On Wednesday, 21 February 2018 12:12:06 CET Wojtek Porczyk wrote:
> This is bad UX.
This is frustrating, I spent too many emails making the point clear that
this is an API level escape token. Not a user-visible one, and then you
respond to the thread showing you still completely missed that.
On Tuesday, 20 February 2018 19:41:19 CET Marek Marczykowski-Górecki wrote:
> > On the 'other' side of qrexec (on dom0) you have perfect control over
> > the
> > situation and you also don't have any need for recoding or encodings or
> > anything like that. It still is just 8 bits data, not
On Tuesday, 20 February 2018 16:54:36 CET Marek Marczykowski-Górecki wrote:
> > The thing you have to rememeber is that the escape character never needs
> > to be typed by the user.
> > In QRexec you are defining an API, applications like qvm-run are using
> > that API. What the user passes into
On Tuesday, 20 February 2018 14:04:03 CET Wojtek Porczyk wrote:
> On Tue, Feb 20, 2018 at 01:21:30PM +0100, 'Tom Zander' via qubes-devel
> > On Tuesday, 20 February 2018 01:49:37 CET Marek Marczykowski-Górecki
> > > We've decided to deprecate the '$' character from qrexec-related
On Saturday, 10 February 2018 09:05:51 CET Yuraeitha wrote:
> On Saturday, February 10, 2018 at 6:51:47 AM UTC+1,
> > I have a usb drive attached to sys-usb, lets say its mounted at /mnt on
> > sys-usb and im trying to backup a vm named MyVm from dom0
On Wednesday, 7 February 2018 08:17:11 CET Andrew David Wong wrote:
> Are you using the `-a` option?
> qvm-run -a
> This starts the VM if it's powered off, then runs the command in it.
> Working fine for me on 3.2.
As I wrote, qvm-start works fine, the VM is active and working.
On Tuesday, 6 February 2018 11:32:07 CET 'awokd' via qubes-users wrote:
> I'm not getting past the first step of:
> Verify you are cutting through the sys-net VM firewall by looking at its
> counters (column 2)
Yes, that sounds familiar.
The problem isn't limited to sys-net either, using
On Monday, 5 February 2018 04:34:35 CET Tim W wrote:
> People complain about doc being outdated..then fix them.
If someone can figure out how to port-forward in 4.0, please do update the
docs. I never managed to get that working.
The firewall page can also be a bit more detailed as-is, it
On Monday, 5 February 2018 08:00:35 CET 'awokd' via qubes-users wrote:
> Why are you complaining about bugs when running a ".0rc" version? They're
> to be expected; if not the point of release candidates.
On Sunday, 4 February 2018 21:00:55 CET 'awokd' via qubes-users wrote:
> Working on it (where other contributors haven't already)! Am about halfway
> through now.
You received this
On Monday, 5 February 2018 12:21:51 CET Tim W wrote:
> I am currently going thru all the setup script qubes build template
> options to find what templates compile correctly and what ones have bugs.
> After that I am happy to write up a markdown page for how to compile and
> install the Qubes
On Monday, 5 February 2018 02:33:02 CET Unman wrote:
> You are, of
> course, free to rewrite Qubes and its components in a language you're
> comfortable with.
Don't be so dramatic, I m not suggesting any such thing.
On Monday, 5 February 2018 00:55:34 CET Unman wrote:
> On Sun, Feb 04, 2018 at 08:14:57PM +0100, 'Tom Zander' via qubes-users
> > * Having nothing but python APIs for your operating system is something
> > that makes no sense. Python was never meant for serve
On Sunday, 4 February 2018 18:10:44 CET Yuraeitha wrote:
> Also it's been explicitly said that no Qubes 4 existing features will be
> added to the new-old Qube Manager. Which might also hint towards no
> changes coming to Qube Manager. If anything, it has to be re-made almost
> entirely to work
On Tuesday, 30 January 2018 11:19:18 CET 'Tom Zander' via qubes-users wrote:
> There were a bunch more updates in the repo 4.0 current-testing this
> morning which I applied and I rebooted, but no change.
> Still no icons in my systray, still not able to start any apps on any VMs.
On Tuesday, 30 January 2018 01:05:39 CET 'Tom Zander' via qubes-users
> I can start a VM using qvm-start, but when I use qvm-run nothing happens,
> it hangs forever. Even commands that don't need a X server.
> For any qube of the various OSs I run.
> The Qubes icons also
On Tuesday, 30 January 2018 02:51:06 CET 'awokd' via qubes-users wrote:
> Enable Debug mode?
I always wondered what this was, anyone know what effect it has to set this
On Saturday, 27 January 2018 15:45:27 CET Yoganandam Marava wrote:
> by adding forward rules at sysfirewall we can ping each other VM through
> ip address but not using VM name. Is this some thing possible with Qubes
> 4? I am naive in networking.please suggest if there is a way?
Each VM has a
Is this a known issue?
I can start a VM using qvm-start, but when I use qvm-run nothing happens, it
hangs forever. Even commands that don't need a X server.
For any qube of the various OSs I run.
The Qubes icons also no longer show in my system-tray.
I can still update dom0 via yum, though.
On Tuesday, 30 January 2018 00:19:58 CET ludwig jaffe wrote:
> Ok I found the file, backed it up and want to edit it.
> Do you know an xml ediitor with folding to edit this with more comfort,
> as there is no in the xml, just spaghetti.
> A vim for xml with folding or something like that with
On Saturday, 27 January 2018 18:14:23 CET billol...@gmail.com wrote:
> First, while KDE seems to be working well, I noticed that I can't download
> and install new themes, widgets, etc. through the KDE GUI. It can't
> connect to the KDE server. I'm assuming that this is because dom0
On Thursday, 25 January 2018 19:28:58 CET 'awokd' via qubes-users wrote:
> Resuming working my way through splitting up the documentation now that
> the 3.2 vs. 3.3 question has been mostly settled. Some general questions:
I was thinking about the qubes docs when I saw a wiki that had a
On Monday, 22 January 2018 15:56:06 CET 'Guillaume Bertin' via qubes-users
> My ideal configuration for my standalone home computer would be "dpms
> after 10 minutes" and "lock after 120 minutes".
I'm not sure if this is the kind of answer you are looking for;
xscreensaver is a really
On Tuesday, 23 January 2018 03:32:12 CET 'Xaver' via qubes-users wrote:
> I'm going to be switching over to Qubes 4.4 from 3.2 once its released and
> I have 2 questions about custom installation using thin pools.
> 1) First question is about creating a Swap partition. Would I create Swap
On Saturday, 20 January 2018 23:25:55 CET Unman wrote:
> You are probably missing the desktop files from /usr/share/applications
> You can copy the files from out of a Fedora based qube if you have one.
Ohh, smart, I didn't think about that.
I did this to get the majority of them back;
On Saturday, 20 January 2018 20:03:31 CET Davidson wrote:
> Hey, thanks again for your work, much appreciated.
> Another thought just occurred to me, a collapsible tree like option. I
> have like "work" VMs (one for libre office stuff, another for email,
> another for vid confer) and for
On Saturday, 20 January 2018 10:40:36 CET Foppe de Haan wrote:
> Since I am unable to estimate the security aspects of any given approach,
> and you do, have you seen this approach?
That looks exactly like the
On Friday, 19 January 2018 16:38:54 CET Marek Marczykowski-Górecki wrote:
> Specifically qmemman was broken in qubes-core-dom0 in 4.0.16 and 4.0.17.
Can confirm it works much better 4.0.18 than it ever did before :)
On Friday, 19 January 2018 11:48:56 CET aaq via qubes-users wrote:
> What can I do
Could this have something to do with the broken qmemman?
Try turning off memory-management and give the sys-net an initial amount of
something like 800MB.
also check if xentop has anything weird in the first
On Friday, 19 January 2018 12:48:27 CET wordswithn...@gmail.com wrote:
> Qubes already has built-in the capability to screenshot the entire desktop
> (Printscreen) or the current window (Ctrl+Printscreen).
Yes, it does.
But this is not something you should use and then send to a VM becuase that
On Sunday, 14 January 2018 08:12:24 CET r...@tuta.io wrote:
> Is qubes able to use the computing power of the gpu or is the type of gpu
> installed a waste in this issue?
Relevant here is an email I wrote recently;
I think I know why you get that error.
any part of the kernel (and drivers are part of the kernel) are off-limits to
change for any Qube VM.
To avoid loading a module you don't have to remove it, you can just blacklist a
Your distro may have a specific way of doing it, but a little
On Sunday, 14 January 2018 15:02:48 GMT jerr...@disroot.org wrote:
> can you somehow save the data? is it a corrupt file? when i put this file
> in the template folder in /var/lib/qubes, the data is not there.
'private.img' is the contens of /home and /rw
you may be looking for 'root.img' if you
On Sunday, 14 January 2018 03:07:09 GMT jerr...@disroot.org wrote:
> the template is whonix-ws
> when running command
> sudo qubes-dom0-update --action=reinstall qubes-template-package-name
This is quite broken in 4.0 and you have to be a bit clever to work around
this; here are some tips.
On Friday, 12 January 2018 13:09:35 GMT Holger Levsen wrote:
> I'm not so sure, why not use git branches?
That has my preference still, but I'm ok for any workable solution.
You received this
On Friday, 12 January 2018 11:18:19 GMT 'awokd' via qubes-users wrote:
> Would it be of value if I went through the published Docs and added these
> version headers? Should newer versions be added at the top (so 4.0 before
> 3.2 content)? 4.0 might just be "TBD".
I think that would be wonderful,
On Thursday, 11 January 2018 18:16:04 GMT Unman wrote:
> On the VPN case your own comment confirms that it would be better to
> provide a separate section, rather than trying to put "exceptions" in to
> the existing text.
Thank you for explaining that unman, much clearer indeed.
While I agree on
On Thursday, 11 January 2018 14:07:57 GMT Vít Šesták wrote:
> For your case, I have few questions:
> * What's dom0 swap usage? Qmemman includes this amount in memory
My dom0 has no swap, I didn't disable it, it just never had any.
I guess thats because in the installer I
I understand that there is a memory-manager to balance the memory between VM
Does anyone know if dom0 is being managed this way?
Currently there is 4GB assigned to dom0, of which 1.3 GB is in use.
At the same time I have chromium getting out-of-memory errors in an AppVM.
I'd like to
On Thursday, 11 January 2018 06:39:02 GMT brutellealexan...@gmail.com wrote:
> I don't seem to be able to download the 26 template either... It says all
> mirrors have been used and it fails.
This is definitely the direction you want to go, download the template from
On Thursday, 11 January 2018 03:42:11 GMT Andrew David Wong wrote:
> On 2018-01-10 12:53, 'Tom Zander' via qubes-users wrote:
> > I poked the Qubes guys about providing a separate dir on the website to
> > make it clear what is 3.x and what is 4.x specific, but they stated we
On Tuesday, 9 January 2018 08:54:02 GMT aaq via qubes-users wrote:
> Okay, so I found the documentation for bind-dirs
> (https://www.qubes-os.org/doc/bind-dirs/), but was still wondering if
> you meant binding the AppVMs /usr/bin and /usr/local/bin, or was thinking
> of something else?
On Tuesday, 9 January 2018 01:54:40 GMT Fabrizio Romano Genovese wrote:
> Hello all,
> This looks like an old issue:
> I'd be interested in using only the basic tablet features (essentially
> moving the mouse and clicking around using the
On Monday, 8 January 2018 13:29:02 GMT 'Ahmed Al Aqtash' via qubes-users
> * One I call 'trusted' which is based on debian sid (unstable) that I
> install everything I use for daily usage (firefox, libreoffice, mpv,
> emacs, other open source tools). Primarily AppVM's will be based out
On Monday, 8 January 2018 13:29:02 GMT 'Ahmed Al Aqtash' via qubes-users
> But issues like moving a templates home directory to /etc/skel (meaning
> that appvm's inherit /etc/skel as home dir from the template) left me
> baffled with my first install..
Homedirs are completely separated
On Monday, 8 January 2018 10:10:17 GMT qubestheb...@tutanota.com wrote:
> It's still yet not known whether this disabling is effective and whether
> it disables the PSP in its entirety.
> But if it does, then
On Monday, 8 January 2018 06:53:46 GMT khmartin...@gmail.com wrote:
> Is your new net vm different than "sys-net"? This caused me problems too.
> One solution is to rename the new net vm to "sys-net" or you can edit
> this file in dom0:
> In that
I needed space on my dom0 (Q4) drive, so I ended up using qvm-clone to copy
my fedora25 template, my sys-net & sys-firewall to a different pool.
I naturally also copied the setup from the config dialog.
Everything seemed to work for a while, so I removed the sys-net /firewall
On Sunday, 7 January 2018 19:40:27 GMT Yuraeitha wrote:
> But there are still some
> issues, i.e. no visual interface to show your overall disk space useage
> (the other month, you had to pull and combine several commands to make it
> show accurately). I'm not sure if this disk space useage
On Saturday, 6 January 2018 23:19:54 GMT pixel fairy wrote:
> The app menu, top left, keeps entries for old template VMs. is there a way
> to get rid of them?
You find the data backing this in
On Saturday, 6 January 2018 17:42:00 GMT russlyatos...@gmail.com wrote:
> hey, Please confirm we cannot install Qubes 4.0 on DVD, and the minimum
> on flash drive to install Qubes 4.0 we must have 32GB? thanks
Not sure if this is helpful; the minimum size harddrive I've installed Qubes
On Saturday, 6 January 2018 10:56:13 GMT haaber wrote:
> 2) Reboots hang systematically at "Reached target shutdown" and has to
> be rebooted via a coldboot.
I've been seeing this too, although sometimes it goes on after half a minute
only to hang at some other point (after loads of messages).
On Friday, 5 January 2018 23:43:58 GMT Zrubi wrote:
> > I'll attach two sceenshots of the tool, to give you a bit of an
> > idea of what it already does and maybe if its worth your time to
> > compile
> Probably this is very subjective, but:
> For me, the most important parts/feature of the
On Friday, 5 January 2018 15:37:37 GMT Unman wrote:
> Look at the nat table in the upstream netvm.
> You'll see that sys-net NATs these requests to the NS used by sys-net.
Ah, that hint was enough, I didn't expect NAT, thanks!
Got it working now.
I'm trying to figure out how this works, and I am stuck.
In every qube (except sys-net) there is a resolv.conf that points to two
10.139.1.1 and .2
This raises two questions;
* how does sys-net handle these requests on this odd address. No 'ip ad'
network seems to listen on
On Thursday, 4 January 2018 02:11:16 GMT Mark Malcom wrote:
> I downloaded fedora-26 template and after that my gnome-tweak-tool is
> completely ignored: no themes, no windows scaling anymore. Not just the
> Tweak Tool, but if I try to change the scale factor with gnomesettings,
> that is also
On Thursday, 4 January 2018 11:49:45 GMT Fabrizio Romano Genovese wrote:
> Looking at the console messages at startup, it looks like the problem is
> that Qubes takes more than one minute to boot sys-net, sys-firewall,
> sys-usb and sys-whonix. That was not the case in 3.2.
> Also, when giving
On Thursday, 4 January 2018 10:40:56 GMT 'Ahmed Al Aqtash' via qubes-users
> In 3.2 you could allow network access in a template rather easily through
> the GUI, and thus be able to pull software from other destinations than
> just repos.
The same functionality is present in Qubes4, just
On Thursday, 4 January 2018 12:28:27 GMT evas...@openmailbox.org wrote:
> Happy New Year Qubes Community!
> Due to high fees and heavy losses to donator at Bitcoin Core (BTC) network
> I suggest to at Bitcoin Cash (BCH) donation address as alternative.
> Nobody want to donate 50$ and lose 40$
On Wednesday, 3 January 2018 16:16:13 GMT Fabrizio Romano Genovese wrote:
> I am trying to install texlive on a fedora-26 template vm. The package is
> quite big, nevertheless it is correctly downloaded. After this, when the
> actual installation process would be supposed to start, it fails with
On Tuesday, 2 January 2018 18:26:27 CET Fabrizio Romano Genovese wrote:
> ...But how?
The naming is confusing as the root password is not really removed at all.
What happens is that a service called 'sudo' is configured to allow you to
do anything without a password.
Make sure you have this
On Tuesday, 2 January 2018 06:20:46 CET mmm...@gmail.com wrote:
> So from the installation security guide I read the following:
> And for USB Drive:
> "Untrustworthy firmware. (Firmware can be malicious even if the drive is
> new. Plugging a drive with rewritable firmware into a compromised
On Saturday, 30 December 2017 04:55:59 CET Stumpy wrote:
> In the end, I want to have say a VM for email, where the firewall blocks
> everything but access to the email service, and do the same for my
> "banking VM" or "bitcoin wallet vm"
> I'm at a bit of a loss so would be greatful for help.
On Monday, 1 January 2018 18:14:27 CET spi...@gmail.com wrote:
> I did look at this link as I already said.
> But the thing is that there are no info on how to install it
> without using the GUI.
if you get to the installer you can use alt-f1 to get to a native TTY. There
are several of them and
On Sunday, 31 December 2017 20:57:36 GMT davidmizr2...@gmail.com wrote:
> I can see e permission problem here
> "/net/wireless/realtek/rtlwifi/rtl_pci.ko' Read-only file system,
That is not a permission problem.
Nobody can write to a read-only filesystem.
Try to make sure that you configured
On Friday, 29 December 2017 19:23:01 CET taii...@gmx.com wrote:
> I am sure the massive
> markup over parts cost is worth it for a "tested working properly"
> system right?
Yes. Yes it is.
On Wednesday, 27 December 2017 03:02:57 CET dangmad...@gmail.com wrote:
> Opted to reinstall template, but I cannot download it without my
> connection dropping, and thus timing me out. dnf does not resume the
> download, despite it claiming to be saving the download to cache.
> I have put
On Wednesday, 27 December 2017 00:34:38 CET Leo Gaspard wrote:
> > I'm more concerned that they tried then how they failed.
> > It leaves a bad taste in my mouth.
> tl;dr: please do google for “looking glass” and “mozilla”
Its good we agree on all the technical details, and I agree intent is
On Tuesday, 26 December 2017 23:58:36 CET Eric Scoles wrote:
> Sorry, I guess I'm not understanding your answer. The 'usual way' to
> install in an upstream distro would be to connect to the network.
Your ‘yum’, ‘pacman’, ‘apt-get’ have access to the internet via a proxy
In short, software is to be installed in your template exactly the same as
you would do it in the ‘upstream’ way.
So if you are using a debian template, you’d be able to go to the debian
wiki pages that explain how to do it.
So your question 1 and two are answers with; “like in the upstream
On Tuesday, 26 December 2017 00:56:30 CET mmm...@gmail.com wrote:
> "So make sure your software is from a trusted source."
> Right but even if it is trusted at one point it can become less
> trustworthy later(infection) so I wanted to keep it perfectly "fresh" by
> using disposables.
On Sunday, 24 December 2017 02:33:26 CET Sven Semmler wrote:
> On 12/09/2017 08:38 PM, vel...@tutamail.com wrote:
> > Dependencies resolved. Nothing to do.
> Did you include the --enablerepo parameter as shown below?
> sudo qubes-dom0-update --enablerepo=qubes-community-templates
On Sunday, 24 December 2017 23:14:21 CET mmm...@gmail.com wrote:
> Okay so I read all of that lol, and I understood it all but what if there
> was an e-mail client that used the browser method? You get logged in to
> all your emails without retrieving anything then switch to cookie
On Sunday, 24 December 2017 01:58:36 CET mmm...@gmail.com wrote:
> Can't we just create disposable thunderbirds to protect the password?
The protection you want is against the evil software leaking the password.
A disposable VM would not help in this case as you enter the password, or
you let it
On Sunday, 24 December 2017 02:09:54 CET Marek Marczykowski-Górecki wrote:
> > sudo lvcreate -L 390.5g -n data Slow
> You need yo create those as thin pools, not standard volumes. For
> example this way:
> lvcreate -L 37g --thinpool systems qubes_dom0
Thanks, that fixed it :-)
It took some
I've set up a new qubes install and created two LVM volume groups. I wanted to
try and see how this works with qubes and I tried out the pools concept.
The problem is that I think I did everything according to the docs, but the
qvm-create command gives me an error message.
On Friday, 22 December 2017 02:42:57 CET yreb...@riseup.net wrote:
> 4.0 is going to come out of the box with like Debian 9 and Fed 26?
Fedora 26 is not going to be used in 4.0, maybe in 4.1
On Thursday, 21 December 2017 19:02:23 CET Unman wrote:
> This helps protect against user error - for example, opening a browser in
> Template by mistake, and using it to browse the web.
A separate thought occured to me,
if Qubes is worried about users misusing templates, I'd argue that free
Thanks for your mail!
I think we are getting to the core of our little discussion :-)
On Thursday, 21 December 2017 19:02:23 CET Unman wrote:
> Since templates can be customized by the user it is not true that they
> cannot contain private data.
They can contain private data, because they
On Tuesday, 19 December 2017 20:22:02 CET Dave C wrote:
> Whenever a TemplateBasedVM is created, the contents of the /home
> directory of its parent TemplateVM are copied to the child
> TemplateBasedVM’s /home...
> Is this true in Qubes 4.0 rc3?
> In my experience, changes made to
On Wednesday, 20 December 2017 11:59:26 CET Holger Levsen wrote:
> oh, and if you want to securly erase data, use /dev/random, not
This is not good advice, your /dev/random device creates true randomness,
but it only generates a very small amount of data.
Bytes per minute.
On Tuesday, 19 December 2017 22:09:31 CET David wrote:
> I'm attempting to wield a command from the archlinux wiki and getting
> access denied, even with sudo in front, and even when on dom0 (against
> my better judgment). Any thoughts?
A complex series like this is best just to run as root in a
On Wednesday, 20 December 2017 08:25:44 CET Matteo wrote:
> but before you code it you should talk to joanna to be sure it will be
> accepted and used.
I sent an email to the dev mailinglist at the same time I sent one here (no
reply so far) so at minimum she knows about it.
But I have to say
On Tuesday, 19 December 2017 16:33:49 CET Unman wrote:
> Ive suggested before that if you give this advice you should
> clearly state the consequences.
Ok, no worries. Here you go:
The consequences is that the template, which has no personal or identifying
information, can be used to
On Monday, 18 December 2017 10:13:48 CET pr0xy wrote:
> I am still a bit stuck concerning the Qubes Update Proxy. Where would I
> set the environment variables for my corporate proxy so that I could
> update dom0, templates and VMs?
You should add sys-net to your template VM if you want that
On Sunday, 17 December 2017 19:59:36 CET donoban wrote:
> Any idea?
If you hit the ‘f’ key to go full screen, or use the application menu, then
you end up doing this using the application in the Qube.
Try to do it using the menu on the titlebar, which makes the trusted-window-
manager be the one
Last weeks there was a lot of talk about a lot of us missing the
qubes-manager, or frankly any sort of useful graphical user interface.
As I’m a long time programmer I decided to just give this a go and try to
get something useful going.
My approach is one where I talk directly to the Admin-API
On Saturday, 16 December 2017 03:25:46 CET Yuraeitha wrote:
> Initially, this is all the reasons I can think of for wanting V-GPU.
> - Extending a single Qubes machine around the house or company, using
> multiple of screens, keyboards/mouses or other thinkable means.
This sounds inherently
On Sunday, 17 December 2017 11:59:26 CET Yuraeitha wrote:
> f, but from what I understand, complex software is hard to make secure,
> compared to well-made hardware minimizing use of software. If Qubes
> hypothetically were to adopt these, would the hardware approach be more
> secure here?
On Wednesday, 13 December 2017 00:49:14 CET Connor Page wrote:
> I’ll disagree with comparison of btrfs to lvm. there is a very significant
> difference between btrfs and lvm. btrfs is like a namespace and lvm
> volumes are block devices. one can put a namespace on a block device. but
On Tuesday, 12 December 2017 16:24:16 CET cooloutac wrote:
> well I'm no expert but with ps/2 keyboard it will be the only thing
> attached, unlike usb which can have multiple devices on same controller,
> spoofed as other devices. Is there a better option?
The attack modes are two very
On Tuesday, 12 December 2017 16:18:25 CET Connor Page wrote:
> so in short, first create a qubes storage pool
> qvm-pool --add
In the spirit of a “howto”, can you fill in the actual values to allow one to
add a second drive as the ‘private’ (home) partition *only* of a Qube?
> if you go
On Monday, 11 December 2017 15:10:17 GMT Connor Page wrote:
> I hope you do understand that there is no encryption in what you propose.
Thats why I wrote;
> I assume you already partitioned and did everything you need with the
> drive, it should be available to dom0.
I cowerdly leave the
On Monday, 11 December 2017 17:48:45 GMT Unman wrote:
> This is a case where "making stuff work a lot nicer" isn't necessarily a
> good idea.
The "log nicer" is that it is quite a bit faster and error handling is much
> I don't think you should advise against this without explaining
On Monday, 11 December 2017 11:31:22 GMT Connor Page wrote:
> templates establish a connection to a proxy running in some netvm defined
> in dom0 over a vchan.
Would you be able to repeat that in English ? :-)
You received this message because you are subscribed to the Google Groups
Lots of things changed in Qubes4, and I think I am finding out things lots of
others will need to find out at one point too.
So for them, as well as for my own memory, I'll write some howto emails.
as I run Qubes on a machine with a relatively small SSD and large spinning
On Sunday, 10 December 2017 07:09:35 CET qbertq...@gmail.com wrote:
> What I don't understand
Just want to point out that the 4.0 support for dispVMs is extremely basic
and honestly quite broken.
The concept works, most of the tools don't or are just shitty.
Happy to hear you made it work :)
On Saturday, 9 December 2017 23:03:38 CET qbertq...@gmail.com wrote:
> In Qubes OS 3, the documented way of creating DVM Templates is to use
> qvm-create-default-dvm (see
> qvm-create-default-dvm was removed in Qubes OS 4, so what's the new
On Friday, 8 December 2017 14:56:00 CET Chris Laprise wrote:
> > I also know that the “state of the art” in creating user interfaces has
> > moved on and the technology used in the old app is end-of-lifed for some
> > years now.
> Which end-of-life technology would that be?
In Qt5 (released 19
On Friday, 8 December 2017 01:05:32 CET Patrick wrote:
> I found the problem! My /var/lib/qubes/qubes.xml file was corrupted, so
> it could not be parsed correctly by qubesd. I restored a previous version
> from /var/lib/qubes/backup and now I am back in business! Thanks anyway
> for checking out
1 - 100 of 127 matches
Mail list logo