Re: [qubes-users] Special (Secure) Browser Frontend for Qubes?!

2016-11-02 Thread mara . kuenster
> Does your proposal really harden agains a real threat, or is it > something that should be done only because it could be done? > > Btw, thank you for taking the time to write us your proposal and > replying to our e-mails. Well honestly "proposal" is probably too much credit for the time I

Re: [qubes-users] Special (Secure) Browser Frontend for Qubes?!

2016-11-02 Thread mara . kuenster
Hi Simon, > several AppVMs, each one dedicated to a different activity, or as I > prefer to refer it myself: to different sensitivity levels. See my reply to Alex, maybe that explains why this is exactly what I was talking about ;). > - You may have a dedicated Firefox instance still having

Re: [qubes-users] Special (Secure) Browser Frontend for Qubes?!

2016-11-02 Thread mara . kuenster
> And that's why you can use many appVMs in the first place. You share the But that is not the point. First of all, unless your life depends on it, it will be very unlikely that you are actually paying enough attention to where you use which identity. A click on the wrong link can already screw

[qubes-users] Special (Secure) Browser Frontend for Qubes?!

2016-11-01 Thread mara . kuenster
Hi, I am using Qubes daily for a while now. One thing I think is really missing is some sort of identity management. This is most visible when browsing. You shop something on Amazon, then go to check some Facebook updates and look at WhatsApp. Then you browse Hacker News click on this link and

[qubes-users] Re: Qubes on a dedicated server

2016-09-30 Thread mara . kuenster
Am Freitag, 30. September 2016 15:05:31 UTC+2 schrieb Patrick Schleizer: > Does anyone ever try this? > > Did it work? Any experiences? Why would it not work? But the question is rather why use Qubes OS? If it's a dedicated server, you should look into XenServer, which basically can be thought

Re: [qubes-users] Switching from UEFI to BIOS after installation...

2016-09-25 Thread Mara Kuenster
Hmm yeah with that I managed to boot through BIOS mode, unfortunately the VMs don’t start (randomly, different ones fail on each boot attempt). So basically something seems to go wrong. The disks get decrypted and I can login with the manager etc. but the system is more or less a complete

[qubes-users] Switching from UEFI to BIOS after installation...

2016-09-25 Thread mara . kuenster
Hi, I just discovered that AEM needs a BIOS boot. Is there a way to install grub into the MBR of an USB drive after Qubes was already installed in UEFI mode? If so... How? Like any other Linux distribution or does Qubes need something special? I would want to avoid re-installing Qubes if

Re: [qubes-users] Encfs + Dropbox: How to keep your cloud files secure?!

2016-09-24 Thread mara . kuenster
Am Sonntag, 18. September 2016 04:52:52 UTC+2 schrieb rac...@gmail.com: > > So for me, EncFS seems the way to go > > I looked into using EncFS with Dropbox, but from what reading I did it seemed > that EncFS was (1) old and not well maintained and (2) insecure whenever an > attacker can see

Re: [qubes-users] Encfs + Dropbox: How to keep your cloud files secure?!

2016-09-16 Thread mara . kuenster
Am Freitag, 16. September 2016 20:11:48 UTC+2 schrieb Chris Laprise: > On 09/16/2016 09:58 AM, mara.kuens...@gmail.com wrote: > > Am Freitag, 16. September 2016 09:52:40 UTC+2 schrieb Drew White: > >> If they can get access, whether encrypted or not, it means it's insecure. > >> > >> Encryption

Re: [qubes-users] Encfs + Dropbox: How to keep your cloud files secure?!

2016-09-16 Thread mara . kuenster
Am Freitag, 16. September 2016 09:27:26 UTC+2 schrieb Raphael Susewind: > IMHO the safest option is indeed to use a split-dm kind of approach, as > suggested before: create a loopback file in the dropbox VM, expose this > via qvm-block to your working VM where you then do all the encryption >

Re: [qubes-users] Encfs + Dropbox: How to keep your cloud files secure?!

2016-09-16 Thread mara . kuenster
Am Freitag, 16. September 2016 09:52:40 UTC+2 schrieb Drew White: > If they can get access, whether encrypted or not, it means it's insecure. > > Encryption just takes time to break. > > If you have encrypted files, encrypted with a STRONG password THEN a 2048 bit > cypher, THEN it will

Re: [qubes-users] Encfs + Dropbox: How to keep your cloud files secure?!

2016-09-16 Thread mara . kuenster
PS: SSH alone is of course not very ideal, because this could mean I am running rsync of the dropbox qube. Instead I could use SSHFS to mount the dropbox qube's folder in encfs and then use the rsync of the encfs qube to sync the files via SSHFS. This is like super indirect, but probably

Re: [qubes-users] Encfs + Dropbox: How to keep your cloud files secure?!

2016-09-16 Thread mara . kuenster
> > Hi, > > > > I just installed Qubes OS and I feel its freakin awesome! > > > > I am trying to set it up the way I want and one thing on my list is having > > a dropbox vm that provides simply just the cloud storage... I would like to > > run the actual encryption on a different qube because

Re: [qubes-users] Encfs + Dropbox: How to keep your cloud files secure?!

2016-09-16 Thread mara . kuenster
@Chris Thanks I will think about this block-level approach. @Drew I don't agree... Storing encrypted files on dropbox IS secure in the sense that nobody in the world will be able to decrypt them (as long as the encryption step is not exposed to the dropbox process, which might be

[qubes-users] Encfs + Dropbox: How to keep your cloud files secure?!

2016-09-15 Thread mara . kuenster
Hi, I just installed Qubes OS and I feel its freakin awesome! I am trying to set it up the way I want and one thing on my list is having a dropbox vm that provides simply just the cloud storage... I would like to run the actual encryption on a different qube because I dont at all trust