Re: [qubes-users] Corrupted GUI after XFCE logon

2020-03-02 Thread IX4 Svs
Hi Frédéric,

Surprisingly, the lightdm service doesn’t appear to be running, but moving the 
xfce4 config directory out of the way and then logging in, successfully gave me 
a functioning resolution.

Many thanks for the help!

Alex  

> On 2 Mar 2020, at 10:33, Frédéric Pierret  
> wrote:
> 
> Hi,
> 
> I would do something like:
> 
>- systemctl stop lighdtm
>- mv ~/.config/xfce4{,.bak}
>- systemctl restart lightdm
> 
> Your XFCE settings are backuped for further investigation.
> 
> Best,
> Frédéric
> 
>> On 2020-03-02 10:46, IX4 Svs wrote:
>> Today I booted my Qubes laptop (Dell Precision M4800) which has been working 
>> fine for a while and noticed that after entering my password in the GUI 
>> session manager to enter XFCE I’m being logged on, but there is something 
>> wrong with the resolution of the display and the result is a corrupted and 
>> unusable GUI. (See attachment)
>> 
>> I can hit CTRL-ALT-F2 to get a console session, but not sure how I should 
>> proceed to troubleshoot the XFCE settings from there. Is there a way to 
>> “reset” the X server settings or force it to attempt to auto-detect the 
>> screen size? This is odd as it used to work fine for the built-in laptop 
>> display, but has now become unusable.
>> 
>> I installed all dom0 updates and rebooted to ensure I have the latest 
>> patches, but it didn’t help. Qubes R4.0
>> 
>> Thanks in advance,
>> 
>> Alex
>> 
> 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7776F1FB-6DBF-4BFD-A2A9-E5504328F42B%40gmail.com.


[qubes-users] Re: Corrupted GUI after XFCE logon

2020-03-02 Thread IX4 Svs
Image attached, sorry for the noise.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2F51AC54-17D2-4501-9B6B-8EAF8D015088%40gmail.com.


[qubes-users] Corrupted GUI after XFCE logon

2020-03-02 Thread IX4 Svs
Today I booted my Qubes laptop (Dell Precision M4800) which has been working 
fine for a while and noticed that after entering my password in the GUI session 
manager to enter XFCE I’m being logged on, but there is something wrong with 
the resolution of the display and the result is a corrupted and unusable GUI. 
(See attachment)

I can hit CTRL-ALT-F2 to get a console session, but not sure how I should 
proceed to troubleshoot the XFCE settings from there. Is there a way to “reset” 
the X server settings or force it to attempt to auto-detect the screen size? 
This is odd as it used to work fine for the built-in laptop display, but has 
now become unusable.

I installed all dom0 updates and rebooted to ensure I have the latest patches, 
but it didn’t help. Qubes R4.0

Thanks in advance,

Alex

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3CDCDB43-57C9-4E62-B49F-ED04E6F22326%40gmail.com.


[qubes-users] Android file transfer

2016-11-16 Thread IX4 Svs
Hi list

I've been through the archives and found a number of partially helpful
suggestions, none of which give me a workable solution. Google also gives
me http://nknu.net/mount-nexus5-on-fedora23-using-simple-mtpfs/ which
unfortunately doesn't fully work on my Qubes system - I can map the phone
device but then mounting with simple-mtpfs inb dom0 gives me a blank
directory.

So, having the following two systems:
Qubes R3.1
Android 6.x phone (unrooted)

..what's the best way to do file transfer between the two? Ideally I'd like
to be able to mount the filesystem of the phone and be able to read/write
contents to a Qubes AppVM.

Thanks in advance,

Alex

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAEe-%3DTe8pojwMtdh3wjQ6X8iJ5O6GBKP%3Dx15GNH7zy9VY2zv-Q%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Disposable VMs are not disposed of

2016-11-15 Thread IX4 Svs
On Tue, Nov 15, 2016 at 1:14 AM, Marek Marczykowski-Górecki <
marma...@invisiblethingslab.com> wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On Tue, Nov 15, 2016 at 12:34:19AM +, Alex wrote:
> > This is the second time I encounter this freaky issue on R3.1:
> >
> > Start a DispVM Firefox, login to a website, close Firefox, observe the
> disposable VM is gone from the VM manager. Fine so far.
> >
> > Launch a new disposable Firefox which creates a new VM with a different
> name (dispN) - notice with horror that you are already logged on to the
> website you had logged on to from the terminated VM.
> >
> > Surely this is not supposed to happen. How to troubleshoot?
>
> I believe you've hit this issue:
> https://github.com/QubesOS/qubes-issues/issues/2200
>
> The issue is fixed in R3.2, but it hasn't been yet backported to R3.1...
> For now, make sure that files in /var/lib/qubes/appvms/fedora-23-dvm (or
> other - depending on what template you use for DispVM) are owned by your
> user. Then recreate DispVM savefile with qvm-create-default-dvm.
>
>
All files in /var/lib/qubes/appvms/fedora-23-dvm are owned by my user,
group qubes - but volatile.img is -rw-r--r-- while all other files are
-rw-rw-r-- (so, group can't write to it). I changed this with chmod 664
volatile.img but on running qvm-create-default-vm the permissions are reset
to their earlier state - and volatile.img is not group-writeable.

Should people on R3.1 just chmod 664 volatile.img right after recreating
the DVM?

Thanks

Alex

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAEe-%3DTcfU6%2B4L5KZOjCpaB5UQfo%2BjhoD-%2Bu5SgPoWHVqA-caiQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] installing Signal on Qubes mini-HOWTO

2016-09-18 Thread IX4 Svs
On Sun, Sep 18, 2016 at 9:13 PM, Marek Marczykowski-Górecki <
marma...@invisiblethingslab.com> wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On Sun, Sep 18, 2016 at 09:09:58PM +0100, IX4 Svs wrote:
> > On Sat, Sep 17, 2016 at 11:41 PM, Marek Marczykowski-Górecki <
> > marma...@invisiblethingslab.com> wrote:
> >
> > > -BEGIN PGP SIGNED MESSAGE-
> > > Hash: SHA256
> > >
> > > On Sat, Sep 17, 2016 at 03:52:17PM +0100, IX4 Svs wrote:
> > > > On Wed, Sep 14, 2016 at 9:26 AM, Marek Marczykowski-Górecki <
> > > > marma...@invisiblethingslab.com> wrote:
> > > >
> > > > > -BEGIN PGP SIGNED MESSAGE-
> > > > > Hash: SHA256
> > > > >
> > > > > On Wed, Sep 07, 2016 at 11:38:55PM +0100, IX4 Svs wrote:
> > > > > > On Thu, Sep 1, 2016 at 8:41 AM, IX4 Svs <ix4...@gmail.com>
> wrote:
> > > > > >
> > > > > > > On Thu, Sep 1, 2016 at 2:21 AM, Andrew David Wong <
> > > a...@qubes-os.org>
> > > > > > > wrote:
> > > > > > >
> > > > > > >> -----BEGIN PGP SIGNED MESSAGE-
> > > > > > >> Hash: SHA512
> > > > > > >>
> > > > > > >> On 2016-08-31 15:50, IX4 Svs wrote:
> > > > > > >> > On Wed, Aug 24, 2016 at 11:10 PM, Andrew David Wong <
> > > > > a...@qubes-os.org>
> > > > > > >> > wrote:
> > > > > > >> >
> > > > > > >> >>
> > > > > > >> >> On 2016-08-15 14:43, IX4 Svs wrote:
> > > > > > >> >>> On Mon, Aug 15, 2016 at 10:19 AM, Andrew David Wong <
> > > > > a...@qubes-os.org
> > > > > > >> >
> > > > > > >> >>> wrote:
> > > > > > >> >>>
> > > > > > >> >>>>
> > > > > > >> >>>> On 2016-08-14 15:22, IX4 Svs wrote:
> > > > > > >> >>>>> Just spent a few minutes to figure this out so I
> thought I'd
> > > > > > >> >>>>> share.
> > > > > > >> >>>>>
> > > > > > >> >>>>
> > > > > > >> >>>> Thanks, Alex! Would you mind if we added this to the
> docs at
> > > some
> > > > > > >> >>>> point?
> > > > > > >> >>>>
> > > > > > >> >>>>
> > > > > > >> >>> Not at all - especially if you improve my clumsy way of
> > > creating
> > > > > the
> > > > > > >> >> custom
> > > > > > >> >>> shortcut (steps 7-12) and use the proper Qubes way that
> > > Nicklaus
> > > > > > >> >>> linked to.
> > > > > > >> >>>
> > > > > > >> >>> Cheers,
> > > > > > >> >>>
> > > > > > >> >>> Alex
> > > > > > >> >>>
> > > > > > >> >>
> > > > > > >> >> Added:
> > > > > > >> >>
> > > > > > >> >> https://www.qubes-os.org/doc/signal/
> > > > > > >> >>
> > > > > > >> >>
> > > > > > >> > Andrew, thanks for adding this to the documentation.
> > > > > > >> >
> > > > > > >> > I'm afraid my DIY shortcut kludge does not survive
> > > some(potentially
> > > > > boot
> > > > > > >> > time) script and is wiped away from the taskbar, only to be
> > > > > replaced by
> > > > > > >> a
> > > > > > >> > default "Chrome browser" shortcut. I admit I don't quite
> > > comprehend
> > > > > what
> > > > > > >> > the actual implementation of
> > > > > > >> > https://www.qubes-os.org/doc/managing-appvm-shortcuts/#
> > > > > tocAnchor-1-1-1
> > > > > > >> > should be.
> > > > > > >>
> > > > > > >> Neither do I. I've alway

Re: [qubes-users] installing Signal on Qubes mini-HOWTO

2016-09-18 Thread IX4 Svs
On Sat, Sep 17, 2016 at 11:41 PM, Marek Marczykowski-Górecki <
marma...@invisiblethingslab.com> wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On Sat, Sep 17, 2016 at 03:52:17PM +0100, IX4 Svs wrote:
> > On Wed, Sep 14, 2016 at 9:26 AM, Marek Marczykowski-Górecki <
> > marma...@invisiblethingslab.com> wrote:
> >
> > > -BEGIN PGP SIGNED MESSAGE-
> > > Hash: SHA256
> > >
> > > On Wed, Sep 07, 2016 at 11:38:55PM +0100, IX4 Svs wrote:
> > > > On Thu, Sep 1, 2016 at 8:41 AM, IX4 Svs <ix4...@gmail.com> wrote:
> > > >
> > > > > On Thu, Sep 1, 2016 at 2:21 AM, Andrew David Wong <
> a...@qubes-os.org>
> > > > > wrote:
> > > > >
> > > > >> -BEGIN PGP SIGNED MESSAGE-
> > > > >> Hash: SHA512
> > > > >>
> > > > >> On 2016-08-31 15:50, IX4 Svs wrote:
> > > > >> > On Wed, Aug 24, 2016 at 11:10 PM, Andrew David Wong <
> > > a...@qubes-os.org>
> > > > >> > wrote:
> > > > >> >
> > > > >> >>
> > > > >> >> On 2016-08-15 14:43, IX4 Svs wrote:
> > > > >> >>> On Mon, Aug 15, 2016 at 10:19 AM, Andrew David Wong <
> > > a...@qubes-os.org
> > > > >> >
> > > > >> >>> wrote:
> > > > >> >>>
> > > > >> >>>>
> > > > >> >>>> On 2016-08-14 15:22, IX4 Svs wrote:
> > > > >> >>>>> Just spent a few minutes to figure this out so I thought I'd
> > > > >> >>>>> share.
> > > > >> >>>>>
> > > > >> >>>>
> > > > >> >>>> Thanks, Alex! Would you mind if we added this to the docs at
> some
> > > > >> >>>> point?
> > > > >> >>>>
> > > > >> >>>>
> > > > >> >>> Not at all - especially if you improve my clumsy way of
> creating
> > > the
> > > > >> >> custom
> > > > >> >>> shortcut (steps 7-12) and use the proper Qubes way that
> Nicklaus
> > > > >> >>> linked to.
> > > > >> >>>
> > > > >> >>> Cheers,
> > > > >> >>>
> > > > >> >>> Alex
> > > > >> >>>
> > > > >> >>
> > > > >> >> Added:
> > > > >> >>
> > > > >> >> https://www.qubes-os.org/doc/signal/
> > > > >> >>
> > > > >> >>
> > > > >> > Andrew, thanks for adding this to the documentation.
> > > > >> >
> > > > >> > I'm afraid my DIY shortcut kludge does not survive
> some(potentially
> > > boot
> > > > >> > time) script and is wiped away from the taskbar, only to be
> > > replaced by
> > > > >> a
> > > > >> > default "Chrome browser" shortcut. I admit I don't quite
> comprehend
> > > what
> > > > >> > the actual implementation of
> > > > >> > https://www.qubes-os.org/doc/managing-appvm-shortcuts/#
> > > tocAnchor-1-1-1
> > > > >> > should be.
> > > > >>
> > > > >> Neither do I. I've always make my custom shortcuts the same
> general
> > > way
> > > > >> you do.
> > > > >>
> > > > >>
> > > > > Ah, we have a usability issue here then.
> > > > >
> > > > >
> > > > >> > A worked example that replaces all but the first step of the "
> > > Creating
> > > > >> a
> > > > >> > Shortcut in KDE" section of https://www.qubes-os.org/doc/
> signal/
> > > would
> > > > >> be
> > > > >> > very much welcome.
> > > > >> >
> > > > >>
> > > > >> Agreed.
> > > > >>
> > > > >
> > > > > Can someone who has figured out how to create one-click buttons to
> > > launch
> > > > > arbitrary applications in AppVMs chime in with an example please?
> I'll
> > > then
> > > &g

Re: [qubes-users] installing Signal on Qubes mini-HOWTO

2016-09-17 Thread IX4 Svs
On Wed, Sep 14, 2016 at 9:26 AM, Marek Marczykowski-Górecki <
marma...@invisiblethingslab.com> wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On Wed, Sep 07, 2016 at 11:38:55PM +0100, IX4 Svs wrote:
> > On Thu, Sep 1, 2016 at 8:41 AM, IX4 Svs <ix4...@gmail.com> wrote:
> >
> > > On Thu, Sep 1, 2016 at 2:21 AM, Andrew David Wong <a...@qubes-os.org>
> > > wrote:
> > >
> > >> -BEGIN PGP SIGNED MESSAGE-
> > >> Hash: SHA512
> > >>
> > >> On 2016-08-31 15:50, IX4 Svs wrote:
> > >> > On Wed, Aug 24, 2016 at 11:10 PM, Andrew David Wong <
> a...@qubes-os.org>
> > >> > wrote:
> > >> >
> > >> >>
> > >> >> On 2016-08-15 14:43, IX4 Svs wrote:
> > >> >>> On Mon, Aug 15, 2016 at 10:19 AM, Andrew David Wong <
> a...@qubes-os.org
> > >> >
> > >> >>> wrote:
> > >> >>>
> > >> >>>>
> > >> >>>> On 2016-08-14 15:22, IX4 Svs wrote:
> > >> >>>>> Just spent a few minutes to figure this out so I thought I'd
> > >> >>>>> share.
> > >> >>>>>
> > >> >>>>
> > >> >>>> Thanks, Alex! Would you mind if we added this to the docs at some
> > >> >>>> point?
> > >> >>>>
> > >> >>>>
> > >> >>> Not at all - especially if you improve my clumsy way of creating
> the
> > >> >> custom
> > >> >>> shortcut (steps 7-12) and use the proper Qubes way that Nicklaus
> > >> >>> linked to.
> > >> >>>
> > >> >>> Cheers,
> > >> >>>
> > >> >>> Alex
> > >> >>>
> > >> >>
> > >> >> Added:
> > >> >>
> > >> >> https://www.qubes-os.org/doc/signal/
> > >> >>
> > >> >>
> > >> > Andrew, thanks for adding this to the documentation.
> > >> >
> > >> > I'm afraid my DIY shortcut kludge does not survive some(potentially
> boot
> > >> > time) script and is wiped away from the taskbar, only to be
> replaced by
> > >> a
> > >> > default "Chrome browser" shortcut. I admit I don't quite comprehend
> what
> > >> > the actual implementation of
> > >> > https://www.qubes-os.org/doc/managing-appvm-shortcuts/#
> tocAnchor-1-1-1
> > >> > should be.
> > >>
> > >> Neither do I. I've always make my custom shortcuts the same general
> way
> > >> you do.
> > >>
> > >>
> > > Ah, we have a usability issue here then.
> > >
> > >
> > >> > A worked example that replaces all but the first step of the "
> Creating
> > >> a
> > >> > Shortcut in KDE" section of https://www.qubes-os.org/doc/signal/
> would
> > >> be
> > >> > very much welcome.
> > >> >
> > >>
> > >> Agreed.
> > >>
> > >
> > > Can someone who has figured out how to create one-click buttons to
> launch
> > > arbitrary applications in AppVMs chime in with an example please? I'll
> then
> > > test it and Andrew can stick it in the wiki for all Qubes users to
> benefit.
> > >
> >
> > I had a look myself and may have figured out the "proper" way of
> creating a
> > shortcut to launch Signal. By the way I submitted a pull request for the
> > documentation at https://www.qubes-os.org/doc/m
> > anaging-appvm-shortcuts/#tocAnchor-1-1-1 because its language is
> slightly
> > inaccurate.
> >
> > These instructions (after verification) should replace the shortcut
> kludge
> > of the signal page you created:
> >
> > My Signal AppVM uses the fedora-23 template, and I have renamed the
> > .desktop file that Chrome created on that AppVM's desktop to
> > signal.desktop. Now what?
> >
> > 1. Open a dom0 terminal, cd to /var/lib/qubes/vm-templates/fedora-23/
> > 2. Copy Signal:/home/user/Desktop/signal.desktop to
> > dom0:/var/lib/qubes/vm-templates/fedora-23/apps.templates/signal.desktop
> > 3. Lightly edit
> > dom0:/var/lib/qubes/vm-templates/fedora-23/apps.templates/signal.desktop
> to
> > be as follows:
> >
> > [Desktop Entry

Re: [qubes-users] installing Signal on Qubes mini-HOWTO

2016-09-13 Thread IX4 Svs
On Wed, Sep 7, 2016 at 11:38 PM, IX4 Svs <ix4...@gmail.com> wrote:

> On Thu, Sep 1, 2016 at 8:41 AM, IX4 Svs <ix4...@gmail.com> wrote:
>
>> On Thu, Sep 1, 2016 at 2:21 AM, Andrew David Wong <a...@qubes-os.org>
>> wrote:
>>
>>> -BEGIN PGP SIGNED MESSAGE-----
>>> Hash: SHA512
>>>
>>> On 2016-08-31 15:50, IX4 Svs wrote:
>>> > On Wed, Aug 24, 2016 at 11:10 PM, Andrew David Wong <a...@qubes-os.org>
>>> > wrote:
>>> >
>>> >>
>>> >> On 2016-08-15 14:43, IX4 Svs wrote:
>>> >>> On Mon, Aug 15, 2016 at 10:19 AM, Andrew David Wong <
>>> a...@qubes-os.org>
>>> >>> wrote:
>>> >>>
>>> >>>>
>>> >>>> On 2016-08-14 15:22, IX4 Svs wrote:
>>> >>>>> Just spent a few minutes to figure this out so I thought I'd
>>> >>>>> share.
>>> >>>>>
>>> >>>>
>>> >>>> Thanks, Alex! Would you mind if we added this to the docs at some
>>> >>>> point?
>>> >>>>
>>> >>>>
>>> >>> Not at all - especially if you improve my clumsy way of creating the
>>> >> custom
>>> >>> shortcut (steps 7-12) and use the proper Qubes way that Nicklaus
>>> >>> linked to.
>>> >>>
>>> >>> Cheers,
>>> >>>
>>> >>> Alex
>>> >>>
>>> >>
>>> >> Added:
>>> >>
>>> >> https://www.qubes-os.org/doc/signal/
>>> >>
>>> >>
>>> > Andrew, thanks for adding this to the documentation.
>>> >
>>> > I'm afraid my DIY shortcut kludge does not survive some(potentially
>>> boot
>>> > time) script and is wiped away from the taskbar, only to be replaced
>>> by a
>>> > default "Chrome browser" shortcut. I admit I don't quite comprehend
>>> what
>>> > the actual implementation of
>>> > https://www.qubes-os.org/doc/managing-appvm-shortcuts/#tocAnchor-1-1-1
>>> > should be.
>>>
>>> Neither do I. I've always make my custom shortcuts the same general way
>>> you do.
>>>
>>>
>> Ah, we have a usability issue here then.
>>
>>
>>> > A worked example that replaces all but the first step of the "
>>> Creating a
>>> > Shortcut in KDE" section of https://www.qubes-os.org/doc/signal/
>>> would be
>>> > very much welcome.
>>> >
>>>
>>> Agreed.
>>>
>>
>> Can someone who has figured out how to create one-click buttons to launch
>> arbitrary applications in AppVMs chime in with an example please? I'll then
>> test it and Andrew can stick it in the wiki for all Qubes users to benefit.
>>
>
> I had a look myself and may have figured out the "proper" way of creating
> a shortcut to launch Signal. By the way I submitted a pull request for the
> documentation at https://www.qubes-os.org/doc/m
> anaging-appvm-shortcuts/#tocAnchor-1-1-1 because its language is slightly
> inaccurate.
>
> These instructions (after verification) should replace the shortcut kludge
> of the signal page you created:
>
> My Signal AppVM uses the fedora-23 template, and I have renamed the
> .desktop file that Chrome created on that AppVM's desktop to
> signal.desktop. Now what?
>
> 1. Open a dom0 terminal, cd to /var/lib/qubes/vm-templates/fedora-23/
> 2. Copy Signal:/home/user/Desktop/signal.desktop to
> dom0:/var/lib/qubes/vm-templates/fedora-23/apps.templates/signal.desktop
> 3. Lightly edit 
> dom0:/var/lib/qubes/vm-templates/fedora-23/apps.templates/signal.desktop
> to be as follows:
>
> [Desktop Entry]
> Version=1.0
> Type=Application
> Terminal=false
> X-Qubes-VmName=%VMNAME%
> Icon=%VMDIR%/apps.icons/signal.png
> Name=%VMNAME%: Signal Private Messenger
> GenericName=%VMNAME%: Signal
> Comment=Private Instant Messenger
> Exec=qvm-run -q --tray -a %VMNAME% -- 'qubes-desktop-run
> /home/user/Desktop/Signal.desktop'
>
> 4. Copy Signal:/rw/home/user/.local/share/icons/hicolor/48x48/
> apps/chrome--Default.png
>  to dom0:/var/lib/qubes/vm-templates/fedora-23/apps.
> templates/apps.icons/signal.png
>
> 5. Copy dom0:/var/lib/qubes/vm-templates/fedora-23/apps.
> templates/apps.icons/signal.png to dom0:/var/lib/qubes/vm-
> templates/fedora-23/apps.templates/apps.tempicons/signal.png
>
> 6. At this point 

Re: [qubes-users] installing Signal on Qubes mini-HOWTO

2016-09-07 Thread IX4 Svs
On Thu, Sep 1, 2016 at 8:41 AM, IX4 Svs <ix4...@gmail.com> wrote:

> On Thu, Sep 1, 2016 at 2:21 AM, Andrew David Wong <a...@qubes-os.org>
> wrote:
>
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA512
>>
>> On 2016-08-31 15:50, IX4 Svs wrote:
>> > On Wed, Aug 24, 2016 at 11:10 PM, Andrew David Wong <a...@qubes-os.org>
>> > wrote:
>> >
>> >>
>> >> On 2016-08-15 14:43, IX4 Svs wrote:
>> >>> On Mon, Aug 15, 2016 at 10:19 AM, Andrew David Wong <a...@qubes-os.org
>> >
>> >>> wrote:
>> >>>
>> >>>>
>> >>>> On 2016-08-14 15:22, IX4 Svs wrote:
>> >>>>> Just spent a few minutes to figure this out so I thought I'd
>> >>>>> share.
>> >>>>>
>> >>>>
>> >>>> Thanks, Alex! Would you mind if we added this to the docs at some
>> >>>> point?
>> >>>>
>> >>>>
>> >>> Not at all - especially if you improve my clumsy way of creating the
>> >> custom
>> >>> shortcut (steps 7-12) and use the proper Qubes way that Nicklaus
>> >>> linked to.
>> >>>
>> >>> Cheers,
>> >>>
>> >>> Alex
>> >>>
>> >>
>> >> Added:
>> >>
>> >> https://www.qubes-os.org/doc/signal/
>> >>
>> >>
>> > Andrew, thanks for adding this to the documentation.
>> >
>> > I'm afraid my DIY shortcut kludge does not survive some(potentially boot
>> > time) script and is wiped away from the taskbar, only to be replaced by
>> a
>> > default "Chrome browser" shortcut. I admit I don't quite comprehend what
>> > the actual implementation of
>> > https://www.qubes-os.org/doc/managing-appvm-shortcuts/#tocAnchor-1-1-1
>> > should be.
>>
>> Neither do I. I've always make my custom shortcuts the same general way
>> you do.
>>
>>
> Ah, we have a usability issue here then.
>
>
>> > A worked example that replaces all but the first step of the " Creating
>> a
>> > Shortcut in KDE" section of https://www.qubes-os.org/doc/signal/ would
>> be
>> > very much welcome.
>> >
>>
>> Agreed.
>>
>
> Can someone who has figured out how to create one-click buttons to launch
> arbitrary applications in AppVMs chime in with an example please? I'll then
> test it and Andrew can stick it in the wiki for all Qubes users to benefit.
>

I had a look myself and may have figured out the "proper" way of creating a
shortcut to launch Signal. By the way I submitted a pull request for the
documentation at https://www.qubes-os.org/doc/m
anaging-appvm-shortcuts/#tocAnchor-1-1-1 because its language is slightly
inaccurate.

These instructions (after verification) should replace the shortcut kludge
of the signal page you created:

My Signal AppVM uses the fedora-23 template, and I have renamed the
.desktop file that Chrome created on that AppVM's desktop to
signal.desktop. Now what?

1. Open a dom0 terminal, cd to /var/lib/qubes/vm-templates/fedora-23/
2. Copy Signal:/home/user/Desktop/signal.desktop to
dom0:/var/lib/qubes/vm-templates/fedora-23/apps.templates/signal.desktop
3. Lightly edit
dom0:/var/lib/qubes/vm-templates/fedora-23/apps.templates/signal.desktop to
be as follows:

[Desktop Entry]
Version=1.0
Type=Application
Terminal=false
X-Qubes-VmName=%VMNAME%
Icon=%VMDIR%/apps.icons/signal.png
Name=%VMNAME%: Signal Private Messenger
GenericName=%VMNAME%: Signal
Comment=Private Instant Messenger
Exec=qvm-run -q --tray -a %VMNAME% -- 'qubes-desktop-run
/home/user/Desktop/Signal.desktop'

4. Copy
Signal:/rw/home/user/.local/share/icons/hicolor/48x48/apps/chrome--Default.png
 to
dom0:/var/lib/qubes/vm-templates/fedora-23/apps.templates/apps.icons/signal.png

5. Copy
dom0:/var/lib/qubes/vm-templates/fedora-23/apps.templates/apps.icons/signal.png
to
dom0:/var/lib/qubes/vm-templates/fedora-23/apps.templates/apps.tempicons/signal.png

6. At this point you should be all set. Ensure Qubes knows about the new
menu item you created by starting the fedora-23 template VM and then
running in a dom0 terminal: qvm-sync-appmenus fedora-23

7. You should now be able to go back to the GUI and from the Q menu: Q ->
Domain: Signal -> Signal: Add more shortcuts...
In the window that will appear, you should now have "Signal Private
Messenger" on the left list of available apps. I moved this to the
"Selected" list and hit OK, which put the entry in my Q menu.

8. Then I went to Q -> Domain: Signal. I right-clicked on "Signal:Signal
Private Messenger" and selected "Add to panel".

9. Success! I now have a button in my KDE panel with which I can launch
Signal with one click.

Hope these steps get documented in the wiki (I'm not attempting a direct
edit lest I break something) and are helpful to people.

Alex

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAEe-%3DTdMYk_L7jtL%3DMYa6uVjV5gQqpgV%2Bz64WVsCseenBS%3DiEg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] installing Signal on Qubes mini-HOWTO

2016-09-01 Thread IX4 Svs
On Thu, Sep 1, 2016 at 2:21 AM, Andrew David Wong <a...@qubes-os.org> wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-08-31 15:50, IX4 Svs wrote:
> > On Wed, Aug 24, 2016 at 11:10 PM, Andrew David Wong <a...@qubes-os.org>
> > wrote:
> >
> >>
> >> On 2016-08-15 14:43, IX4 Svs wrote:
> >>> On Mon, Aug 15, 2016 at 10:19 AM, Andrew David Wong <a...@qubes-os.org>
> >>> wrote:
> >>>
> >>>>
> >>>> On 2016-08-14 15:22, IX4 Svs wrote:
> >>>>> Just spent a few minutes to figure this out so I thought I'd
> >>>>> share.
> >>>>>
> >>>>
> >>>> Thanks, Alex! Would you mind if we added this to the docs at some
> >>>> point?
> >>>>
> >>>>
> >>> Not at all - especially if you improve my clumsy way of creating the
> >> custom
> >>> shortcut (steps 7-12) and use the proper Qubes way that Nicklaus
> >>> linked to.
> >>>
> >>> Cheers,
> >>>
> >>> Alex
> >>>
> >>
> >> Added:
> >>
> >> https://www.qubes-os.org/doc/signal/
> >>
> >>
> > Andrew, thanks for adding this to the documentation.
> >
> > I'm afraid my DIY shortcut kludge does not survive some(potentially boot
> > time) script and is wiped away from the taskbar, only to be replaced by a
> > default "Chrome browser" shortcut. I admit I don't quite comprehend what
> > the actual implementation of
> > https://www.qubes-os.org/doc/managing-appvm-shortcuts/#tocAnchor-1-1-1
> > should be.
>
> Neither do I. I've always make my custom shortcuts the same general way
> you do.
>
>
Ah, we have a usability issue here then.


> > A worked example that replaces all but the first step of the " Creating a
> > Shortcut in KDE" section of https://www.qubes-os.org/doc/signal/ would
> be
> > very much welcome.
> >
>
> Agreed.
>

Can someone who has figured out how to create one-click buttons to launch
arbitrary applications in AppVMs chime in with an example please? I'll then
test it and Andrew can stick it in the wiki for all Qubes users to benefit.

Thanks,

Alex

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAEe-%3DTecrTrJ20i73xC2nQFqcnGY17fPNuNR1Xs0A%3Dern2FeoA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] installing Signal on Qubes mini-HOWTO

2016-08-31 Thread IX4 Svs
On Wed, Aug 24, 2016 at 11:10 PM, Andrew David Wong <a...@qubes-os.org>
wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-08-15 14:43, IX4 Svs wrote:
> > On Mon, Aug 15, 2016 at 10:19 AM, Andrew David Wong <a...@qubes-os.org>
> > wrote:
> >
> >> -BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
> >>
> >> On 2016-08-14 15:22, IX4 Svs wrote:
> >>> Just spent a few minutes to figure this out so I thought I'd share.
> >>>
> >>
> >> Thanks, Alex! Would you mind if we added this to the docs at some point?
> >>
> >>
> > Not at all - especially if you improve my clumsy way of creating the
> custom
> > shortcut (steps 7-12) and use the proper Qubes way that Nicklaus linked
> > to.
> >
> > Cheers,
> >
> > Alex
> >
>
> Added:
>
> https://www.qubes-os.org/doc/signal/
>
>
Andrew, thanks for adding this to the documentation.

I'm afraid my DIY shortcut kludge does not survive some(potentially boot
time) script and is wiped away from the taskbar, only to be replaced by a
default "Chrome browser" shortcut. I admit I don't quite comprehend what
the actual implementation of
https://www.qubes-os.org/doc/managing-appvm-shortcuts/#tocAnchor-1-1-1
should be. A worked example that replaces all but the first step of the "
Creating a Shortcut in KDE" section of https://www.qubes-os.org/doc/signal/
would be very much welcome.

Cheers,

Alex

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAEe-%3DTc-35h1cHsr5kW7cXd_o6M3_Q_4qH0SfK%2B_nHL5O9d%3Deg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Current Windows instructions?

2016-08-15 Thread IX4 Svs
Hello

The instructions over at https://www.qubes-os.org/doc/hvm/ still say:

==
Using Template-based HVM domains

TODO (Coming in Qubes R2 beta 3).
==

What is the current authoritative source for instructions on building
template-based Windows VMs?

Thanks,

Alex

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAEe-%3DTekro91ePSstfYCdiAtzOSC4BLovV1JsXqPXNA7v3E5Bw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: installing Signal on Qubes mini-HOWTO

2016-08-15 Thread IX4 Svs
On Mon, Aug 15, 2016 at 11:43 AM, pixel fairy  wrote:

> On Sunday, August 14, 2016 at 3:22:30 PM UTC-7, Alex wrote:
> ...
> > 1. Install the Chromium browser in your appvm template - skip if you
> were already using it. Shut down the template VM.
>
> I keep wondering how safe chromium browser is. do redhat or debian track
> updates in time with google-chrome?
>

For this specific use case (Signal), there is currently no other option -
Chromium is the only way of getting Signal to work on Qubes. I only use
Chromium to host the Signal app and Firefox as my mainstream browser for
everything else.

If you're wondering in general how well distributions track the Chromium
OSS project, I suspect the answer is "very well", but refer to
distro-specific release notes to check for yourself. Note that Google
Chrome is the Google-branded "stable" release of the Chromium OSS project,
so asking whether distributions track updates "in time with Chrome" doesn't
make much sense. See https://en.wikipedia.org/wiki/Chromium_(web_browser)
for more.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAEe-%3DTfaLZ8%2BG0sDT8FFLsvY4d8smXAUsyOC6y4Wd8ux3yKsFw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] installing Signal on Qubes mini-HOWTO

2016-08-15 Thread IX4 Svs
On Mon, Aug 15, 2016 at 10:19 AM, Andrew David Wong <a...@qubes-os.org>
wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-08-14 15:22, IX4 Svs wrote:
> > Just spent a few minutes to figure this out so I thought I'd share.
> >
>
> Thanks, Alex! Would you mind if we added this to the docs at some point?
>
>
Not at all - especially if you improve my clumsy way of creating the custom
shortcut (steps 7-12) and use the proper Qubes way that Nicklaus linked to.

Cheers,

Alex

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAEe-%3DTctf_hjWZx_CbP_1EshFfk7J9FZ%3DWZgwQ3ks0TK5tV03A%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] installing Signal on Qubes mini-HOWTO

2016-08-14 Thread IX4 Svs
Just spent a few minutes to figure this out so I thought I'd share.

If you're a Signal user on Android, you can now have Signal inside Qubes.
Here's how I did it:

1. Install the Chromium browser in your appvm template - skip if you were
already using it. Shut down the template VM.
2. Create a new AppVM called Signal
3. Launch Chromium browser in new VM, go to chrome://extensions/ in the
address bar and follow the link to the Chrome app store.
4. In the app store, search for "Signal private messenger" and install the
app.
5. The app launches automatically on first install. Follow the prompts to
"link" this app with your phone.
6. At this stage Signal should work on your Qubes system.

Let's make Signal a bit more usable by creating a shortcut in our desktop
panel that launches Signal directly. (this assumes KDE desktop on Dom0)

7. Create a Chromium shortcut using the Qubes way (Q -> Domain: Signal ->
Signal: Add more shortcuts... -> Select "Chromium web browser")
8. Follow
http://support.whispersystems.org/hc/en-us/articles/216839277-Where-is-Signal-Desktop-on-my-computer-
to create a desktop shortcut
9. Right-click on Chromium icon in panel, select "Icon Settings"
10. Change the "Command" field of the "Application" tab to: qvm-run -a
--tray Signal '/usr/lib64/chromium-browser/chromium-browser.sh
--profile-directory=Default --app-id=(long string which you'll get from the
properties of the desktop shortcut you created in step #7)'
11. Copy the Signal app icon file from the Signal AppVM to Dom0. I used the
following command to copy the icon file to Dom0: [user@dom0]$ qvm-run
--pass-io Signal 'cat
/home/user/.local/share/icons/hicolor/48x48/apps/chrome-(long-appID)-Default.png'
> /home/users/signal-icon.png
12. Now you can change your new shortcut's icon from Chrome to Signal, by
pointing it to /home/users/signal-icon.png

If anyone has a better way of creating a custom panel shortcut I'd love to
hear it.

Cheers,

Alex

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAEe-%3DTfaS67HUkT%2BZdMswPYqay6ttfSOktr6XwxxfnNytrbCRQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Opening links in your preferred AppVM

2016-06-23 Thread IX4 Svs
On Thu, Jun 23, 2016 at 2:51 AM,  wrote:

> On Wednesday, June 22, 2016 at 2:38:22 PM UTC-4, Micah Lee wrote:
> > I published a quick blog post explaining how I do this:
> >
> >
> https://micahflee.com/2016/06/qubes-tip-opening-links-in-your-preferred-appvm/
>
> cool! thanks!
>

Nice and simple. Thanks for sharing.

Alex

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAEe-%3DTekQ-VZMZ-CfSSyjRYjgvyeWJjkYV0ZG7kUbj2vHKkMbQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Firefox profile seems to leak between DispVMs

2016-06-19 Thread IX4 Svs
On Sun, Jun 19, 2016 at 3:05 PM, Andrew David Wong <a...@qubes-os.org> wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-06-18 14:54, IX4 Svs wrote:
> > Qubes R3.1, Fedora 23 template, fully updated.
> >
> > I launch a new disposable Firefox, which creates a new DispVM and
> > displays [disp42] in the Firefox window title. All normal so far.
> >
> > I hit CTRL+t to open a new Firefox tab and - I can't believe my
> > eyes - the "new tab" page is full of thumbnails of web pages I have
> > visited in other DispVMs, which have long been shut down.
> >
> > sudo xl list from dom0 confirms disp42 is the only DispVM currently
> > running.
> >
> > How can such data leakage from one DispVM to another be possible?
> > Yes, I am adamant, 100% certain that I have not visited the web
> > sites showing up in the "new tab" page from the TemplateVM that my
> > DispVM is based upon.
> >
> > Any thoughts?
> >
> > Thanks,
> >
> > Alex
> >
>
> Does it persist even after you regenerate the DVM template?
>
> $ qvm-create-default-dvm --default-template
>
> - --
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> -BEGIN PGP SIGNATURE-
>
> iQIbBAEBCgAGBQJXZqaPAAoJENtN07w5UDAw1q4P93qCkIHgR9tuHihwKjt7nhIZ
> TbW4kErvpKEIyUKxCIXlb8J2Chv+NoEv4oYGwjqnaWIMcQaa4kODZOtxm75IKJft
> AHNg+SOWgUqSLvQ8f2dd0Z7E/8kz8xo0svdoiK/OOMD1g38DUCw6S0/jofFfiDUo
> I0y9skQW/i/0OBNEyqX9qNl6IjMM+pIlfp5hTV5xqgw7P1Bxli1UlmJC7lxdjxjA
> Bw94PMewThF+pnpteQMpmEGlGNlY5eHTgQTPzDppEq0G2M9k1rJaJ2QaUY/GlqMc
> k3UCk7AHlA9TZFclAfXYxEvNgdZ8mstb1VnA2AXi4M9b0V/23Y9MZ7RyAgXA1VnA
> x6Ca5d4LK+PDN3ElT1g1SX+6NL+CbkbckKMt0pKhfFi8twyiLotbD9BvChQwlFFS
> dz85/1MrLepLpAQ2JuDHGU/KkThnUyX+vKgNZFk6zslBZe7iOBEYBgq7Z2Wpwm3G
> l1qb91FBNiC9nQ0XY7cBRj5+btqM9BvY7VhujpiUqOyBjLZu17mcw28XqzdLjn6Q
> aIQICm0Fi1sUgY45XYNzyp/FSIPj7X2ZaVwm2ZS91UGwvXPQNPglFOz+UjvFJR3X
> C0dqnqqO1o78fU8uH98pfrO/4bvZMxbUMgqM70RhtaSs6heoMpRDQtVSnYggW+fH
> fZbyHqC3wVsV21kfILw=
> =U5LR
> -END PGP SIGNATURE-
>
>
I have not tried the nuclear option - I was hoping to find the cause of
such a massive leak now that it's happening so that it can be fixed for all
Qubes users. What logs would I need to look into? Should I start a DispVM
in debug mode from dom0's terminal and look at the console output?
/var/log/xen/console/guest-disp43.log interestingly says:

[   18.935022] xen:grant_table: Grant tables using version 1 layout
[   18.935022] Using NULL legacy PIC
[   18.935022] PM: noirq restore of devices complete after 0.071 msecs
[   18.935022] PM: early restore of devices complete after 0.040 msecs
[   18.962927] PM: restore of devices complete after 24.821 msecs
[   18.962977] Restarting tasks ... done.
[   19.046997] Setting capacity to 20971520
[   19.260713] EXT4-fs error (device dm-0): ext4_mb_generate_buddy:757:
group 49, block bitmap and bg descriptor inconsistent: 2 vs 1 free clusters
[   19.260915] EXT4-fs error (device dm-0): ext4_mb_generate_buddy:757:
group 50, block bitmap and bg descriptor inconsistent: 1611 vs 1612 free
clusters
[   19.261198] JBD2: Spotted dirty metadata buffer (dev = dm-0, blocknr =
0). There's a risk of filesystem corruption in case of system crash.
[   19.648563] EXT4-fs error (device dm-0): ext4_lookup:1588: inode #927:
comm cupsd: deleted inode referenced: 647
[   50.944638] EXT4-fs error (device dm-0): ext4_lookup:1588: inode #927:
comm cupsd: deleted inode referenced: 647
[  308.780561] EXT4-fs error (device dm-0): ext4_lookup:1588: inode
#524291: comm dnf: deleted inode referenced: 524305

..but I can't think of how filesystem corruption would lead to data leaking
between DispVMs.

Alex

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAEe-%3DTdrWCrY3ax0UiU6nnhvxGoD096hN3zfx72ORLBkbkJd9g%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Firefox profile seems to leak between DispVMs

2016-06-18 Thread IX4 Svs
Qubes R3.1, Fedora 23 template, fully updated.

I launch a new disposable Firefox, which creates a new DispVM and displays
[disp42] in the Firefox window title. All normal so far.

I hit CTRL+t to open a new Firefox tab and - I can't believe my eyes - the
"new tab" page is full of thumbnails of web pages I have visited in other
DispVMs, which have long been shut down.

sudo xl list from dom0 confirms disp42 is the only DispVM currently running.

How can such data leakage from one DispVM to another be possible? Yes, I am
adamant, 100% certain that I have not visited the web sites showing up in
the "new tab" page from the TemplateVM that my DispVM is based upon.

Any thoughts?

Thanks,

Alex

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAEe-%3DTfuLgycUJS8MJXvDD8ASfO49YnL%2BU%3DS6Uh0ggDT%2BD8qRQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.