfig -a seems yo show lo and vif2.0 but no WiFi 
> controller, except the Ethernet driver does not seem to be properly loaded 
> and wireless is not showing.
> 
Which network card(s) do you have? Did you search this mailing list on
their model #s? Vif2.0 is a Xen virtual network adapter. Check
sys-net/Qube Settings/Devices and make sure your network adapters are on
the right-hand side.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3e70a124-e9aa-68c3-41ae-7249d0d2f26e%40danwin1210.me.


Re: [qubes-users] System and Template updates over Tor

2019-09-16 Thread 'awokd' via qubes-users
duc...@disroot.org:

> Based on the settings I chose, should I have expected the
> qubes-dom0-update commands to leverage a Tor connection?

Yes.

> Does it seem
> likely that they did in this case?

No; agree it doesn't sound like it. Did you "sudo qubesctl state.sls
qvm.updates-via-whonix" as part of upgrading the Whonix templates? Seems
like it should have been unnecessary, though.

> In future, what steps can I take to
> verify that performing similar updates will use Tor?

Check Qubes Global Settings to make sure Dom0's UpdateVM is set to
sys-whonix. Also, double-check /etc/qubes-rpc/policy/qubes.UpdatesProxy
and make sure the first line says "$type:TemplateVM $default
allow,target=sys-whonix". You might want to
https://www.whonix.org/wiki/Onionizing_Repositories while you are at it.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/765acd8c-4c86-0be0-bf2d-214427e3d4e0%40danwin1210.me.


Re: [qubes-users] cpuid, bti and/or pv-l1tf xen parameters affect spontaneous rebooting issue

2019-09-16 Thread 'awokd' via qubes-users
eve:
> This is a follow-up to the "spontaneous rebooting" issue described here:
> 
> https://groups.google.com/d/msg/qubes-users/vDTVggCaAlE/Uv6WOTDvDwAJ
> 
> I have experienced no random reboots for over 60 days since disabling
> all meltdown\spectre\l1tf mitigations via xen commandline parameters
> (GRUB_CMDLINE_XEN_DEFAULT):
> 
> cpuid=no-ibrsb,no-ibpb,no-stibp
> bti=thunk=jmp,rsb_native=no,rsb_vmexit=no pv-l1tf=false
> 
> I am narrowing these down by process of elimination as we speak. See you
> in a year!
> 
Were you getting these reboots on the 4.14 kernel, or only newer?

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4a5e0792-2a3b-301d-88fe-a0d1e6a4189f%40danwin1210.me.


Re: [qubes-users] Re: Unsure about network device attachment to VMs

2019-09-16 Thread 'awokd' via qubes-users
'awokd' via qubes-users:

> Run qvm-pci again with Realtek attached. Copy & paste the corresponding
> line of output here, if you don't mind. Use the Qubes Clipboard widget
> (top right) to perform equivalent of ctrl-shift-c from dom0.

Your system intermittently freezing sounds like it could be
https://github.com/QubesOS/qubes-issues/issues/5272 too.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/425e53d3-550d-91ec-d330-ce631c901b64%40danwin1210.me.


Re: [qubes-users] report: kernel update still freeze problem UEFI

2019-09-16 Thread 'awokd' via qubes-users
evas...@firemail.cc:
> Previously have the same problem with 4.19 kernel: cpu freeze at some
> point, now the same issue with new 4.19 kernel. I'm already checked the
> group and found that other users reported the same behavior. But I think
> it will not be superfluous to report this again, because this kernel
> update break the system. I associate this with addition of Intel CPU bug
> fix to this kernel.
> 
> P.S. My system load with UEFI boot.
> 
Might help if you added details about your system hardware to
https://github.com/QubesOS/qubes-issues/issues/5272. See also
https://www.mail-archive.com/qubes-users@googlegroups.com/msg30435.html
for some ways to disable mitigations.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d32cae48-9800-a6a3-d8e6-bfbc3e7f0c23%40danwin1210.me.


[qubes-users] System and Template updates over Tor

2019-09-16 Thread duc01k
During the first-boot setup of R4.0.1, I chose to "Enable system and
template updates over the Tor anonymity network using Whonix". I left
all other settings at their defaults.

I rebooted, obtained an Internet connection and followed the prompts to
Configure Tor, which completed successfully.

Afterwards, I followed the advice on the Installation Guide page and
upgraded all the Debian and Whonix templateVMs using the supplied
commands in a Dom0 console.

During the download process, I noticed two things: first, the updates
were performed using sys-firewall as a template for an UpdateVM (as
described in the documentation); and the download speeds were much
quicker than I normally expect from a Tor connection (over 1.5Mbps).

This gave me some concern because sys-firewall is the last step before
sys-net, and from there to the Internet - where was the Whonix/Tor
stage? The download speeds also suggested I wasn't using Tor at all for
these updates.

Based on the settings I chose, should I have expected the
qubes-dom0-update commands to leverage a Tor connection? Does it seem
likely that they did in this case? In future, what steps can I take to
verify that performing similar updates will use Tor?


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d2e22242-eeaa-7ae5-e756-9d9a332e0bad%40disroot.org.


Re: [qubes-users] Re: Whonix Tor Browser Starter safest setting fails

2019-09-16 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512



'awokd' via qubes-users:
> 'b17b7bdb' via qubes-users:
>> On 9/13/19 9:31 AM, 'awokd' via qubes-users wrote:> 'b17b7bdb'
>> via qubes-users:
 Setting tb_security_slider_safest=true (either by selecting
 Yes in the Tor Browser Starter screen or by creating a line
 in /etc/torbrowser.d/50_user.conf) does not result in the
 expected behavior.
>>> 
 Actual Behavior: - Shield icon is fully colored - Security
 Level is set to Safest in about:preferences#privacy -
 JavaScript is ALLOWED on selected sites. To view these sites
 click on the NoScript Preferences button in the about:addons
 page and then select the Per-Site Permissions tab.
 
>>> When I do this in a fresh DispVM with the above setting, I see
>>> no sites listed on the Per-Site Permissons tab. Are you using a
>>> disposable VM?
>>> 
>> 
>> That's correct.  I observed the same behavior in the Whonix
>> DispVMs on two different machines, one of which is a fresh (and
>> updated) install of R4.0.1.  Notably, if I manually set the
>> security level to safer in about:preferences#privacy then the
>> per-site permissions disappear.
>> 
>> These permissions are clearly the default permissions included
>> with no-script add-on.  For example, a variety of google,
>> microsoft, yahoo, paypal, and netflix sites are default trusted,
>> among others.
>> 
> We might be miscommunicating. I'm saying when I set 
> /etc/torbrowser.d/50_user.conf with tb_security_slider_safest=true
> and start a new DispVM (on current-testing), I see zero sites
> listed. Did you add the setting in whonix-ws-15 template? I tried
> it in the DVM template first, but it didn't stick. I do see what
> you mean with about 30 sites listed when I start a DispVM (on a
> different client on current) without that setting. Is your Tor
> Browser 8.5? Odd that you're experiencing different behavior. Might
> want to mention on qubes-whonix forum too.
> 


Hi, I have the same issue. But I am now communicating with a guy in
the Whonix forum and if he starts his Whonix-15 dvm TB, he has no
whitelisted sites in the Per-site Permission on Safest. This issue
seems to be selective. We both have the 8.5.5 Firefox 60.9.0esr and I
didn't do any mods in whonix-15 templates. He doesn't have any
whitelisted sites on Safest and I do ^^

Can others please check the issue too and add their situation?
Thank you!

-BEGIN PGP SIGNATURE-
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=tck6
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7b312990-b661-5fb6-227d-ce842839b9b7%40cock.li.


0xC1F4E83AF470A4ED.asc
Description: application/pgp-keys