-installed.
I'm not familiar with qBittorrent. Its best to stick with client
software that is expressly written, adapted (or at least audited) for
use on i2p.
Chris
Thanks for your answer.
By ProxyVM you mean something like sys-whonix? If so how could one setup one,
so that there can be no leaks
a proxyVM or appVM (not a netVM). Otherwise, you could
consider using a Tails HVM which would have it pre-installed.
I'm not familiar with qBittorrent. Its best to stick with client
software that is expressly written, adapted (or at least audited) for
use on i2p.
Chris
--
You received
an attacker to monitor and
control your firewall, VPN etc.
OTOH, combining firewall and VPN functions in the same VM is probably
fine since those processes are relatively low-risk.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users&q
Never mind I figured it out :)
If anyone has the same issues you can change the booted version by editing
/boot/efi/EFI/qubes/xen.cfg
Update the default var at the top and reboot.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe
'
to create COW copies.
LVM is less flexible and requires more commands, but your system may
already be setup with it and it would at least give you snapshots
without any need to copy large volumes of data unnecessarily.
Chris
--
You received this message because you are subscribed
version but some other update
installed at the same time, here is the update history:
This sounds familiar. Try removing the network devices from sys-net to
see if it will start then. Next, re-add the network devices and try
starting sys-net again.
Chris
--
You received this message because
What is an acceptable / secure way to obtain a Yubikey fob?
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@google
compilers in systems that are meant for non-development use. If I were
to merge any of those categories you listed, it would be Work and Regular.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this grou
-net and sys-firewall should be
run with a minimal template without regular apps present... this makes
them more like router installations and theoretically more secure.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubs
Would it have anything to do with upgrading to kernel 4.8 (both dom0 and
domU)?
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-user
On 11/30/2016 03:55 PM, Marek Marczykowski-Górecki wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Wed, Nov 30, 2016 at 02:44:17PM -0500, Chris Laprise wrote:
On 11/28/2016 05:27 PM, Patrick Schleizer wrote:
Probably related issues:
- https://github.com/QubesOS/qubes-doc/pull/176
the auth requests are originating from dom0. I'd like to
find a way to squelch them.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-user
start the browser DisposableVM frequently (which shouldn't take
more than 10-15 seconds) to 'shake off' such an attack."
... continued at https://github.com/rustybird/qubes-split-browser
Rusty
This looks very interesting... will be trying it our soon. Thanks!
Chris
--
You received this message b
ge as usual, without any
unusual behaviour or warning whatsoever.
So I wonder : Is AEM actually working on my system ?
Any clue appreciated.
TIA.
Kind regards.
Hi,
Can you restore your system to the point it was just before the Xen
update? This would allow you to reproduce the behavior.
Ch
l. No time to troubleshoot it.
You may want to switch to debian for your service VMs... Versions 8 and
9 are working well for me.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving
yet...
I'm assuming if I have Xen 4.6.3-21 from testing, the update from
standard repo should go OK.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to work with
Linux. Using these resources will improve the chances that Qubes will
work well on a computer model that is not on the Qubes HCL.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this grou
On 11/19/2016 06:15 PM, Aaron Jefferson wrote:
Hadn't turned it on.
On Sat, Nov 19, 2016 at 6:08 PM, Aaron Jefferson
<ajefferson1...@gmail.com <mailto:ajefferson1...@gmail.com>> wrote:
Thanks, I'll check it out.
On Sat, Nov 19, 2016, 18:06 Chris Laprise <tas...@
, ethernet and USB.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to q
, this should be logged on the VM itself,
anyway, no? Maybe I'm wrong. Look through journalctl and see.
Andrew
Andrew, thanks for the pointers.
Chris resolved before I even looked:
https://forums.whonix.org/t/fixing-whonix-boot-issue-after-securing-qubes-root-auth/3155
https://github.com/QubesOS
What is the command to do the trusted image conversion?
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.co
as incremental backup files.
A search on 'btrfs send backup' will bring up some guides.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-user
On 11/16/2016 01:26 PM, Andrew wrote:
3n7r0...@gmail.com:
On Wednesday, November 16, 2016 at 1:22:43 PM UTC, Chris Laprise wrote:
On 11/15/2016 04:04 PM, Unman wrote:
On Tue, Nov 15, 2016 at 02:26:12PM -0500, Chris Laprise wrote:
On 11/15/2016 07:20 AM, Unman wrote:
On Tue, Nov 15, 2016
On 11/15/2016 04:04 PM, Unman wrote:
On Tue, Nov 15, 2016 at 02:26:12PM -0500, Chris Laprise wrote:
On 11/15/2016 07:20 AM, Unman wrote:
On Tue, Nov 15, 2016 at 11:55:13AM +, Unman wrote:
On Tue, Nov 15, 2016 at 05:53:56AM -0500, Chris Laprise wrote:
Following the instructions
/common-auth'.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to q
On 11/14/2016 05:20 PM, pixel fairy wrote:
On Monday, November 14, 2016 at 5:09:41 PM UTC-5, Chris Laprise wrote:
Using btrfs as the dom0 filesystem (or a btrfs volume added to a dom0
pool) could enable the advantages being sought here. Using either
snapshots or reflinks, you can create
.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@google
nux is much easier
to boot on a Mac from DVD.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post
a remote exploit that can also priv
escalate against Xen--and from there possibly infect firmware or boot
device--would benefit from using AEM.
When I last shopped around, I was under the impression that TXT was tied
to AMT/ME/Vpro as a package.
Chris
--
You received this message because
TTPS, ZRTP, etc.) by implication. Then the only way
to have reliable link encryption is to have everyone we communicate with
sitting at home connecting to a single VPN server... each from their
router-bound VPN clients... tethered by an ethernet cable between router
and PC. Egads.
Chris
--
generated from the VPN VM from the packets going to/from appVMs. So
accidental net access generated while using the VPN CLI, for example,
will be blocked and stay out of the VPN tunnel. Its not critical but
Whonix people wanted it as a precaution.
Chris
--
You received this message because you
he prompts over and over for VMs that are created, and
there is no way to guarantee that 'certain' VMs have integrity to do
this by default.
====
Hi Chris,
Its easy to enable apparmor. See the Whonix documentation about this.
I will have a look thanks. I have read that Ap
firewall does, the risk is very
low. I don't think it really sacrifices any security to share a template
with sys-net.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from
y VM & maybe the other iptables commands from the
VPN doc assuming a user manually implemented them, yes. So probably
only some further bugs in combination would lead to serious issues.
I see. So that is similar to the scenario I described above.
Chris
@Sec Tester:
AirVPN enables y
On 11/11/2016 10:37 PM, Sec Tester wrote:
Perhaps another reason why VM's shouldn't have default root access?
"taskset 0x2 sudo ./measure -p 0.7 -s 16."
This really needs root to work?! This could be important... these
rowhammer vulns have become BAD.
Chris
--
You received th
er drivers operate there.
Chris
For now I can configure apps (at least Darktable for sure) to use my
color profile manually.
(BTW: I'm about to create a "color management in Qubes" documentation soon)
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it
On 11/11/2016 01:24 PM, David Hobach wrote:
On 11/10/2016 10:07 PM, Chris Laprise wrote:
> On 11/10/2016 01:28 PM, David Hobach wrote:
>> I'd recommend to avoid any tools employing iptables which were not
>> written explicitly for Qubes as well.
>
> This. Or at least d
to
'qubes-vpn-handler.sh' and it should work. Just don't click on the
'Activate Network Lock' as that will overwrite the firewall rules.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving e
On 11/10/2016 12:50 PM, Chris Laprise wrote:
On 11/10/2016 12:41 PM, raahe...@gmail.com wrote:
On Thursday, November 10, 2016 at 12:38:58 PM UTC-5,
raah...@gmail.com wrote:
On Thursday, November 10, 2016 at 6:28:33 AM UTC-5, Eva Star wrote:
Subj
https://github.com/IAIK/drama
All systems
the root.img from the standalone to the template's folder. Finally,
install Qubes Tools into the template.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, sen
the GUI program under the 'qvpn' group, granting it access to
the net. Or you could change the policy of the OUTPUT chain to ACCEPT to
bypass the group restriction, which doesn't affect leak prevention for
forwarded traffic.
Chris
--
You received this message because you are subscribed
On 11/07/2016 07:32 PM, Jean-Philippe Ouellet wrote:
On Mon, Nov 7, 2016 at 2:29 PM, Chris Laprise <tas...@openmailbox.org> wrote:
The framebuffer is being handled by the trusted dom0 graphics stack, so is
actually a trusted input.
Perhaps we have run into trusted != trustworthy termi
have the additional drive configured for
that VM.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To
a simple matter to
pipe the raw video to a codec in an appVM.
For many, this may be an acceptably unlikely risk, particularly if the
thing you are recording is relatively trusted already.
The threat model is pretty similar to Qubes' Trusted PDF feature.
Chris
--
You received this mes
specific to web browsing.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send
fig filename that is a symlink to an actual config file. You
could have an rc.local script that randomly selects a config file and
creates the symlink.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop
should rely on when
deleting specific files. Some SSDs and HDDs also have a "secure erase"
feature which erases the entire drive.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop r
On 10/25/2016 03:07 PM, Marek Marczykowski-Górecki wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Oct 25, 2016 at 02:27:23PM -0400, Chris Laprise wrote:
I'm trying to install the xen-4.6.3 package from current-testing, but there
is no xen*.gz added to /boot.
This file is part
I'm trying to install the xen-4.6.3 package from current-testing, but
there is no xen*.gz added to /boot.
How can I get this installed properly to test on my system?
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubs
ping seemed
less common.
There is also vm.vfs_cache_pressure which affects cache size.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubs
On 10/18/2016 04:26 AM, pl1...@sigaint.org wrote:
On 10/16/2016 02:02 PM, pl1...@sigaint.org wrote:
On 10/15/2016 08:59 AM, pl1...@sigaint.org wrote:
Anyone?
Instructions for MAC anonymization have just been updated:
https://www.qubes-os.org/doc/anonymizing-your-mac-address/
Chris
Ok
.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@google
On 10/16/2016 02:02 PM, pl1...@sigaint.org wrote:
On 10/15/2016 08:59 AM, pl1...@sigaint.org wrote:
Anyone?
Instructions for MAC anonymization have just been updated:
https://www.qubes-os.org/doc/anonymizing-your-mac-address/
Chris
Ok, is recommend to use debian as sys-net
My question
On 10/15/2016 12:56 PM, 4lgaqp+cqeepdnbinsts via qubes-users wrote:
Hi Chris,
Thanks for the suggestion.
Just to clarify, the VPN tunnel was created within the sys-firewall, and
currently that's the only proxyVM that I'm using (apart from the sys-whonix),
hence all traffic from the sys-net
)...
https://www.qubes-os.org/doc/software-update-vm/#updates-proxy
3. If you have sys-whonix setup, it will already have a running update proxy
4. Reconfigure the templates to not use the update proxy
Chris
--
You received this message because you are subscribed to the Google Groups
"
On 10/15/2016 08:59 AM, pl1...@sigaint.org wrote:
Anyone?
Instructions for MAC anonymization have just been updated:
https://www.qubes-os.org/doc/anonymizing-your-mac-address/
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users&q
problem which is my overriding
concern.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to
will be fixed in a
timely fashion. I am wondering what the heck "reasonably secure OS" is
supposed to mean in this context.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving
On 10/13/2016 01:08 AM, Manuel Amador (Rudd-O) wrote:
On 10/13/2016 03:13 AM, Chris Laprise wrote:
Here is a rundown of initial concerns...
* Routing tables should not be manipulated when VPN clients will
surely do this as well
The program prohibits OpenVPN from manipulating routing tables
On 10/12/2016 10:58 PM, entr0py wrote:
Manuel Amador (Rudd-O):
On 10/12/2016 07:58 PM, Chris Laprise wrote:
This requirement is already satisfied in the Qubes VPN doc:
https://www.qubes-os.org/doc/vpn/#set-up-a-proxyvm-as-a-vpn-gateway-using-iptables-and-cli-scripts
The scripts will stop
t
agnostic and more importantly fills Patrick's requirements for Tor
isolation.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubsc
On 10/12/2016 05:40 PM, Manuel Amador (Rudd-O) wrote:
On 10/12/2016 07:58 PM, Chris Laprise wrote:
This requirement is already satisfied in the Qubes VPN doc:
https://www.qubes-os.org/doc/vpn/#set-up-a-proxyvm-as-a-vpn-gateway-using-iptables-and-cli-scripts
The scripts will stop non-VPN
nstead of going around it.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group,
On 10/03/2016 03:05 PM, Chris Laprise wrote:
Network Manager 1.4.2 has been testing very well for me the last few
days...
This new version appears to randomize MAC addresses properly, and the
feature set has evolved to the point where the randomization process
is managed in a more holistic
option. That is the Qubes default.
You can do a one-time recovery simply with 'sudo fstrim -v /rw' . There
should be no need to resort to long brute force methods like using dd
and cp.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-u
in
business models from top-tier brands. If you want to depart from that
(not very small) selection flying your "PC compatible" and "homemade
rig" flags while carrying the burden of Qubes' additional hardware
requirements, well, don't expect much.
Chris
--
You received
On Sunday, October 2, 2016 at 11:36:09 PM UTC-5, raah...@gmail.com wrote:
> On Monday, October 3, 2016 at 12:05:43 AM UTC-4, Chris Mays wrote:
> > On Sunday, October 2, 2016 at 10:53:06 PM UTC-5, Andrew David Wong wrote:
> > > -BEGIN PGP SIGNED MESSAGE-
/NetworkManager.conf.html
man nm-settings
https://github.com/QubesOS/qubes-issues/issues/938
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-user
On Sunday, October 2, 2016 at 10:53:06 PM UTC-5, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-10-02 20:45, Chris Mays wrote:
> > I just installed Qubes OS for the first time today, and am having troubles
> > getting a disposabl
mention that.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to q
On 09/25/2016 08:12 AM, johnyju...@sigaint.org wrote:
Chris wrote:
Especially if you did the sharing via a separate vpn or ssh tunnel. But
in general, I don't think Qubes security should be considered much if
any benefit to adjacent non-Qubes systems.
I'm curious as to why you would say
I would say having the Qubes box between the laptop and the Internet
generally increases the safety of the laptop.
Especially if you did the sharing via a separate vpn or ssh tunnel. But
in general, I don't think Qubes security should be considered much if
any benefit to adjacent non-Qu
traffic except the vpn connection itself. The forwarding
rules you added are great for protecting downstream vms, but they don't
help protect the vpn vm in this way.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubs
tream. Etc...
Of course, non-networked VMs are the safest of all.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googl
Have you tried using the grub boot menu to select another kernel
version? You can also adjust some kernel parameters there by pressing 'e'.
Does your x1 have an option for legacy boot instead of UEFI? That may
work better.
Chris
--
You received this message because you are subscribed
reason.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to q
the vm, that sounds like
a Chrome bug.
If the problem hinges on stopping/starting, then Chrome may be storing
session data in a nonstandard location (instead of /home/user) such as
/var. When you are running Chrome, look in /var/lib to see if Chrome is
writing files there.
Chris
--
You
left; so there's a chance they could suddenly
disappear, but for now, it's not a bad option.)
Cheers.
JJ
Riseup sent out a similar message last week, saying they needed to raise
funds quickly.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-
vm
should have only ethernet, and the other vm only wifi.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.co
On 09/23/2016 08:00 AM, Marek Marczykowski-Górecki wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Fri, Sep 23, 2016 at 07:42:07AM -0400, Chris Laprise wrote:
On 09/22/2016 07:12 PM, Marek Marczykowski-Górecki wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Thu, Sep 22
ule *first* to emulate the current
architecture? That way, people can continue to have the same storage
choices and backup procedures they already do.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and s
On 09/22/2016 02:08 PM, se...@redhat.com wrote:
On Thursday, September 22, 2016 at 1:39:20 PM UTC-4, Chris Laprise wrote:
On 09/22/2016 01:05 PM, johnyju...@sigaint.org wrote:
Has the Qubes team ever considered the use of btrfs?
Qubes tools will even utilize btrfs reflinks where possible, so
On 09/22/2016 01:05 PM, johnyju...@sigaint.org wrote:
Has the Qubes team ever considered the use of btrfs?
Qubes tools will even utilize btrfs reflinks where possible, so hardly
any extra space is used when you clone a template or other vm.
Chris
--
You received this message because you
On 09/21/2016 06:24 AM, Robert Mittendorf wrote:
Am 09/20/2016 um 10:29 PM schrieb Chris Laprise:
This is a good candidate for filing an issue, but mainly for this
situation -- "A warning if an upstream VM does not implement the
firewall rules", which should include connecting
ee with that. Chained proxyvms are probably
more common than you think.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...
into the current system.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group,
vpn's address when browsing to a site like whatismyip.com.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegro
a try because its more secure and probably less complex
than what you're suggesting.
Of course, with Qubes its up to the user to weigh the risks and make the
decicions. Good luck...
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users&q
ify the iso with gpg? And is the DVD or USB stick big enough
(should be at least 7GB)?
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-user
ient vm to make this truly secure.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this gro
setup also re-routes all DNS over the vpn tunnel, so that is
something to keep in mind for this option.
Chris
1. https://www.qubes-os.org/doc/vpn/
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop
with another Linux distro like fedora, and examine
the boot/install media and the rpm that its complaining about.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, sen
ulnerabilities" when said bugs are discovered.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To
to start is
trying create the whole setup in Whonix-Qubes using the Whonix doc you
referenced. The Whonix forum should be able to help you with any
specific issues when following their directions.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-us
--
Hi,
You could try openvpn instead of PPTP if your VPN service supports it.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-user
at the
anti-evil-maid feature. For 2-factor, take a look at
https://www.qubes-os.org/doc/yubi-key/
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to q
or rc2 can just install updates, no need for full reinstall.
For older releases check above page for upgrade instructions.
- --
Qubes Manager systray icon is gone now...
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To u
, like using 'ping' with both IP addresses and
domain names, and checking 'iptables'.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-user
cookie right after you created the account (also with a new/different
cookie), etc.
One thing that seems missing from your description is whether you stuck
to https for security... Tor exit nodes are really frightful.
Chris
--
You received this message because you are subscribed to the Google
--especially IOMMU/ VT-d.
A pretty good indicator for TPM in a laptop is whether the unit has a
fingerprint scanner.
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails fro
1001 - 1100 of 1196 matches
Mail list logo