tual Qubes goals,
missing expertise, world moving away from HDDs, etc.) It should be
implemented somewhere upstream, if anywhere.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYydC5AAoJENtN07w5UDAw+D4QAIUQo
>
Thanks, JP. It would be great to have this functionality integrated
into Qubes by default. Tracking:
https://github.com/QubesOS/qubes-issues/issues/2706
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYycb
condary-storage/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYycQVAAoJENtN07w5UDAwevQP/1KXil48hsWWwjjejfmF/IIM
gaUdJ7V3ao51bahJnwNMtRXP38/pY8LFdvk8wozrlvYnb9WX2
but not every
user will have a need for them. For example, if you have a piece of
software that installs parts of itself in both the root fs and user dirs
(and you don't want to work around this with bind-dirs), and you need
the software in only one VM, then a StandaloneVM is probably a perfect
sol
it that way.
> So: Is there a debian-minimal available?
The existing Debian template is already pretty minimal, so no
debian-minimal template has been created.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYycKKAAoJENtN0
r. (I should say that I don't know what is in the Whonix
> repos but the Qubes ones contain relatively few packages.)
>
Downloading updates from Tor Onion Services helps here (but that part
is, admittedly, not a single-click affair).
- --
Andrew David Wong (Axon)
Community Manag
cksheep here. It doesn't
> sign a repo file, therefore an attacker can hold back individual
> packages withing what appears to the user as a stream of normal
> update cycles.
>
Downloading updates over Tor mitigates this risk (which is a
single-click affair from the Qubes installer)
nt to take my changes. wtf??
>
Qubes Manager doesn't allow you to decrease the size, since this could
irreparably destroy your data. If you want the AppVM to be smaller,
you'll have to re-create it.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
secure.
>
> How do you think about it?
>
You can (and probably should) have multiple TemplateVMs. You'll
probably want OpenOffice in more than one AppVM, even if you don't
want it in your banking VM. For this purpose, it would be more
suitable to have multiple TemplateVMs than multiple
rting dispVM message" just
> as another splash screen. That's just anecdotal evidence, I
> know,but it's my experience. Even the start up speed doesn't seem
> outrageous.
>
> Two things to get used to are NOT saving under a new name in the
> DisposableVM, and having to creat
a viable model and works
> right now.
>
I think we should be very careful with such comparisons to Bromium, lest
we start giving people the wrong idea. Bromium "micro VMs" are
definitely not the equivalent of Qubes DispVMs. (Perhaps the most
fundamental difference is that Bromium
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-03-13 22:09, Chris Laprise wrote:
> On 03/12/2017 06:09 PM, 7v5w7go9ub0o wrote:
>> On 03/12/2017 12:45 PM, Andrew David Wong wrote:
>>> On 2017-03-11 19:41, Unman wrote:
>>>> On Sat, Mar 11, 2017 at 08:47:05PM -
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-03-12 15:09, 7v5w7go9ub0o wrote:
> On 03/12/2017 12:45 PM, Andrew David Wong wrote:
>> On 2017-03-11 19:41, Unman wrote:
>>> On Sat, Mar 11, 2017 at 08:47:05PM -0500, Chris Laprise wrote:
>>>> On 03
only in my password manager, which is
in my vault, which is in... my backup."
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYx01iAAoJENtN07w5UDAwFDcP/1PZwboj8sONw5SXe9pe2Tzr
Ospv+/CJd3IJgaCtRZVFpE7+bX
AppVMs. Since the backup/restore instructions on the
>> qubes site (qvm-backup/qvm-backup-restore) is for AppVMs, how can
>> I backup netvms for the purpose of restoring if/when they are
>> compromised?
>
> A legitimate confusion. Perhaps our docs could be more clear.
>
up space on
the SSD:
https://www.qubes-os.org/doc/secondary-storage/
Then you can clone your desired VMs and allocate them on each drive as
you see fit.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYxV
> use, even with disposableVMs doing most of the heavy lifting. But
> that's a separate issue.
>
I'd be interested in hearing more about this (in a separate thread,
perhaps).
In particular, no one has, to my knowledge, attempted to rebut the
arguments I advanced against the "doing eve
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-03-11 15:15, Unman wrote:
> On Sat, Mar 11, 2017 at 01:34:19PM -0800, Andrew David Wong wrote:
>>
>> On 2017-03-11 09:31, Grzesiek Chodzicki wrote:
>>> How to add custom applications to DispVM appmenu:
>&g
;
>
> qubes-dispvm-firefox.desktop
> qubes-dispvm-xterm.desktop
> yourdesktopfilehere
>
>
> 10. Your custom menu entry should appear on the Applications list now
>
> Andrew - Frankly, this should be available within the GUI, should I add that
> to Documentation and
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-03-09 08:31, Andrew David Wong wrote:
> On 2017-03-09 08:28, Grzesiek Chodzicki wrote:
>> W dniu czwartek, 9 marca 2017 17:19:31 UTC+1 użytkownik Andrew
>> David Wong napisał: On 2017-03-09 08:10, Grzesiek Chodzicki
>>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-03-09 08:28, Grzesiek Chodzicki wrote:
> W dniu czwartek, 9 marca 2017 17:19:31 UTC+1 użytkownik Andrew
> David Wong napisał: On 2017-03-09 08:10, Grzesiek Chodzicki wrote:
>>>> W dniu wtorek, 3 stycznia 2017 22:06:0
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-03-09 08:10, Grzesiek Chodzicki wrote:
> W dniu wtorek, 3 stycznia 2017 22:06:05 UTC+1 użytkownik Andrew David Wong
> napisał:
> On 2017-01-03 11:48, cubit wrote:
>>>> Has anyone else run into this. I was attempting to
very* right.
>
7v5w7go9ub0o is correct. Qubes 4.0 development is alive and well, but
nothing will be released before it's good and ready.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYwH5YAAo
> the time difference, may not even reply, which is why I like to use
> the mailbox and do not like to use IRC (in fact the most important
> thing is our school after 23.00 Stop network)
>
> If disturbed, but also forgive me I hope you can reply to m
in the qubes-secpack.git repo, and (2) via digital signatures
on the corresponding qubes-secpack.git repo tags. [2]
[2] Don't just trust the contents of this file blindly! Verify the
digital signatures!
```
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-03-06 06:40, Oleg Artemiev wrote:
> On Sun, Mar 5, 2017 at 1:29 PM, Andrew David Wong
> <a...@qubes-os.org> wrote:
>>>>>> from above only netcf-libs is required indirectly by xen
>>>>>> relat
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-03-06 14:22, Antoine wrote:
> On Sun, Mar 05, 2017 at 05:35:03PM -0800, Andrew David Wong wrote:
>> Filed a bug report:
>>
>> https://github.com/QubesOS/qubes-issues/issues/2674
>>
>> Antoine, you didn
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-03-05 17:56, Franz wrote:
> On Sun, Mar 5, 2017 at 10:39 PM, Andrew David Wong
> <a...@qubes-os.org> wrote:
>
>> On 2017-03-05 14:18, Franz wrote:
>>> On Sun, Mar 5, 2017 at 5:11 PM, <raahe...@gmail.c
ving USB devices plugged in during boot can be a risk, since
Qubes can't isolate USB controllers during early stages of the boot
process. IIRC, Joanna's recommendation is to unplug all USB devices
before (re)booting.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
NS server on my LAN.
>>
>> Do you have an idea why this DNAT rule is missing? (I am not sure to
>> understand why 2 different nameserver are filled in resolv.conf).
>>
>> Many thanks for your help,
>>
>> Antoine
>>
>> --
>
> No idea - report i
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-03-05 12:05, raahe...@gmail.com wrote:
> On Sunday, March 5, 2017 at 5:31:48 AM UTC-5, Andrew David Wong wrote:
> On 2017-03-03 15:41, raahe...@gmail.com wrote:
>>>> On Friday, March 3, 2017 at 6:38:24 PM UTC-5, raah...@gm
partition password.
> Although not perfect, this helps protects the kernel and early userspace
> from tampering and mitigates certain other offline attacks. Are there
> any plans to support something like this on Qubes OS in the future?
>
Yes:
https://github.com/QubesOS/qubes-issues/issues/2442
it?!
>>>
>>> thanks
>>
>> I removed it haven't noticed any problems. But I also wonder
>> what it is.
>
> Hopefully removing it did not lessen my security?
>
Relevant issue: https://github.com/QubesOS/qubes-issues/
ure
> request in github?
>
I waited a couple of days for this but didn't see anything submitted,
so I've created an issue for it:
https://github.com/QubesOS/qubes-issues/issues/2670
Didn't mean to steal your thunder, but I was afraid it would end up
falling through the cracks (as so many impo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-03-01 13:41, Grzegorz Chodzicki wrote:
>
>
> On 03/01/2017 10:19 PM, Andrew David Wong wrote:
>> On 2017-03-01 07:39, Grzesiek Chodzicki wrote:
>>> W dniu środa, 1 marca 2017 16:05:32 UTC+1 użytkownik Grzesie
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-03-01 07:39, Grzesiek Chodzicki wrote:
> W dniu środa, 1 marca 2017 16:05:32 UTC+1 użytkownik Grzesiek
> Chodzicki napisał:
>> W dniu środa, 1 marca 2017 04:45:27 UTC+1 użytkownik Andrew
>> David Wong napisał:
>
a cron job):
https://gist.github.com/andrewdavidwong/d0b109186de65835255d467ae103c289
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYtptVAAoJENtN07w5UDAwkLwP/3Wp9RLzcU44+GWgGtzEWzgP
S7PAPMQRhH
rror: Nothing to do.
> -
>
> I also tried the older method mentioned in the user docs as well.
>
> Any help would be great since I screwed whonix up VERY well.
>
Try uninstalling the tmeplate then installing it as separate actions.
qubes-dom0-update hides the availabili
this announcement on the Web at:
https://www.qubes-os.org/news/2017/03/01/qubes-os-3-1-eol-on-2017-03-29/
[Supported Versions]: https://www.qubes-os.org/doc/supported-versions/
[Version Scheme]: https://www.qubes-os.org/doc/version-scheme/
[downloads]: https://www.qubes-os.org/downloads/
- --
Andrew David
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-02-28 03:21, Grzesiek Chodzicki wrote:
> W dniu wtorek, 28 lutego 2017 06:50:47 UTC+1 użytkownik Andrew
> David Wong napisał: On 2017-02-27 10:29, Grzesiek Chodzicki wrote:
>>>> W dniu poniedziałek, 27 lutego 2
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-02-27 10:29, Grzesiek Chodzicki wrote:
> W dniu poniedziałek, 27 lutego 2017 19:19:07 UTC+1 użytkownik
> Andrew David Wong napisał: We’re pleased to announce that the Qubes
> OS Project has been accepted as a mentor organization f
. If you’re interested in
participating, please see our GSoC 2017 page for details!
https://www.qubes-os.org/gsoc/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYtG2GAAoJENtN07w5UDAwsvkP/2YTJ29u+cJRRtZXewopCUEm
work with such a commercial
> software in an AppVM, as I don't want to work in the TemplateVM?
>
Consider using a StandaloneVM:
https://www.qubes-os.org/doc/glossary/#standalonevm
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qube
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-02-23 04:56, Unman wrote:
> On Wed, Feb 22, 2017 at 08:55:23PM -0800, Andrew David Wong wrote:
>> On 2017-02-17 16:54, Unman wrote:
>>> On Sat, Feb 18, 2017 at 12:14:52AM +0100, u+q...@bestemt.no
>>> wrote:
>&
dy and Split GPG. This is
what I used to do, though I did run into compatibility issues, which
*might* now be solved. Using Split GPG would help to mitigate the
concern about exposing your PGP keys to the Whonix Workstation VM:
https://www.qubes-os.org/doc/split-gpg/
- --
Andrew David Wo
More recently, unman has shared a script that works around this issue:
https://groups.google.com/d/msg/qubes-users/2uN9ybLTqHQ/XMy6d5UkDwAJ
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcB
ktop files in this manner,
but I see no changes (no option to add additional menu entries or
launcher entries) even after regenerating the DVM Template. How is
this supposed to work?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE--
time.
>
Unman is correct. I'll just add that one way to "poke Tor," i.e., to
get a "new identity" by building a new circuit, is to open Arm (Tor
Controller) in sys-whonix and press "n".
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-02-20 10:02, hawk...@bitmessage.ch wrote:
> On Mon, 20 Feb 2017 02:05:41 -0800
> Andrew David Wong <a...@qubes-os.org> wrote:
>
> On 2017-02-17 13:06, hawk...@bitmessage.ch wrote:
>>>> As a generali
being a fc23
> version? (maybe the version was simply not updated)
> how can i install pycairo?
>
> - John
>
This is a known issue:
https://github.com/QubesOS/qubes-issues/issues/2606
As described in the comments, the workaround is to specify a version
num
> /var/log - 300Mb
> /var/log/
>
> BTW: Looks like LVM thin provisioning gives at least two times slower
> writes, so I'm about to use usual LVM.
>
>
Take a look at this, if you haven't already:
https://www.qubes-os.org/doc/custom-install/
- --
Andrew David Wong (Axon)
Comm
te on the XFCE panel. I would like to get this displaying
>> the netVM's traffic rate, next to the red netvm in Dom0's panel.
>> However, typically it doesn't run in the "notification area", and I'm
>> not sure how to get it displayed in Dom0 (as the netvm icon is).
>>
&
a minimal
> vms? - john
>
This is a known issue with no known workaround:
https://github.com/QubesOS/qubes-issues/issues/2536
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYqr6cAAoJENtN07w5UDAwtI8P/2baaYODx
e resources and hassle. Here's an example:
https://gist.github.com/andrewdavidwong/d0b109186de65835255d467ae103c289
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYpmTdAAoJENtN07w5UDAwIhkP/R81vgO979DTCObP
gt; Thx
>
You have to install it in the TemplateVM (or, for more advanced users,
pick a persistent dir and/or use bind-dirs):
https://www.qubes-os.org/doc/templates/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYoWLcA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-02-12 11:54, qu...@posteo.de wrote:
> Hi Andrew,
>
> thx for adding it to the documentation. On 12.02.2017 03:22, Andrew
> David Wong wrote:
>
>> Thanks. Added:
>>
>> https://gi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-02-11 21:46, elsiebuck...@gmail.com wrote:
> On Saturday, February 11, 2017 at 9:08:56 PM UTC-5, Andrew David
> Wong wrote:
>>
>> You should try to the method I described here:
>>
>> https://groups.
Thx in advance
>
> I have finally figured out the missing package. It is "perl-Encode".
> With this the dvm creation process runs through. Can somebody add this
> to the "Customize disposable vm Wiki"?
>
> Regards
>
Thanks. Added:
https://github.com/Qubes
ocker and lxc, are possible, as
> is emulation like running qemu without kvm extensions or virtualbox
> with 32bit guests with acceleration turned off.
>
> you could make your own qubes build with it on. look for marmarek
> in qubes-devel for threads on that.
>
- --
led out on it. we need better
> competition in security conscious hardware.
>
>> Shouldn't these CPUs and motherboards be specially noted as
>> dangerous in qubes HCL?
>
> agreed, but i think its up to Andrew David Wong
>
> (i hope that triggers a mention notice
list
> to let other puzzled flatpak-distributed-software-users know.
>
Thanks, Alex! :)
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYnrgwAAoJENtN07w5UDAwfV0QAJ1SQy/xvFRw5NoBsRRJLCKd
E6
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-02-10 15:32, Oleg Artemiev wrote:
> On Tue, Feb 7, 2017 at 1:41 PM, Andrew David Wong
> <a...@qubes-os.org> wrote:
>> -BEGIN PGP SIGNED MESSAGE- Hash: SHA512
>>
>> [Please keep the list CCed.]
>>
uld also work in the same
way using qvm-block, but the let's try to eliminate some variables.)
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYnRpuAAoJENtN07w5UDAwZe8P/A0UlSRG9cZl+dQ3K3Km0Icy
dF0fUgxqVTK9P0
e. If it IS then they will fail some of the time
> - that seems to be inevitable using Tor.
>
> If you really do want to revert then you dont need to worry about this.
> Just revert the changes you made in the .repo files and things should
> work again.
>
Thank you, un
or any help.
>
> Thanks!
>
Is chromium the only program with which you experience this problem?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYm5DQAAoJENtN07w5UDAw
in detail, (1)
what you expect to happen, (2) the exact steps you're performing in an
attempt to achieve (1), and (3) the actual results you're experiencing
instead of (1).
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYm5B1
stead of red should not matter (except
aesthetically).
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYm4+7AAoJENtN07w5UDAwrQMP/2vJz6L0ghQrIY09+t1jYBmB
bJBhGAVLD1fjkh9iobbOhos/AVWAJiSzxSBCB3xdPODF4Jm
ow, it's very difficult. I just try to be very careful when
entering passphrases. If I have insufficient privacy, I don't enter
them at all. Once per-VM encryption is implemented, it should help
with many aspects of this problem:
https://github.com/QubesOS/qubes-issues/issues/1293
- --
Andrew Da
d by default soon:
https://github.com/QubesOS/qubes-issues/issues/953
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYm43EAAoJENtN07w5UDAwPuQP/25xgVK7bL5XMJjRHKLeWMJu
5HXOai2TaFKLdIscyVHIZbjSqT/9B+06+saMwD
e:
https://groups.google.com/d/topic/qubes-users/fSiFkQeoqGE/discussion
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYmapOAAoJENtN07w5UDAwQKkP/Rk9PPLXAPtTagkGJssRoOXU
jF50PkiCXSRRGbk
https://github.com/QubesOS/qubes-issues/issues/2054
You may have to manually edit /var/lib/qubes.xml, but be very careful
if you do.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYmal5AAoJENt
access. But qubes attempts to expose the drive
> as a block device makes it unaccessible to sound-juicer.
>
> Is there a way to prevent this? E. g. prevent qubes from exposing a certain
> device in a certain appvm?
>
> Best regards,
> Timo
>
Not sure if this is an option
w.
>> Why not just place those windows on that virtual desktop if you
>> want to, and not place any other ones there? Why does it have to
>> be enforced by the OS?
> I did not request to enforce everyone work that way.
>
> I request putting an _
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
[Please keep the list CCed.]
On 2017-02-06 10:25, Lolint wrote:
> Thanks a lot Andrew
>
> Last question: Can I now just go back to the onion repos?
Should be fine.
> Also how would the dom0 update process work given that it launch
d, an
> eth0 device and my wireless card; using wireless.
>
Are you only able to connect through Tor, or can do you also have
clearnet connections from AppVMs?
> I don't know why the update repos/caches aren't being found.
> Ideas?
>
- --
Andrew David Wong (Axon)
Community Mana
tes were on January 8. I
haven't seen any available since then, whether checking over Tor or
over my home clearnet connection.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJY
s.google.com/d/msg/qubes-users/2uN9ybLTqHQ/XMy6d5UkDwAJ
> - (how) can I preconfigure disposable VMs? AIUI the home directory is always
> created freshly, how can I put stuff in there? (eg always re-configuring
> Firefox is annoying…)
https://www.qubes-os.org/doc/dispvm-customizatio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-02-03 17:49, Andrew David Wong wrote:
> [...] This is a good time to mention that we're in need of an HCL
> maintainer. Our longtime volunteer HCL maintainer, Zrubi, no
> longer has the time to do it. We all owe Zrubi a debt of
ed.
> Its one of the last couple posts on 1/4/16. That is where it starts about
> the fedora minimal between Him myself and Manuel/Rudd-o. Maybe that might
> be of some help.
>
Also, take a look at the "NetVM" and "NetVM (extra fi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-02-05 14:23, Unman wrote:
> On Sun, Feb 05, 2017 at 04:38:09AM -0800, Andrew David Wong wrote:
>> -BEGIN PGP SIGNED MESSAGE- Hash: SHA512
>>
>> On 2017-02-04 12:59, Unman wrote:
>>> On Sat, Fe
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-02-05 05:10, Stickstoff wrote:
> On 02/05/2017 01:39 PM, Andrew David Wong wrote:
>> On 2017-02-04 15:10, Oleg Artemiev wrote:
>>>> This is a good time to mention that we're in need of an HCL
>>>> maintai
ow to create
a USB qube?
https://www.qubes-os.org/doc/usb/#creating-and-using-a-usb-qube
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYlx5XAAoJENtN07w5UDAwYjEP/3cEI+b9C0R6i1Y+U
, but I presume you're asking about
qvm-backup[-restore].
I can't comment on symlinked files, because I only have symlinked
directories for bulky AppVMs, per:
https://www.qubes-os.org/doc/secondary-storage/
However, I can at least say that I have no problems backing up and
restoring AppVMs in su
o be edited manually, but it could indeed be
automated better. Can you help us with that? :D
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYlxzlAAoJENtN07w5UDAwK8AQAMRo/7/9OUj0W6/CTc32Bqfj
iQ6IfX24RM
gt; generate a number of different dvms based on different templates,
> it's simple to switch between them before launching a new dispVM.
> The launch time isn't noticeably different from starting up a new
> dispVM, and voila - multiple template disposable VMs on the cheap
I loader, using configuration [...],
> vmlinuz [...], initrd.img [...]"
>
> (I'm guessing the video is going elsewhere, but I don't know
> where!)
>
> Thanks!
>
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
all owe Zrubi a debt of gratitude for
keeping up this thankless task for so long! :)
Any volunteers?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYlTMPAAoJENtN07w5UDAwy8IQAIsstiJxRm1/c8ZSqo86jS9x
zHiO84jZKiyvXUcxhL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-02-03 17:27, adonis28...@gmail.com wrote:
> HI Andrew,
>
> Thank for the reply.
>
> The issues has been present for a few days now, I've tried everyday since
> then without any luck
>
Take a look
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-02-03 00:27, Hack wrote:
> On 02/03/2017 09:05 AM, Andrew David Wong wrote: On 2017-02-02
> 23:13, Hack wrote:
>>>> On 02/03/2017 06:35 AM, Andrew David Wong wrote: On
>>>> 2017-02-02 06:09, Hack wrote:
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-02-02 23:13, Hack wrote:
> On 02/03/2017 06:35 AM, Andrew David Wong wrote: On 2017-02-02
> 06:09, Hack wrote:
>>>> Hi,
>>>>
>>>> Could it be possible to provide Qubes OS with Devilspie2 at
>>
a similar program) yourself and
set up your own virtual desktops as you please, if that's what you desire?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYlBacAAoJENtN07w5UDAwgBUP/jeFcplQexNjPCLubJSUV5nI
home/user/CD',
> the path exists. the error notice: bad superblock Any idea?
>
I suspect that this is not a Qubes-specific problem:
https://lists.debian.org/debian-user/2012/08/msg00530.html
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGI
except for the
> hdmi monitor.
>
>
> Thank you, Patrick
>
Maybe this is the same issue?
https://github.com/QubesOS/qubes-issues/issues/2387
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYlBT
ot sure if its mounted at exactly /mnt/sysroot - see `mount` output to
>>>
>>> be sure).
>>>
>>>
>>>
>>> Big thanks to Marek!!
>>>
>>> Regards
>>>
>>> Ronald
>
> Check whether the network shares a con
blem with your router?
> I am installing on a Dell PowerEdge T710 and have added
> "-- efi=attr=uc" to the boot command.
>
> Any help with these problems would be much appreciated as I would
> like to use Qubes as my main operating system.
>
- --
Andrew
s:
HCL -
Thank you for your understanding. You can read more about the HCL
submission procedure here:
https://www.qubes-os.org/doc/hcl/#generating-and-submitting-new-reports
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
---
HCL -
Thank you for your understanding. You can read more about the HCL
submission procedure here:
https://www.qubes-os.org/doc/hcl/#generating-and-submitting-new-reports
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SI
le to look
> into and debug things, if you give me an hint
CCing Marek, Master of Hints. :)
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYkVJpAAoJENtN07w5UDAwiTUP/0J0QZDE78MWHo26VYkvrKaX
ffnmfgI3FRl6twwquqpfCBrT2FY1C
Thanks Unman,
This bug is currently affecting my work so it would be greatly
appreciated if it were resolved :)
On 01/29/2017 06:38 PM, Unman wrote:
> On Sat, Jan 28, 2017 at 12:31:38PM +, Nick Darren wrote:
>> /Hi all,/
>>
>>
>> On 01/24/2017 06:59 AM, anoa wrote:
>>> Hey all,
>>>
>>>
t;
>>
>> No, it doesn't. I tried both ways of settings the file
>> associations. Neither works.
>>
>
> You're right that the mimeopen method doesnt work for okular,
> although I wonder if this is a matter of getting the command
> right.
>
> However, setting ok
901 - 1000 of 1723 matches
Mail list logo