[qubes-users] "Qubes virtual mini-summit 2021!" by Marek Marczykowski-Górecki

2021-07-29 Thread Andrew David Wong

Dear Qubes Community,

Marek Marczykowski-Górecki has published the following announcement:

"Qubes virtual mini-summit 2021!"
https://www.qubes-os.org/news/2021/07/30/minisummit-agenda/

For plain text email recipients, the original Markdown source of this 
announcement is reproduced below.


-

We are pleased to announce the third annual Qubes mini-summit co-hosted by
[3mdeb](https://3mdeb.com/) and the Qubes OS Project. (For prior year
summaries, agendas, and slides, see
[2019](https://3mdeb.com/events/#Qubes-OS-and-3mdeb-minisummit) and
[2020](https://3mdeb.com/events/#Qubes-OS-and-3mdeb-minisummit2020).) This
year's event will take place across two virtual sessions on August 3 and 10.
Each day, there will be four talks, intermixed with Q time. An 
abstract for
each talk is provided below.  The discussion section will be a live 
meeting on

Jitsi, with details to follow.  The whole event will be also streamed on
[3mdeb's YouTube
channel](https://www.youtube.com/channel/UC_djHbyjuJvhVjfT18nyqmQ), where we
will also accept questions. We invite everyone interested to join!

## Agenda for August 3

| Time (UTC) | Event description
| -- | -
| 18:00 -- 18:15 | Welcome and introduction by Piotr Król
| 18:15 -- 19:00 | "Qubes OS 4.1 highlights" by Marek Marczykowski-Górecki
| 19:00 -- 19:45 | "First Impressions Count: Onboarding Qubes Users 
Through an Integrated Tutorial" by deeplow

| 19:45 -- 20:15 | Break
| 20:15 -- 21:00 | "Wyng-backups: revertible local and remote known safe 
Qubes OS states (including dom0)" by Thierry Laurion

| 21:00 -- 21:45 | "SRTM and Secure Boot for VMs" by Piotr Król
| 21:45  | vPub, informal afterparty

## Agenda for August 10

| Time (UTC) | Event description
| -- | -
| 18:00 -- 18:15 | Welcome and introduction by Piotr Król
| 18:15 -- 19:00 | "Usability Within A Reasonably Secure, 
Multi-Environment System" by Nina Alter
| 19:00 -- 19:45 | "Qubes OS Native App Menu: UX Design and 
Implementation" by Marta Marczykowska-Górecka and Nina Alter

| 19:45 -- 20:15 | Break
| 20:15 -- 21:00 | "A brief history of USB camera support in Qubes OS" 
by Piotr Król
| 21:00 -- 21:45 | "How to setup BTC and XMR cold storage in Qubes OS" 
by Piotr Król

| 21:45  | vPub, informal afterparty

## Abstracts of the talks

### "Qubes OS 4.1 highlights" by Marek Marczykowski-Górecki

The upcoming Qubes OS 4.1 release is full of new exciting features, ranging
from a technology preview of the GUI domain to subtle, yet important, Qrexec
improvements. In this talk I will give a brief overview of them and demo a
select few.

### "First Impressions Count: Onboarding Qubes Users Through an 
Integrated Tutorial" by deeplow


We may all relate to having a rough time when starting using Qubes --- 
be that

because we're coming from Windows and everything is different or because we
come from Linux and many things don't work like we expect them to. Apart 
from
the usual challenges of going into a different system, Qubes has the 
additional
one of requiring a fundamentally different way of thinking about your 
computer

(a hypervisor mental-model). Smoothing out this transition is particularly
important as Qubes aims to target vulnerable populations that are less
technically inclined and have less time to explore and read the 
documentation.


The solution proposed by deeplow is to implement an integrated onboarding
tutorial. The idea is that a short tutorial (with optional extra parts) that
guides the user through the essential mechanics of Qubes will make the
transition simpler. That's what deeplow's been working on for his master's
dissertation. In this talk he'll introduce the idea and give an update 
on the

current progress and challenges.

### "Wyng-backups: revertible local and remote known safe Qubes OS 
states (including dom0)" by Thierry Laurion


[Wyng-backups](https://github.com/tasket/wyng-backup) is an incremental
backup/restore tool for LVMs. For Qubes OS, this means even dom0 can be
reverted to a known safe state; locally or remotely, applying changes only.
This talk will be a deep dive into the possibilities of wyng-backups for
deploying and maintaining up to date, revertible states of Qubes OS base
systems.

### "SRTM and Secure Boot for VMs" by Piotr Król

This talk is the continuation of the Qubes OS mini-summit presentation "SRTM
for Qubes OS VMs", where the theoretical background of the Static Root 
of Trust
was presented and discussed. In this presentation, we will practically 
approach

SRTM and Secure Boot for VMs. We will also explore potential use cases for
self-decrypting storage and signed kernels using safeboot. Finally, we will
discuss how to introduce this and other security mechanisms in Qubes OS.

### "Usability Within A Reasonably Secure, Multi-Environment System" by 
Nina Alter


Nina Alter first became aware of exciting 

[qubes-users] Re: How to join the new Qubes OS testing team (message from deeplow & unman)

2021-07-29 Thread Yethal
Does running automated tests on own hardware count as being part of testing 
team? I have some spare machines I can dedicate to that

środa, 21 lipca 2021 o 02:59:39 UTC+2 a...@qubes-os.org napisał(a):

> Dear Qubes Community,
>
> The message below is from deeplow and unman. Here's the link to the 
> original post on the Qubes Forum:
>
> https://forum.qubes-os.org/t/joining-the-testing-team/5190
>
> --
>
> # Joining the Testing Team
>
> ## What's the testing team?
>
> It's a group of users who help make Qubes better.
> They commit to testing updates and releases of Qubes OS, and are willing
> to provide test results, confirm issues, and identify particular edge 
> cases.
> This is key to detecting issues early on, and stop them affecting more 
> users.
>
> ## What's the risk?
>
> For those willing to enable the testing repositories for the [current 
> release](https://www.qubes-os.org/doc/testing/#updates)
> the risk is minimal, because the packages will end up in current anyway.
>
> **If security and stability are crucial to you, you should use the 
> current stable release,
> not enable the testing repositories, and not join the testing team.**
>
> ## How to join the testing team?
>
> 1. Request to join the testing team
> * **Via forum** (preferred): request to join [here 
> ](https://forum.qubes-os.org/g/testing-team) (requires JavaScript and a 
> forum account)
> * **Via email:** send an email to `register-testing-team at 
> forum.qubes-os.org` saying you'd like to join (does not require 
> JavaScript or a forum account)
>
> 2. Follow the instructions for the kind of testing you want to help with 
> (testing updates / releases)
>
> >Testing Type|Instructions|Description|
> > --- | --- | --- |
> >Testing Updates|[see 
> here](https://www.qubes-os.org/doc/testing/#updates)|Enabling the 
> testing repositories (e.g. 4.0 testing)|
> >Testing Releases|[part 1 
> ](https://www.qubes-os.org/doc/testing/#releases) & [part 
> 2](https://www.qubes-os.org/doc/testing/#updates)|Running the upcoming 
> Qubes version (e.g. 4.1) and enabling the testing repositories.|
>
> 3. Report issues in the appropriate category:
> * **If testing updates**, post in the '4.0 Testing' category, or 
> email `testing-updates at forum.qubes-os.org` .
> * **if testing releases**, post in the '4.1 Testing' category, or 
> email `testing-releases at forum.qubes-os.org` .
>
> You can leave the group at any time by following steps similar to the 
> ones in `1`.
>
> Packages move through the testing process quite quickly. Ideally you
> would be able to update at least once a week.
>
> When 4.1 moves toward release, we will see if we can test some of the
> open issues in 4.0, and confirm they have been closed.
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3b59ea69-7599-487b-aa6a-d5da8a8a94b7n%40googlegroups.com.