Re: [qubes-users] customizing Firefox in disp-vms

2021-01-29 Thread Emma Borhanian
> On 1/29/21 3:48 PM, 'awokd' via qubes-users wrote: > > Be aware though that starting your dispvm's from a common .mozilla > > config instead of a freshly created one every time may result in > > increased fingerprintability. Some of the values in there seemed to be > > unique, and if unchanged be

[qubes-users] Re: customizing Firefox in disp-vms

2021-01-29 Thread Emma Borhanian
> Relevant preferences for start page: I meant for disabling startup notices. On Friday, January 29, 2021 at 3:18:56 AM UTC-8 Emma Borhanian wrote: > (I retyped all of this so hopefully I didn't typo any of it) > > Relevant preferences for start page: > defaultPref("br

[qubes-users] Re: customizing Firefox in disp-vms

2021-01-29 Thread Emma Borhanian
ther decision is whether to "lock" preferences vs just changing the default. On Friday, January 29, 2021 at 3:00:47 AM UTC-8 Emma Borhanian wrote: > > > #1 requires monkey patching > > I thought of this as "monkey patching", because I automated altering the

[qubes-users] Re: customizing Firefox in disp-vms

2021-01-29 Thread Emma Borhanian
> #1 requires monkey patching I thought of this as "monkey patching", because I automated altering the file with sed, but I guess it's not technically monkey patching if you're changing the source file. On Friday, January 29, 2021 at 2:50:41 AM UTC-8 Emma Borhanian wr

[qubes-users] Re: customizing Firefox in disp-vms

2021-01-29 Thread Emma Borhanian
ntly enough to be a viable secure browser. It seems we are stuck with firefox and playing this arms race game for setting default search forever. On Friday, January 29, 2021 at 2:47:48 AM UTC-8 Emma Borhanian wrote: > I might be interested in contributing code for this, but I'm not sure h

[qubes-users] Re: customizing Firefox in disp-vms

2021-01-29 Thread Emma Borhanian
I might be interested in contributing code for this, but I'm not sure how to package it. On Friday, January 29, 2021 at 2:43:20 AM UTC-8 Emma Borhanian wrote: > You can use an autoconfig > <https://support.mozilla.org/en-US/kb/customizing-firefox-using-autoconfig> > fil

[qubes-users] Re: customizing Firefox in disp-vms

2021-01-29 Thread Emma Borhanian
You can use an autoconfig file in the firefox-esr install directory in the template to control everything except default search, which mozilla has added a bunch of protections to in order to prevent default search page

[qubes-users] Switch focus on Qubes.OpenURL

2020-06-25 Thread Emma Borhanian
Is there a programmatic way to switch window focus between VMs? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view

[qubes-users] Re: Programmatically configuring appmenus for dispvm templates

2020-06-18 Thread Emma Borhanian
to never start. Also I'm getting System tray icons disappearing constantly, especially wifi: https://github.com/QubesOS/qubes-issues/issues/2242 I'm starting to regret thinking I could configure my system entirely idempotently with salt. On 6/17/20 10:56 PM, Emma Borhanian wrote: Nevermi

[qubes-users] Re: Programmatically configuring appmenus for dispvm templates

2020-06-17 Thread Emma Borhanian
Nevermind, my problem was trying to run `qvm-appmenus` from sudo. Still unfortunate there's no --get-default-whitelist though. On 6/15/20 6:48 PM, Emma Borhanian wrote: Hi, I'm trying to programmatically configure the appmenus for a dispvm template. `qvm-appmenus --get-whiteli

[qubes-users] Programmatically configuring appmenus for dispvm templates

2020-06-15 Thread Emma Borhanian
Hi, I'm trying to programmatically configure the appmenus for a dispvm template. `qvm-appmenus --get-whitelist / --set-whitelist / --set-default-whitelist` seems out-of-sync with what I configure in Qube Manager, and neither --set-whitelist or --set-default-whitelist work for dispvm templates

[qubes-users] Re: Workaround for salt issue 31531

2020-06-11 Thread Emma Borhanian
ted_stdout = untrusted_stdout.decode('ascii', errors='ignore') + untrusted_stderr.decode('ascii', errors='ignore')" On 6/11/20 12:24 PM, Emma Borhanian wrote: Workaround is to patch https://github.com/saltstack/salt/issues/31531#issuecomment-615253644 In

[qubes-users] Re: Workaround for salt issue 31531

2020-06-11 Thread Emma Borhanian
Workaround is to patch https://github.com/saltstack/salt/issues/31531#issuecomment-615253644 In the template vm from which salt-ssh will be called from via qubes-rpc from dom0. On 6/10/20 9:43 PM, Emma Borhanian wrote: So I seem to be running into this issue with salt+qubes: https

[qubes-users] Workaround for salt issue 31531

2020-06-10 Thread Emma Borhanian
So I seem to be running into this issue with salt+qubes: https://github.com/saltstack/salt/issues/31531 I want to run use a managed file jinja template in a non-dom0 domain. Does anyone have a workaround? I think maybe not many people use the salt integration given the amount of troubles I've

Re: [qubes-users] "How can I properly manage my system?" or "how do I use Admin API, salt and git or other versioning/distribution mechanisms together"

2020-03-15 Thread emma . borhanian
qubesctl fails with "No module named salt.client" unless I: pip install salt But pip doesn't sign code. How do I securely install the python pip module in a VM which is going to be performing administrative tasks? On Sunday, April 22, 2018 at 12:36:06 AM UTC-7, viq wrote: > > On 18-04-22 03:12

[qubes-users] Pass control to secure VM to enter+hash passwords?

2020-01-05 Thread Emma Borhanian
Hi, I was thinking about writing an application to do spaced repetition of passwords for my rarely-accessed backup drives etc. I've read qubes-wiki/data-leaks and while I could just store hashed passwords, the VM that runs my password spaced repetition so