I noticed that the Fedora 32 template is in the stable repo, but no
announcement yet.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@goo
On Wednesday, June 17, 2020 at 11:09:31 AM UTC+2, tetra...@danwin1210.me
wrote:
>
> dom0 seems to be getting a lot of updates at the moment (3x in the last
> 1-2 weeks?) ... are there any security holes we should know about?
>
Hi,
Security issues are always published in Qubes Security Bulletin
On Thursday, May 21, 2020 at 2:49:30 PM UTC+2, unman wrote:
>
> On Thu, May 21, 2020 at 05:43:55AM -0700, Lorenzo Lamas wrote:
> > After a Dom0 update, most of the window titles in the Qubes colored
> borders
> > are now in a black font, instead of the old white. Is thi
After a Dom0 update, most of the window titles in the Qubes colored borders
are now in a black font, instead of the old white. Is this intentional, and
if so, is it possible for users to manually set it to white again. It looks
really ugly with most colors.(I use the Nodoka style for Window mana
On Wednesday, May 20, 2020 at 1:52:06 PM UTC+2, Marek Marczykowski-Górecki
wrote:
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> Hi,
>
> This year we're doing "minisummit" with 3mdeb in online formula.
> It is starting today, you can watch it live and ask questions, or watch
> re
On Sunday, May 10, 2020 at 10:26:02 PM UTC+2, Michael Carbone wrote:
>
> On 5/9/20 2:17 PM, Lorenzo Lamas wrote:
> > Whonix Project has partnered up with the CCT (Center for the Cultivation
> of
> > Technology, which is a charitable non-profit host organization i
Whonix Project has partnered up with the CCT (Center for the Cultivation of
Technology, which is a charitable non-profit host organization in Germany
for international Free Software projects.)
This makes it possible for all EU citizens to deduct donations from 500 EUR
and up from their taxes. If
On Wednesday, March 25, 2020 at 10:13:23 AM UTC+1, taran1s wrote:
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
>
>
> Lorenzo Lamas:
> > Same thing happens here when TB Downloader is automatically run
> > after it is updated. However, if I manually
Same thing happens here when TB Downloader is automatically run after it is
updated. However, if I manually run TB updater, I can select version 9.0.7
In addition to this, the security update to Tor itself, version 4.2.7, is
not yet available in Whonix.
--
You received this message because you
A Fedora 31 template is now available in the testing repo for Qubes 4.0.
On Friday, November 15, 2019 at 9:23:54 PM UTC+1, Dominique St-Pierre
Boucher wrote:
>
> Hello Qubes users,
>
> Do any of you tried and succeed upgrading a Fedora template to version 31?
>
> If so, how?
>
> Thanks
>
> Domini
On Monday, January 27, 2020 at 4:49:19 PM UTC+1, unman wrote:
>
> On Mon, Jan 27, 2020 at 07:04:14AM -0800, Lorenzo Lamas wrote:
> >
> >
> > On Monday, January 27, 2020 at 1:32:53 PM UTC+1, Maria Losdren wrote:
> > >
> > > Yes but there is no goo
On Monday, January 27, 2020 at 1:32:53 PM UTC+1, Maria Losdren wrote:
>
> Yes but there is no good documentation on Qubes how to do this in the
> windows gui.
>
> I am a noob and i can only use step by step tutorials.
>
The command line works differently on Windows. You cannot just use a
prog
More details have emerged:
https://www.phoronix.com/scan.php?page=news_item&px=Intel-iGPU-Leak-Details
I wonder if updating the Linux kernel in Qubes will be enough. There is
still no fixed kernel in the current-testing repo btw.
--
You received this message because you are subscribed to the Goo
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00314.html
Not much details there, but from the description it seems it might be possible
for a compromised AppVM to gather information from other VMs.
--
You received this message because you are subscribed to the Google
You can update from testing repo: sudo dnf update firefox
—enablerepo=updates-testing
When newer fedora versions are released, updates for older versions are usually
slower. The comments on the update also show negative feedback which is why it
has not been pushed to stable automatically. Howev
On Saturday, January 4, 2020 at 1:25:19 PM UTC+1, Lorenzo Lamas wrote:
>
>
>
> On Saturday, January 4, 2020 at 10:51:47 AM UTC+1, awokd wrote:
>>
>> > When it is not recognizing devices, the Qubes Devices Widget shows an
>> > additional device: "sys-u
On Saturday, January 4, 2020 at 10:51:47 AM UTC+1, awokd wrote:
>
> > When it is not recognizing devices, the Qubes Devices Widget shows an
> > additional device: "sys-usb:2-1:1 - 138a_003c_0030009d7e88". It is not
> > visible when everything works fine. Do you have that as well?
>
> An "lsusb
On Friday, January 3, 2020 at 11:02:24 PM UTC+1, scal...@posteo.net wrote:
>
> Since Qubes 3.2 I've had issues with sys-usb not recognizing devices. My
> solution has been to reboot until it works. 1 in 4 times it seems to
> work correctly.
>
> The device that I have the most trouble with is a
Hello Thierry,
Thanks for all that you are doing for the community. Do you see a
possibility of a Qubes Certified Laptop with an AMD CPU?
Intel is affected a lot more than AMD by the sidechannel vulnerabilities in
the last years. The Privacy Beast has a 3rd gen Intel CPU, Intel stopped
providin
Now running 4.0.2-rc3, everything works. Have also run 4.0.1, 4.0, 3.2 and
3.1 fine.
The only thing that doesn't work is S3 sleep in combination with Anti Evil
Maid(problems started with 4.0) If S3 sleep is engaged, laptop will do a
hard shutdown. When booting without AEM, S3 sleep works fine.
Thanks for the reply. Do you know when the option to only use integrated
graphics was removed? The models i’m looking at are 4th gen i7 CPU’s with
Quadro K1100M/1200M. Unfortunately, a lot of business laptops have changed to
prefer sleek design over performance, and use the slower U versions of
Hi,
I may buy a notebook for Qubes with integrated Intel HD graphics 4600, but it
also comes with a Nvidia Quadro graphics card. Will that be a problem for
Qubes? Is there someway I can force it to use the integrated graphics to avoid
problems?
--
You received this message because you are sub
On Thursday, November 14, 2019 at 2:57:19 PM UTC+1, Andrew David Wong wrote:
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2019-11-14 6:28 AM, Andrew David Wong wrote:
> > On 2019-11-13 12:40 PM, Lorenzo Lamas wrote:
> >> There are 2 new vulner
There are 2 new vulnerabilities in Intel CPU's, also affecting Xen. Xen has
issued XSA-304(CVE-2018-12207) and XSA 305(CVE-2019-11135). Is the Qubes
team aware yet? I haven't seen a new QSB.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To un
Posting this here as this might also affect Anti Evil Maid:
http://tpm.fail/
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.
On Monday, November 4, 2019 at 7:42:26 PM UTC+1, Germann Fabio wrote:
>
> Hi qubes-users,
>
> Recently I tried to present a presentation using LibreOffice on qubes. I'm
> not able to get into the presentation mode where I got the fullscreen
> presentation on the HDMI display and the presentatio
Some of my USB thumb drives are not detected when trying to boot from them,
others work fine though.
Also, one of my machine doesn't detect a USB thumb when trying to boot from
it in a USB 3.0 port, unless I go to Bios and set the USB 3.0 ports to
Legacy mode.
--
You received this message beca
Thank you Simon for the informative reply. Good to hear there is some
progress on Spectre variant 1. I hope something similar to Respectre will
be available in the future.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this
Note that Anti Evil Maid is also a variable that affects Suspend. For me,
when I boot with AEM and suspend the machine, it immediatly shuts down
instead. Booting without AEM, then Suspend works normally.
--
You received this message because you are subscribed to the Google Groups
"qubes-users"
On Saturday, September 7, 2019 at 8:45:52 AM UTC+2, Andrew David Wong wrote:
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 06/09/2019 6.30 AM, 'awokd' via qubes-users wrote:
> > Lorenzo Lamas:
> >> Is anyone from Qubes team reading t
Is anyone from Qubes team reading this?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the w
Using the brightness slider from the power manager tray icon regularly
crashes power manager(R4.0.1). I've had this issue for quite a long time
already, not sure if it was also present in R3.2.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To
If you dual-boot, the machine is only as safe as the unsafest OS. And
Windows without security updates is very unsafe.
Afaik, this is the latest on using a Windows HVM for gaming:
https://github.com/Qubes-Community/Contents/blob/master/docs/customization/windows-gaming-hvm.md
--
You received th
Very nice to finally have a certified Qubes laptop!
Personally, for me it would be nice if there was a more powerful
alternative in the future. I'm currently using something with about the
same resource power and I find myself often wishing I had something faster
because Qubes is quite heavy co
On Wednesday, November 7, 2018 at 5:28:00 PM UTC+1, Achim Patzner wrote:
> Am Samstag, den 03.11.2018, 00:24 +0100 schrieb pieter lems:
> Are there any other options available for donating such as paypal
>
>
> Just tried it; Open Collective is taking credit cards and Paypal. So go there
> and do
Has there been any progress with this? Researchers managed to bypass the
encryption, but afaik this is fixed with SEV-ES(Secure Encrypted
Virtualization-Encrypted State).
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this
> The new Fedora 30 TemplateVM is currently in testing:
>
> https://github.com/QubesOS/qubes-issues/issues/4845
>
> When it migrates to to stable, we will make an announcement, as usual.
Actually, it is already in the stable repo:
https://ftp.qubes-os.org/repo/yum/r4.0/templates-itl/rpm/
--
Yo
Are you perhaps using Anti Evil Maid?
For me suspend worked properly in R3.2, but on R4 I have the same problem with
suspend, shutting down instead. But only with AEM boot, if I boot without AEM,
suspend works again.
--
You received this message because you are subscribed to the Google Groups
On Friday, April 5, 2019 at 2:02:35 PM UTC+2, Steven Walker wrote:
> Does anybody know if subgraph is still a work in progress, or has it been
> discontinued now?
>
> Steve
Afaik Subgrap OS in its old form is dead, but it is replaced with Subgraph
Citadel which is still a (slow) work in progres
On Friday, April 5, 2019 at 3:15:44 PM UTC+2, john@gmail.com wrote:
> On Thursday, April 4, 2019 at 3:53:49 PM UTC-4, Lorenzo Lamas wrote:
> > Try updating to qubes-desktop-linux-manager 4.0.17 in current-testing.
>
> Thanks, Lorenzo. It is fixed now, however, I believe I made
Thanks unman!
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegro
Try updating to qubes-desktop-linux-manager 4.0.17 in current-testing
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To
Try updating to qubes-desktop-linux-manager 4.0.17 in current-testing.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
T
I have set my templateVM's to update over Tor. Even when sys-whonix isn't
running, the update Widget shows that there are new updates, so that must mean
it checks over clearnet? I think I've also seen this with R3.2, when Qubes
Manager showed the updates icon even though there was no sys-whonix
Afaik the specific attack only worked on Intel CPU's, OpenBSD disables SMT on
other manufacturers as well as they believe other CPU's have similar issues.
I run Qubes on an Intel machine, so I have SMT disabled, but haven't noticed
any performance hit.
--
You received this message because you a
I had to use --best --allowerasing to update qubes-desktop-linux-manager. USB
widget now works better than before, but VM widget seems broken.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emai
On Monday, January 28, 2019 at 7:55:06 PM UTC+1, qubert wrote:
> First visible error on screen:
> [FAILED] Failed to start Setup Virtual Console
> Second vis error:
> [FAILED] Failed to start Show Plymouth Boot Screen.
>
> No problem, eh? Because a few lines later, it prompts me for the passphrase
I also had this error after installing these packages from Dom0
Security-Testing repo.
I posted about it in the QSB #46 thread, but havent got a reply there.
Fortunately, with help of someone else I was able to fix it:
https://groups.google.com/d/msg/qubes-users/5D8AxG3jtdw/CqyWjGEiGgAJ
--
You
On Thursday, January 24, 2019 at 4:13:36 PM UTC+1, Lorenzo Lamas wrote:
> Please help, after updating dom0 with security-testing(which installed not
> only qubes-desktop-linux-manager and qubes-manager, but also
> qubes-mgmt-salt-dom0-update-4.0.5-1 and reboot, no VM at all will start.
Please help, after updating dom0 with security-testing(which installed not only
qubes-desktop-linux-manager and qubes-manager, but also
qubes-mgmt-salt-dom0-update-4.0.5-1 and reboot, no VM at all will start.
Failed to connect to qmmemman:[Errno 2] No such file or directory.
Text boot shows:
Fail
After switching to the Fedora 29 template, I noticed I have to clean old
metadata in order to update it, or I will get this:
Last metadata expiration check: 5 days, 18:23:45 ago.
Dependencies resolved.
Nothing to do.
Complete!
With the older Fedora versions it usually expired after a day or so, b
On Wednesday, January 9, 2019 at 11:11:31 AM UTC+1, Marek Marczykowski-Górecki
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On Wed, Jan 09, 2019 at 01:35:42AM -0800, Lorenzo Lamas wrote:
> > I see the hashes are different to 4.0.1-RC2 What has changed co
On Wednesday, January 9, 2019 at 3:49:32 AM UTC+1, Marek Marczykowski-Górecki
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> Dear Qubes Community,
>
> We're pleased to announce the release of Qubes 4.0.1! This is the first
> stable point release of Qubes 4.0. It includes many upd
Starting with the QWT iso or attaching it didn't work for me either, it didn't
show up at all. I copied it to the windows VM and extracted the installer from
it.
Btw, I just installed Windows 7 SP1 from an iso and installed all updates in
just a few hours.(old Sandy Bridge dual core with sata
ve
"rd.qubes.hide_all_usb" on the same place(s) and press ctrl+x to boot. Then
after booting is complete also remove "rd.qubes.hide_all_usb" with the normal
instructions to make it permanent.
> On Friday, January 4, 2019 at 12:54:56 PM UTC-5, Lorenzo Lamas wrote:
> > O
I have tried KDE shortly on R4 now, here are some of my pro's and cons:
XFCE:
Pros
-Fast and light.
-I have my standard panel on the bottom and created a second, auto-hiding,
panel on the top filled with Launchers to get something like a MacOS Dock.(But
way less fancy.)
Cons:
-Not visually appea
On Friday, January 4, 2019 at 6:29:37 PM UTC+1, Eric Duncan wrote:
> Following this guide to enable a sys-usb qubes, but with a USB keyboard fails:
>
> https://www.qubes-os.org/doc/usb/#how-to-use-a-usb-keyboard
>
> Tried on two ISOs: R4.0 (bare ISO install, no updates) and R4.0-rc2 (up to
> dat
On Friday, January 4, 2019 at 11:51:40 AM UTC+1, Lorenzo Lamas wrote:
> On Sunday, December 30, 2018 at 12:53:41 PM UTC+1, Lorenzo Lamas wrote:
> > On Qubes 3.2, I was able to start executables on my Windows VM through a
> > launcher with a qvm-run command:
> > "q
On Sunday, December 30, 2018 at 12:53:41 PM UTC+1, Lorenzo Lamas wrote:
> On Qubes 3.2, I was able to start executables on my Windows VM through a
> launcher with a qvm-run command:
> "qvm-run -q --tray -a VMname -- 'cmd.exe /c "C:\path\to\file.exe"' "
&g
On Qubes 3.2, I was able to start executables on my Windows VM through a
launcher with a qvm-run command:
"qvm-run -q --tray -a VMname -- 'cmd.exe /c "C:\path\to\file.exe"' "
However, when I try this on Qubes 4, it doesn't work, the Windows VM doesn't
even start with this command. How can I fix t
I'm installing AEM for the first time in Qubes 4 and noticed that the
readme(https://github.com/QubesOS/qubes-antievilmaid/blob/master/anti-evil-maid/README)
has been significantly expanded since 3.2, specifically it mentions to make
sure to get the latest RACM update at the SINIT module instruc
On Tuesday, November 20, 2018 at 3:31:37 PM UTC, Patrick Schleizer wrote:
> William Fisher:
> > How do I update the TOR browsers at the Template VM level? I've updated TOR
> > at the APP level but it doesn't stay updated.
> >
>
> New documentation page just now created focusing only on updating
Any ETA on 4.0.1 yet?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@g
Sad to see you go Joanna, thank you for all the work you put into Qubes OS.
Golem Project is lucky to have you!
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to q
After updating to Xen 4.6.6-37, with updated BIOS/microcode, I executed Spectre
& Meltdown Checker(https://github.com/speed47/spectre-meltdown-checker) in a PV
Fedora 26 AppVM.(Kernel 4.14.18-1)
Hardware support is now supported:
* Hardware support (CPU microcode) for mitigation techniques
* I
On Friday, March 16, 2018 at 10:29:25 AM UTC+1, awokd wrote:
> On Fri, March 16, 2018 8:42 am, Lorenzo Lamas wrote:
> > On Qubes 3.2 I'm getting this error when performing qubes-dom0-update:
> >
> >
> > tar: /var/lib/qubes/dom0-updates: Cannot open: No such file or
On Qubes 3.2 I'm getting this error when performing qubes-dom0-update:
tar: /var/lib/qubes/dom0-updates: Cannot open: No such file or directory
tar: Error is not recoverable: exiting now
Dom0 updates dir does not exists: /var/lib/qubes/dom0-updates
This was the latest succesful update before it b
On Wednesday, January 17, 2018 at 10:29:18 PM UTC+1, Ilpo Järvinen wrote:
> On Wed, 17 Jan 2018, Lorenzo Lamas wrote:
>
> > On Thursday, January 11, 2018 at 3:57:50 PM UTC+1, Andrew David Wong wrote:
> > > ## Qubes 3.2
> > >
> > > For Qubes 3.2, we plan to
On Thursday, January 11, 2018 at 3:57:50 PM UTC+1, Andrew David Wong wrote:
> ## Qubes 3.2
>
> For Qubes 3.2, we plan to release an update that will make almost all
> VMs run in a fully-virtualized mode. Specifically, we plan to backport
> PVH support from Qubes 4.0 and enable it for all VMs witho
It was already possible to update your F25 templates to F26, but fresh F26
templates are now also available to install. (Both normal and minimal)
https://ftp.qubes-os.org/repo/yum/r3.2/templates-itl/rpm/
With F27 released, F25 will go EOL after a few weeks so it is advised to update.
The fresh
I've enabled VM autostart on some of my AppVM's, but now they're they're
autostarted before some of my ServiceVM's. Is there any way to change the order
of autostarting VM's so my AppVM's are started last?
--
You received this message because you are subscribed to the Google Groups
"qubes-user
Is it necessary to install corresponding Xen packages in TemplateVM's from the
security-testing repository for VM's?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
On Saturday, August 5, 2017 at 1:26:51 AM UTC+2, Michael Carbone wrote:
> Lorenzo Lamas:
> > Because Fedora 25 has a newer version of NetworkManager, can the same
> > method for MAC randomization for Debian now be used for Fedora
> > instead of using macchanger as descr
Is it necessary to install corresponding Xen packages in TemplateVM's from the
security-testing repository for VM's?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
Because Fedora 25 has a newer version of NetworkManager, can the same method
for MAC randomization for Debian now be used for Fedora instead of using
macchanger as described here?
https://www.qubes-os.org/doc/anonymizing-your-mac-address/
--
You received this message because you are subscribed
Fedora 26 has been released which means there is now less than a month before
F24 becomes EOL..
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsub
I just updated Dom0 to the updates in current-testing, this upgraded both
Xen(to 4.6.4-25) and AEM(to 3.0.5-1) but nothing has changed.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from
On Sunday, December 4, 2016 at 10:27:19 PM UTC+1, Marek Marczykowski-Górecki
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On Sun, Dec 04, 2016 at 07:49:13AM -0800, Lorenzo Lamas wrote:
> > Since upgrading to Xen 4.6.3-21 from Xen 4.6.1-20, booting with AEM f
On Wednesday, December 7, 2016 at 9:01:30 PM UTC+1, eldo...@riseup.net wrote:
> I have exactly the same problem with booting using AEM
> Look at this :
> https://groups.google.com/forum/#!topic/qubes-users/Vs2QDsU1zJQ
You don't mention AEM there. Everything works fine on my machine if I boot
witho
> > This sounds familiar. Try removing the network devices from sys-net to
> > see if it will start then. Next, re-add the network devices and try
> > starting sys-net again.
> >
> > Chris
> Yes, removing network devices from sys-net makes it possible to start it,
> forgot to re-add them and tr
On Sunday, December 4, 2016 at 10:27:19 PM UTC+1, Marek Marczykowski-Górecki
wrote:
> What exactly you get when starting sys-net manually? Also, take a look
> at /var/log/libvirt/libxl/libxl-driver.log and
> /var/log/xen/console/hypervisor.log for any related messages. For
> example you can use `t
It's a bit saddening to hear priorities are shifting to commercial clients, but
for the rest it's great news, a good way to keep Qubes going!
> In an attempt to keep the open source development of Qubes going, we've teamed
> up with Open Collective [07], which makes it easier to donate to the Qub
Since upgrading to Xen 4.6.3-21 from Xen 4.6.1-20, booting with AEM fails to
start serviceVM's(netVM, usbVM, firewallVM). When the boot process finally
completes, trying to manually launch the VMs through VM Manager doesn't work
either. When I choose to boot without AEM, everything works as expe
Imo a good reason for Wayland in Qubes(Dom0 at least) is because x11 lockscreen
is not secure.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubs
On Saturday, September 3, 2016 at 8:51:47 PM UTC+2, Marek Marczykowski-Górecki
wrote:
> As for passing through the whole USB controller, it is broken currently:
> https://github.com/QubesOS/qubes-issues/issues/1659
> We'll work on this some more this month and hopefully fix it.
Nice, that would b
Does the new USB passthrough feature also work with Windows HVMs?
For work I need to use software that is only available on Windows and it uses a
DRM system which requires a connected USB flash drive counterpart in order to
start the software(I think it's from Codemeter, but I'm not sure). I'd r
A quick check in the Fedora 23 VM with Checksec shows all migitations enabled
for most processes. Processes from Qubes however are missing migitations.
A short list: (These are the processes that I know are from Qubes, some might
be missing)
qubes-db-deamon:No PIE, No Stack Canary, RELRO only pa
On Wednesday, June 15, 2016 at 6:31:23 AM UTC+2, Sandy Harris wrote:
>
> It may not be necessary. There is a kernel hardening project
> which is bringing some of the grsecurity & PaX stuff into the
> mainline kernel.
> http://kernsec.org/wiki/index.php/Kernel_Self_Protection_Project
>
May no
On Wednesday, June 15, 2016 at 1:54:54 AM UTC+2, Marek Marczykowski-Górecki
wrote:
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On Tue, Jun 14, 2016 at 11:53:34AM -0700, Lorenzo Lamas wrote:
> > I'm using an USB Qube to protect against malicious d
I'm using an USB Qube to protect against malicious devices and noticed that
after I take it out of sleep/standby, I get 2 notifications: USB device
disconnected from USBvm and USB device connected to USBvm. Does that mean
that the USB device has (shortly) been connected to Dom0?
--
You receive
Imho it would still be a good idea because of the PaX protections on user
applications.
For example it could prevent exploitation of your mail client. The
infection may not be able to survive AppVM reboot but it could still steal
information. You can of course limit the damage by compartmentaliz
91 matches
Mail list logo