--
Regards,
Thomas Blackwood
PGP key fingerprint = C2FE 7FA6 96CB 0172 FCB3 473F 7CC9 5672 B740 5E70
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
Qubes 3.2 with TPM, TXT, and VT-d enabled.
Function keys work out of the box.
Wireless network doesn't resume properly after suspend and on wake the
sys-net VM often crashes, requiring shutting down all VMs depending on
network and starting them again in correct order.
Otherwise very
for all your efforts on this badass platform!
--
Take care,
Tom Marciniak
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@google
ves qrexec-daemon running in dom0.
Just like bash does the replacement before it forwards the command-line.
Again, if you do not do the variable replacement there, but instead pass it
through unvalidated and unrelated software, you are going to continue having
security flaws.
--
Tom Zander
Blog: ht
. “$adminvm” doesn't end up being the string you offer to qubesd,
the string “dom0” is.
Likewise; you don't start a service in Dispvm18431 and send it the text
“$dispvm”.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this m
..
Anyway, to answer your fear.
No. UTF-8 doesn't allow 0xFF, it will just tell you the stream is broken.
(see attached example file) Or, more likely, it will just switch off utf-8.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this
On Tuesday, 20 February 2018 14:04:03 CET Wojtek Porczyk wrote:
> On Tue, Feb 20, 2018 at 01:21:30PM +0100, 'Tom Zander' via qubes-devel
wrote:
> > On Tuesday, 20 February 2018 01:49:37 CET Marek Marczykowski-Górecki
wrote:
> > > We've decided to deprecate the '$' character f
orrectly
notices I have a sys-usb and I used it to browse to the directory there to
do the backup. All that worked fine.
Until I pressed the final button to start the backup, it just failed saying
it could not find the directory...
I ended up giving up on doing a backup.
--
Tom Zander
Blog: https://za
and working.
You just can t actually “run” anything on it. The reasons seems to be that
there is some magic thing that starts when you log into xfce4, and only
xfce4.
See the screenshot attached elsewhere in this thread of qubes manager dying
on startup due to the same issue.
Tested on Rc4.
-
I would say that simpler is better, or least surprises is
better. The current design where any appvm gets those complex firewall rules
is a bug. Only VMs that expose their network (providing) should run it.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochann
led as-is, it assumes people
already know the actual setup of the qubes firewall ruleset. I don't, thats
why I went to that page.
> Tom has built a Qubes Controller (manager) based on the 4.0 code and went
> so far as to add in library package so other coding can be used to build.
> He has bee
elease_candidate
Release candidates are, like the word describes, not made unless the
developers are thinking that its ready to release but needs more real-world
testing to make sure.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You recei
On Sunday, 4 February 2018 21:00:55 CET 'awokd' via qubes-users wrote:
> Working on it (where other contributors haven't already)! Am about halfway
> through now.
Sweet!
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You re
ll the Qubes Controller and use it. That can then be submitted to
> be added to the Qubes 4.0 Docs.
Awesome!
You should be able to get a lot of detials from this;
https://github.com/QubesController/qubes-api-cpp-lib/blob/master/Install.md
--
Tom Zander
Blog: https://zander.github.io
Vlog: ht
On Monday, 5 February 2018 02:33:02 CET Unman wrote:
> You are, of
> course, free to rewrite Qubes and its components in a language you're
> comfortable with.
Don't be so dramatic, I m not suggesting any such thing.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com
On Monday, 5 February 2018 00:55:34 CET Unman wrote:
> On Sun, Feb 04, 2018 at 08:14:57PM +0100, 'Tom Zander' via qubes-users
wrote:
> > * Having nothing but python APIs for your operating system is something
> > that makes no sense. Python was never meant for serve
Controller" using the new APis.
I'm open to adding anyone to the approved committers list that wants to work
on it.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Group
Got Q installed and booted, but it continues to reject the second password(the
one that asks for both my name and a password)
Yes, I did carefully write the password down when I created it, but it is
simply not acceptable.
Sup Dat?
Thank you very much for reading this, and even more if you can
On Tuesday, 30 January 2018 11:19:18 CET 'Tom Zander' via qubes-users wrote:
> There were a bunch more updates in the repo 4.0 current-testing this
> morning which I applied and I rebooted, but no change.
> Still no icons in my systray, still not able to start any apps on any VMs.
Oh,
On Tuesday, 30 January 2018 01:05:39 CET 'Tom Zander' via qubes-users
wrote:
> I can start a VM using qvm-start, but when I use qvm-run nothing happens,
> it hangs forever. Even commands that don't need a X server.
> For any qube of the various OSs I run.
>
> The Qubes icons also
On Tuesday, 30 January 2018 02:51:06 CET 'awokd' via qubes-users wrote:
> Enable Debug mode?
I always wondered what this was, anyone know what effect it has to set this
to true?
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You recei
ch VM has a static IP address that won't change.
What you could do is add a line to your /etc/hosts for each VM to match its
name to the IP.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to t
to the VM and get a tty? Think serial-line
fallback.
is it known that grubs advanced menu doesn't get updated when new kernels
are installed?
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are
mething like that with curses text gui
> woud be best.
$ xmllint -format < in.xml > out.xml
$ vim out.xml
:set foldmethod=syntax
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google
n on an application by
> application basis, but I don't know how to do it on a domain basis. Is
> there a mechanism for that in KDE?
This got readded in a recent update in the 'testing' repo, but only on the
default window-manager decorations called Breeze.
So make sure you are up-to-date an
at had a banner for
articles (or sections) that were known to be "disputed".
I was wondering if it might be useful to have such a concept on the doc
pages, it may invite people to actually add their knowledge.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vi
(x seconds)"
and "dim screen", "turn off screen" etc are all separately configurable.
And, yes, on Q4 I run kde in dom0.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscri
ate'.
Related;
https://github.com/QubesOS/qubes-issues/issues/3438
and
https://groups.google.com/d/msgid/qubes-users/2932962.V7N4gufabA%40cherry
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are sub
pposed to be
doing (check the Exec line).
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop recei
speaks to me.
I really like this idea.
Thanks for sharing it!
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group an
exactly like the approach my (very naive) proposal was thinking
of; but these guys actually seem to know their GL and went ahead
and did it :)
Their proof-of-concept showing that the result is *faster* (much less
bandwidth) than the Qubes approach is very exciting.
Thanks for the link!
--
Tom Zander
On Friday, 19 January 2018 16:38:54 CET Marek Marczykowski-Górecki wrote:
> Specifically qmemman was broken in qubes-core-dom0 in 4.0.16 and 4.0.17.
Can confirm it works much better 4.0.18 than it ever did before :)
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/chann
rst line with memory usage.
Good luck!
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receivin
server.
I'm not aware of any way to avoid this data-leakage using the screenshot
application in dom0.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-u
/forum/#!msg/qubes-devel/40ImS390sAw/Z7M0E8RiAQAJ
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop
/input/tablet/waco
> m_serial4.ko
>
> I get the error
>
> rm: cannot remove
> '/lib/modules/4.9.56-21.pvops.qubes.x86_64/kernel/drivers/input/tablet/wa
> com_serial4.ko': Read-only file system
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/
if you are talking about a template.
Not sure if this command is available on 3.2, but qvm-volume is useful too.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"
he whonix
template after this which probably includes downloading it.
Good luck!
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
On Friday, 12 January 2018 13:09:35 GMT Holger Levsen wrote:
> I'm not so sure, why not use git branches?
That has my preference still, but I'm ok for any workable solution.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You recei
in one that I think is causing pain right now.
Thanks!
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group a
n filleting our bits from each page.
This would be even better, if qubes ever wants to they can just remove the
subrepository.
What do others think?
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed
of mem used) and maybe 10 seconds
later I get out-of-memory issues.
To my annoyance xentop shows me that there is still >10 GB free,
unallocated. For some reason it just doesn't seem to allow growth of memory
fast enough, regardless of my settings.
I "solved" that by turning off me
to actually use that 2½GB that dom0 now claims but doesn't use,
anyone got ideas how?
Thanks!
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users&q
please specify what you did and how it failed, this avoids
guessing on our side :)
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To
On Thursday, 11 January 2018 03:42:11 GMT Andrew David Wong wrote:
> On 2018-01-10 12:53, 'Tom Zander' via qubes-users wrote:
> > I poked the Qubes guys about providing a separate dir on the website to
> > make it clear what is 3.x and what is 4.x specific, but they stated we
>
nough for this app, your actual usage may depend on how your app
installs itself.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsub
ice is detected, they ignore the tablet.
So maybe you can use that website to find out how to configure your wacom to
just be a HID (human interface device) and make it send those mouse clicks.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You
> please don't apologize for your incognizable hard and important work. ;)
I second the motion. I am so thankful for the Qubes team's work to
protect us users.
On Mon, Jan 8, 2018 at 5:37 AM, rob_66 wrote:
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On Sat, 6
kel just causes the data to be copied to the appvm homedir on
first start.
You end up duplicating the data anyway, maybe you can use a different way to
copy everthing between VM homedirs.
Notice that you can just do a qvm-copy [dir] which copies recursively.
--
Tom Zander
Blog: https://zander.gi
s an up / down :)
* AMD is faster (no PTI)
* AMD has a remote code execution issue, at least until you can turn off PSA
using a bios update.
* Bios updates are not much seen in the wild.
Time will tell.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptoch
qubes-rpc/policy/qubes.UpdatesProxy
>
> In that file there is a line that says target=sys-net.
> I changed it to the same name as my net vm.
That did the trick!
Thanks, I would never have found that...
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
qid property. :-(
The docs on the website talk about a service "qubes-yum-proxy" can't find
that one, though. I guess its a 3.2 property.
Anyone here able to explain how this proxy works? Would make a nice doc on
the website too!
I'd love some suggestions on how to fix this...
Thanks!
space available
And, yeah, it also still needs a user-interface.
The simplest way to get the space usage if you are using a LVM based pool
(which requires completely manual setup at the moment) is
sudo lvs
and you can read under the column "Data%" how much actual usage you reached.
-
On Saturday, 6 January 2018 23:19:54 GMT pixel fairy wrote:
> The app menu, top left, keeps entries for old template VMs. is there a way
> to get rid of them?
You find the data backing this in
$HOME/.local/share/qubes-appmenus/
--
Tom Zander
Blog: https://zander.github.io
Vlog:
Qubes
on was 21GiB.
But you have to skip the debian and the whonix templates and I turned off
swap.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-u
oads of messages).
I noticed that if I manually shut down all qubes, INCLUDING, sys-net, before
logging out then this problem is avoided.
Next time you reboot, can you try that and let us know if this isn't just
me?
That may help with debugging.
Cheers!
--
Tom Zander
Blog: https://zander.githu
references. Hence I have no time
> to write a new manager for the Qubes 4.x I just shared my use case.
> Feel free to ignore them if you don't like 'em
They are excellent ideas, thanks!
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You
On Friday, 5 January 2018 15:37:37 GMT Unman wrote:
> Look at the nat table in the upstream netvm.
> You'll see that sys-net NATs these requests to the NS used by sys-net.
Ah, that hint was enough, I didn't expect NAT, thanks!
Got it working now.
--
Tom Zander
Blog: https://zander.git
on this address.
* how can I change this in indidivual qubes in the correct matter.
I have some qubes routing through sys-vpn and I adjusted the vpn VM to find
the DNS, but users of the vpn can't find any DNS service now.
Any help appreciated.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https
M in one way or another.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, s
significantly faster.
I also removed swap in fstab on all templates, the only effect this has had
so far is show that the memory balancer is in need of work. It fails to give
hosts memory when they use significantly more than others.
--
Tom Zander
Blog: https://zander.github.io
Vlog: ht
,
anything you run or download has sudo and can install or change data which
then will cause all your VMs based on this template to be contaminated.
Be safe.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because
rum, you likely will get some more
publicity out of it as well.
If you want any details, feel free to ask me more in private email.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to th
On Wednesday, 3 January 2018 16:16:13 GMT Fabrizio Romano Genovese wrote:
> I am trying to install texlive on a fedora-26 template vm. The package is
> quite big, nevertheless it is correctly downloaded. After this, when the
> actual installation process would be supposed to start, it fails with
ave this content at /etc/sudoers.d/qubes)
https://www.qubes-os.org/doc/vm-sudo/
also I suggest double checking that sudo is actually installed.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscri
your
kernel with unknown exploits in any usb driver shipped by the kernel.
Just using a different firmware.
This is why there is the suggestion to have a sys-usb qube to isolate those
drivers, should you fear your hardware in future falling in the hands of bad
people.
> What about sata?
I hope
addresses and only allow outgoing connections from them, and likely no
incoming connections at all.
Those IPs would be someting from friends, or some you find on;
https://bitnodes.earn.com/
But notice you need to then tell your bitcoin software to actually connect
to those IPs and likely skip any DNS looku
l of them and at least one is a bling bash which has root.
Not sure how easy it is to use, but that may just be the entry point you
were looking for.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are s
On Sunday, 31 December 2017 20:57:36 GMT davidmizr2...@gmail.com wrote:
> I can see e permission problem here
> "/net/wireless/realtek/rtlwifi/rtl_pci.ko' Read-only file system,
That is not a permission problem.
Nobody can write to a read-only filesystem.
Try to make sure that you configured
On Friday, 29 December 2017 19:23:01 CET taii...@gmx.com wrote:
> I am sure the massive
> markup over parts cost is worth it for a "tested working properly"
> system right?
Yes. Yes it is.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryp
now it is possible. Just don' t know how.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop recei
I agree intent is tricky
to guess about.
I definitely will not advice people either way, my opinion is irrelevant and
browsers are not my specialty.
The situation left a bad taste in my mouth, I had to conclude that their
priorities are not aligned with mine. Your millage may vary.
--
Tom Zan
e give it a try.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an
specify
which files or directories are kept between restarts.
Hope this helps.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
T
ot
leaked and after a lot of heat, a lot of bad press they eventually
apologised.
I'm more concerned that they tried then how they failed.
It leaves a bad taste in my mouth.
Google for "looking glass" and "mozilla" if you want to know more.
--
Tom Zander
Blog: https://zander.gith
tually resolve conflicts...
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from
on.
So make sure your software is from a trusted source.
Personally, I' d avoid thunderbird and anything from mozilla, but thats just
me.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the
let it remember your site passwords, then it would just send it out t
the evil website immediately.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-user
:-)
It took some more puzzling and I now have some VMs on LVM pools instead of
everything as huge files in my dom0 filesystem.
Great success.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to
lvm_thin -o
volume_group=Slow,thin_pool=data,revisions_to_keep=0
qvm-create -P qubes_ssd --template fedora-25 -l green --class AppVM test
app: Error creating VM: b' Logical volume qubes_dom0/systems is not a thin
pool.\n'
Any help appreciated!
--
Tom Zander
Blog: https://zander.github.io
Vlog
On Friday, 22 December 2017 02:42:57 CET yreb...@riseup.net wrote:
> assuming
> 4.0 is going to come out of the box with like Debian 9 and Fed 26?
Fedora 26 is not going to be used in 4.0, maybe in 4.1
source;
https://groups.google.com/forum/#!msg/qubes-devel/13PZgSOaajA/RvBh02ANCAAJ
-
hat do people think about this?
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from i
is that we have to work *with* people, not against them. Provide
more useful options, don't take away ones you think are dangerous.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the
creating an AppVM which will be a
template for disposable VMs launched by the system.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe
minute.
Creating enough to write to a many gigabytes data would take centuries.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe
n as root in a shell.
First run something like;
# sudo su
which should give you a shell that is owned by root. Type who ami to
confirm.
Then you can copy/paste the line from the archlinux wiki to do the work.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryp
to say that I’m programming this for myself and for people that
have indicated they want a similar solution.
It would be nice if it were packaged in Qubes, but I’m not depending on it.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You re
On Tuesday, 19 December 2017 16:33:49 CET Unman wrote:
> Tom
>
> Ive suggested before that if you give this advice you should
> clearly state the consequences.
Ok, no worries. Here you go:
The consequences is that the template, which has no personal or identifying
information,
as Fedora or Debian etc.
I don’t know fedora at all,
in archlinux you’ll have a file in /etc/pacman/ which sets the current proxy,
in debian you’ll likely have one in /etc/apt/
grep -R -i PROXY /etc/*
may be useful too.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com
one to instruct the full-screen option.
That tends to work better.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/floweethehub
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this g
Last weeks there was a lot of talk about a lot of us missing the
qubes-manager, or frankly any sort of useful graphical user interface.
As I’m a long time programmer I decided to just give this a go and try to
get something useful going.
My approach is one where I talk directly to the Admin-API
on of the total.
Reusing it for non-mining purposes (while mining) just doesn't make any
sense. Both from an economics as well as a security point of view.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you
cure).
I claim no expertise in the domain you address in this thread, so apologies
for the generic answer.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users&qu
but
> yes, layers and layers of metadata processing required.
>
> BTW, has anyone started a btrfs driver for storage pools? I think it could
> very tricky if at all possible.
related;
https://github.com/QubesOS/qubes-issues/issues/3334
--
Tom Zander
Blog: https://zander.github.io
Vl
ound the house.
I think thats a great solution for the more common attack.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscr
ds an unneeded
layer that will just be able to introduce issues.
What is the benefit of using pools?
Doing a backup of a 1TB homedir can be done without the backup tool too ;)
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received thi
On Monday, 11 December 2017 15:10:17 GMT Connor Page wrote:
> I hope you do understand that there is no encryption in what you propose.
Thats why I wrote;
> I assume you already partitioned and did everything you need with the
> drive, it should be available to dom0.
I cowerdly leave the
On Monday, 11 December 2017 17:48:45 GMT Unman wrote:
> This is a case where "making stuff work a lot nicer" isn't necessarily a
> good idea.
The "log nicer" is that it is quite a bit faster and error handling is much
better.
> I don't think you should advise against this without explaining
On Monday, 11 December 2017 11:31:22 GMT Connor Page wrote:
> templates establish a connection to a proxy running in some netvm defined
> in dom0 over a vchan.
Would you be able to repeat that in English ? :-)
--
You received this message because you are subscribed to the Google Groups
Lots of things changed in Qubes4, and I think I am finding out things lots of
others will need to find out at one point too.
So for them, as well as for my own memory, I'll write some howto emails.
The task;
as I run Qubes on a machine with a relatively small SSD and large spinning
disk, I
1 - 100 of 138 matches
Mail list logo