Re: [qubes-users] Neither WiFi card nor USBs work

2019-09-27 Thread American Qubist 001
I wonder - if you install Qubes onto an external ssd will it recognize your 
wifi card and (other) usb's? Also, is this version-sensitive? 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a599f2ac-e401-457e-9f84-09ba96cffd20%40googlegroups.com.


[qubes-users] Re: Qubes 4,02 Fails on sudo apt-get update

2019-09-27 Thread American Qubist 001

Dithub thread

indicates to run "apt update" not "apt-get update". 

This allows user to select Suite change to stable and the update proceeds.

Thereafter, it is possible to install apps which previously would fail.

Note: Prior to the fix, some but not all apps installed.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c39022e6-6644-4af8-991a-ac5fadab4838%40googlegroups.com.


[qubes-users] Re: Qubes 4,02 Fails on sudo apt-get update

2019-09-26 Thread American Qubist 001


On Thursday, September 26, 2019 at 10:26:09 PM UTC-4, American Qubist 001 
wrote:
>
> Never had trouble in Qubes 4.0 is it possible to access the repositories 
> from this testing version? Here is the result of the command:
>
>
> user@debian-10-clone-1:~$ sudo apt-get update
> Hit:1 https://deb.qubes-os.org/r4.0/vm buster 
> InRelease
> Get:2 https://cdn-aws.deb.debian.org/debian buster InRelease [122 
> kB]  
> Get:3 https://cdn-aws.deb.debian.org/debian-security buster/updates 
> InRelease [39.1 kB]
> Reading package lists... Done  
> N: Repository 'https://cdn-aws.deb.debian.org/debian buster InRelease' 
> changed its 'Version' value from '' to '10.1'
> E: Repository 'https://cdn-aws.deb.debian.org/debian buster InRelease' 
> changed its 'Suite' value from 'testing' to 'stable'
> N: This must be accepted explicitly before updates for this repository can 
> be applied. See apt-secure(8) manpage for details.
> N: Repository 'https://cdn-aws.deb.debian.org/debian-security 
> buster/updates InRelease' changed its 'Version' value from '' to '10'
> E: Repository 'https://cdn-aws.deb.debian.org/debian-security 
> buster/updates InRelease' changed its 'Suite' value from 'testing' to 
> 'stable'
> N: This must be accepted explicitly before updates for this repository can 
> be applied. See apt-secure(8) manpage for details.
> user@debian-10-clone-1:~$ 
>

NOTE: THIS IS IN A TEMPLATE VM!!! 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/38f75d7c-c355-481e-9bed-9791fd7c5e82%40googlegroups.com.


[qubes-users] Qubes 4,02 Fails on sudo apt-get update

2019-09-26 Thread American Qubist 001
Never had trouble in Qubes 4.0 is it possible to access the repositories 
from this testing version? Here is the result of the command:


user@debian-10-clone-1:~$ sudo apt-get update
Hit:1 https://deb.qubes-os.org/r4.0/vm buster 
InRelease
Get:2 https://cdn-aws.deb.debian.org/debian buster InRelease [122 kB]  
Get:3 https://cdn-aws.deb.debian.org/debian-security buster/updates 
InRelease [39.1 kB]
Reading package lists... Done  
N: Repository 'https://cdn-aws.deb.debian.org/debian buster InRelease' 
changed its 'Version' value from '' to '10.1'
E: Repository 'https://cdn-aws.deb.debian.org/debian buster InRelease' 
changed its 'Suite' value from 'testing' to 'stable'
N: This must be accepted explicitly before updates for this repository can 
be applied. See apt-secure(8) manpage for details.
N: Repository 'https://cdn-aws.deb.debian.org/debian-security 
buster/updates InRelease' changed its 'Version' value from '' to '10'
E: Repository 'https://cdn-aws.deb.debian.org/debian-security 
buster/updates InRelease' changed its 'Suite' value from 'testing' to 
'stable'
N: This must be accepted explicitly before updates for this repository can 
be applied. See apt-secure(8) manpage for details.
user@debian-10-clone-1:~$ 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/66f7ba71-f9f5-4b51-b41b-bd7e501d4868%40googlegroups.com.


[qubes-users] Re: Which qube is most secure for internet use?

2019-08-22 Thread American Qubist 001


On Friday, August 16, 2019 at 7:52:44 AM UTC-7, O K wrote:
>
> Which qube is most secure when it comes to keeping any identifying info 
> about my computer invisible from anyone on the internet (or if not 
> completely, which qube does this the best)?  Thanks.se 
>

Use a completely different computer if at all possible segregating anything 
that your snoop agencies/torturers/totalitarians/cyberstalkers/thieves or 
other malicious actor should not access. Download to a usb or temporarily 
unlocked encrypted partition imho preferable an external hardrive 
preferable, immediately lock or disconnect. Download via VPN. Maybe TOR but 
in some places you will be arrested or watchlisted if using TOR.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f553578b-e3af-4e99-9538-b71a99ff1f21%40googlegroups.com.


[qubes-users] Wifi connection fails from AppVM am I supposed to connect via ysy-net?

2019-08-22 Thread American Qubist 001
Never had this issue on open wifi but with my new wifi router Ubuntu 
laptops and  Android tablet connect, Qubes does not. I get the passsword 
text box type in password and on Qubes only, no wifi connection. Does not 
make sense to me. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e59f2a2b-9448-4362-8e7d-c7db967f4eef%40googlegroups.com.


[qubes-users] Re: On new installs, is exotic procedure still needed to cure debian apt bug or can we simply update/apt-upgrade from deb template?

2019-08-20 Thread American Qubist 001


On Sunday, August 18, 2019 at 10:39:38 AM UTC-7, American Qubist 001 wrote:
>
> I need to re-install Qubes and last time I installed, maybe around Feb 
> 2019, there was an advisory about an apt-bug which required a fix. Is that 
> now taken care of automatically in the deb-9 template or is that procedure 
> still required?
> 
> This email is confidential to the recipient named in the original. If you 
> receive and are not the named recipient *please delete and notify sender* 
> thank you in advance for your adherence. 
>
> will make sure to use the lhe latest,  but I thought 4.02 was still in 
> beta. 
> Also, the instructions in the QSB are much more complex than simply 
> updating through the gui.Why do you think a regular update would work when 
> the QSB or Qubes documentation advises a much more complex, completely 
> different proceure? 
>
> Somethhing is not right here. It is inconsisitent. If all you needto do is 
> a regulsr simple update, the documentation should reflect thatand not send 
> users through a much more elaboraate templace replacement process.
>

ALSO the QSB says that the bug is actually inthe update process of apt 
itself, so it stands to reason that if there has been a malicious code 
injection, merely updating will not suffice. 

So, are we sure we are on the saame page here??

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bd8b5898-b6fa-4609-a701-b47580f9457b%40googlegroups.com.


[qubes-users] HDMI TV as monitor: no sound

2019-08-20 Thread American Qubist 001
I plug a big screen HDMI-TV on Debian and Fedora (non-Qubes) and get 
picture and sound but on Qubes, which I want now for all online purposes, I 
get picture but the sound is only through the laptop and the HDMI setup 
does not show in the the p3ulse-audio dropdowns. 

Any ideas?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/25d48fa1-729d-4ebe-947f-2ef88c6849ee%40googlegroups.com.


[qubes-users] How to avoid top-posting.

2019-08-19 Thread American Qubist 001
"Dont top-post on this list.

*If your mailer puts the cursor at the top of the message, scroll to the 
bottom before you start typing.*
It takes you seconds, but makes it easier for everyone else who reads
your messages."
=
SOURCE: Unman's signature. 
=
MY "TIP"
If you go to https://groups.google.com you might find it easier to reply 
either
to the group or to an individual, and avoid top-posting.
===
MY COMMENTS: 

A. IMHO this is more helpful than the bare admonition "don't top-post" as

(one) we want to make Qubes as user-friendly and accessible as possible,
(two) that would include this forum,  and 
(three) the default of gmail and other web-mail applications is to top-post.

B. ( I would guess that there may be is a clear and convincing reason to 
create
an exception and deliberate top post, for instance if one has created a 
thread
and wishes to top-post "SOLVED" to implicitly close the discussion. But this
is speculation on my part the ultimate decision revolves on what the 
community
and/or list owner desires.)

C. Admin or user comments welcome but not necessary, this thread can serve 
as a reference to 
new users, people who have been away from the list for a while and forgot 
this, 
or people who are understandbly a bit confused about how to not  top-post. 

D. It might be helpful if there was a way that regular users (non-admins) 
could delete their own posts
and repost if accidentally top posting but I don't know that there is any 
way to do that. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b685f3a6-27f5-44bb-85b4-984ffb6f739a%40googlegroups.com.


[qubes-users] Re: What is the SHA-256 checksum of the Qubes-R4.0.1-x86_64 ISO?

2019-08-18 Thread American Qubist 001

O K you have asked many different questions as you have proceeded, and I 
don't have a problem with that. At this point, you are asking the same 
question as this thread. I direct yo to the stack exchange link in that 
thread, which does ask other questons but they hinge on the answer to the 
quesstion of what gpg command will work to see the footprint of the 
xxx.pubkey file. 
https://groups.google.com/forum/#!topic/qubes-users/v9aaQ1SAG9I

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3df96577-7735-4544-bf7a-d6218798ebb1%40googlegroups.com.


[qubes-users] Re: What gpg cat command works on Qubes 4.x?

2019-08-18 Thread American Qubist 001


On Sunday, August 18, 2019 at 12:30:10 PM UTC-7, threeletteragency wrote:
>
> I created a t-multimedia template and  successfully installed spotify. 
> However, I was unable to find a working gpg command to "cat" the 
> spotify.pubkey. (The quebes webpage directs to a stackexchange discussion 
> which advises a variety of commands, none of which seemed to work on my 
> Qubes 4.x t-multimedia template.)
>

The Qubes instruction page https://www.qubes-os.org/doc/multimedia/  
indicates that the gpg command may be outdated  and directs to this stack 
exchange discusision thread 
https://unix.stackexchange.com/questions/391344/gnupg-command-to-show-key-info-from-file

Apparently, this thread is asking the same question as OK is now asking, 
except that OK is trying to verify the signature for his Qubes .pubkey.

Maybe someone should file an issue/reuest in Qubes 
documentationhttps://www.qubes-os.org/doc/reporting-bugs/

and get this cleared up, as the same question is popping up simultaneously 
from two unrealted users. There is a very specific etiquette regarding bug 
reports and docuemntation changes, which are two different things, but both 
require to read first, then write. (Like listen, then speak, something I 
often have to remind myself in life. )

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/21dda4bd-da9d-4340-8443-96fd77787523%40googlegroups.com.


Re: [qubes-users] Re: What is the SHA-256 checksum of the Qubes-R4.0.1-x86_64 ISO?

2019-08-18 Thread American Qubist 001


*On Sunday, August 18, 2019 at 1:20:30 PM UTC-7, O K wrote:*
>
> *Ok, I figured out the difference between sha and other process and I 
> guess it would be better to use the other process.  I found some good 
> instructions along with qubes instructions so I will try to implement 
> those.  Thanks.*
>
>
Reply: I perform both the sha256sum verification on all downloaded ISO's 
> and also, unless I am lazy or in a rush, verify the signatures with gpg. As 
> stated in another reply, this safeguards in case there is a fake sha256sum 
> which, conveniently, matches a fake ISO installed by a malicious actor. 
>

OK wrote:  Re: What is the SHA-256 checksum of the Qubes-R4.0.1-x86_64 ISO?
Yeah, I just want to know how to get the actual SHA-256 of the Qubes ISO. 
 I don't know how to use DIGESTS.  Is verifying the master file and sig 
file a different process than comparing the sha-256? 


Reply: They are different as per my above answer. However, afaik both not 
either.

Tip: If you have the DIGEST, finding it often being the hard part, you are 
home free. Just find the line that corresponds to the version of the ISO 
you have. The correct sha256sum is listed right there.

*OK wrote:   Sorry, I know it's a pain bc I don't know much, but a yes or 
no is fine, I just want to be sure* 

I been into Qubes about three years still consider myself a newbie. Tip: do 
as much reading and tweaking on one's own before posting.

*OK wrote: And what is top-posting?  Thanks*.

Top posting is when you write above rather than below what you are replying 
to. It is sometimes the default when you hit "Reply" on email, so afaik it 
is better to go to the google groups web page where you have more control.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a076f0a6-4ba9-4bbf-847d-8e0c3f439c8a%40googlegroups.com.


[qubes-users] Re: best and less expensive Lenovo think pad

2019-08-16 Thread American Qubist 001
I lose track of the difference between Ideapads and Thinkpads but I have 
installed Qubes successfully on 4GB RAM Lenovos that cost less than $300 
new, without issue. Nice to upgrade memory to 8 GB though. 

On Monday, August 12, 2019 at 12:26:15 AM UTC-7, 27casa...@gmail.com wrote:
>
> What is the best and less expensive Lenovo think pad for new Qube?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8db243b6-bcd3-401d-8706-e47e430b2b45%40googlegroups.com.


Re: [qubes-users] best and less expensive Lenovo think pad

2019-08-16 Thread American Qubist 001
Is it really so bad just to use the standard EFI with fastboot and secure 
boot disabled? I use that with a password but maybe coreboot is important 
too. No one has physical access afaik unless the landlord is letting 
Russian spies into my apartment. 

On Monday, August 12, 2019 at 3:51:35 AM UTC-7, awokd wrote:
>
> 27casa...@gmail.com : 
> > What is the best and less expensive Lenovo think pad for new Qube? 
> > 
> G505s if you're prepared to Coreboot it yourself. PrivacyBeast if not. 
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fdb6ab29-7daf-49a3-850f-74668ed16b2e%40googlegroups.com.