--
Regards,
Thomas Blackwood
PGP key fingerprint = C2FE 7FA6 96CB 0172 FCB3 473F 7CC9 5672 B740 5E70
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-us
Qubes 3.2 with TPM, TXT, and VT-d enabled.
Function keys work out of the box.
Wireless network doesn't resume properly after suspend and on wake the
sys-net VM often crashes, requiring shutting down all VMs depending on
network and starting them again in correct order.
Otherwise very compati
e.
Thanks for all your efforts on this badass platform!
--
Take care,
Tom Marciniak
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr
equest leaves qrexec-daemon running in dom0.
Just like bash does the replacement before it forwards the command-line.
Again, if you do not do the variable replacement there, but instead pass it
through unvalidated and unrelated software, you are going to continue having
security flaws.
--
Tom Zande
substitute. “$adminvm” doesn't end up being the string you offer to qubesd,
the string “dom0” is.
Likewise; you don't start a service in Dispvm18431 and send it the text
“$dispvm”.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
Y
sues as they could
replace anything with anything...
Anyway, to answer your fear.
No. UTF-8 doesn't allow 0xFF, it will just tell you the stream is broken.
(see attached example file) Or, more likely, it will just switch off utf-8.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https:/
On Tuesday, 20 February 2018 14:04:03 CET Wojtek Porczyk wrote:
> On Tue, Feb 20, 2018 at 01:21:30PM +0100, 'Tom Zander' via qubes-devel
wrote:
> > On Tuesday, 20 February 2018 01:49:37 CET Marek Marczykowski-Górecki
wrote:
> > > We've decided to deprecate the
erpreted in a special way
> by the relevant software.
I would argue against the @ sign on account that it is a special character
in bash as well.
Search for it here;
https://linux.die.net/man/1/bash
I don't immediately see a way to exploit it, but why risk it?
--
Tom Zander
Blog: https:
notices I have a sys-usb and I used it to browse to the directory there to
do the backup. All that worked fine.
Until I pressed the final button to start the backup, it just failed saying
it could not find the directory...
I ended up giving up on doing a backup.
--
Tom Zander
Blog: https://za
ctive and working.
You just can t actually “run” anything on it. The reasons seems to be that
there is some magic thing that starts when you log into xfce4, and only
xfce4.
See the screenshot attached elsewhere in this thread of qubes manager dying
on startup due to the same issue.
Tested on R
-
1) Personally I would say that simpler is better, or least surprises is
better. The current design where any appvm gets those complex firewall rules
is a bug. Only VMs that expose their network (providing) should run it.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/chan
it assumes people
already know the actual setup of the qubes firewall ruleset. I don't, thats
why I went to that page.
> Tom has built a Qubes Controller (manager) based on the 4.0 code and went
> so far as to add in library package so other coding can be used to build.
> He has b
se_life_cycle#Release_candidate
Release candidates are, like the word describes, not made unless the
developers are thinking that its ready to release but needs more real-world
testing to make sure.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
On Sunday, 4 February 2018 21:00:55 CET 'awokd' via qubes-users wrote:
> Working on it (where other contributors haven't already)! Am about halfway
> through now.
Sweet!
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
ll the Qubes Controller and use it. That can then be submitted to
> be added to the Qubes 4.0 Docs.
Awesome!
You should be able to get a lot of detials from this;
https://github.com/QubesController/qubes-api-cpp-lib/blob/master/Install.md
--
Tom Zander
Blog: https://zander.github.io
Vlog: ht
On Monday, 5 February 2018 02:33:02 CET Unman wrote:
> You are, of
> course, free to rewrite Qubes and its components in a language you're
> comfortable with.
Don't be so dramatic, I m not suggesting any such thing.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https:/
On Monday, 5 February 2018 00:55:34 CET Unman wrote:
> On Sun, Feb 04, 2018 at 08:14:57PM +0100, 'Tom Zander' via qubes-users
wrote:
> > * Having nothing but python APIs for your operating system is something
> > that makes no sense. Python was never meant
wrote an already
pretty decent "Qubes Controller" using the new APis.
I'm open to adding anyone to the approved committers list that wants to work
on it.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message
Got Q installed and booted, but it continues to reject the second password(the
one that asks for both my name and a password)
Yes, I did carefully write the password down when I created it, but it is
simply not acceptable.
Sup Dat?
Thank you very much for reading this, and even more if you can c
On Tuesday, 30 January 2018 11:19:18 CET 'Tom Zander' via qubes-users wrote:
> There were a bunch more updates in the repo 4.0 current-testing this
> morning which I applied and I rebooted, but no change.
> Still no icons in my systray, still not able to start any apps on any
On Tuesday, 30 January 2018 01:05:39 CET 'Tom Zander' via qubes-users
wrote:
> I can start a VM using qvm-start, but when I use qvm-run nothing happens,
> it hangs forever. Even commands that don't need a X server.
> For any qube of the various OSs I run.
>
> The Q
On Tuesday, 30 January 2018 02:51:06 CET 'awokd' via qubes-users wrote:
> Enable Debug mode?
I always wondered what this was, anyone know what effect it has to set this
to true?
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
VM has a static IP address that won't change.
What you could do is add a line to your /etc/hosts for each VM to match its
name to the IP.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed
way to connect to the VM and get a tty? Think serial-line
fallback.
is it known that grubs advanced menu doesn't get updated when new kernels
are installed?
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message bec
ke that with curses text gui
> woud be best.
$ xmllint -format < in.xml > out.xml
$ vim out.xml
:set foldmethod=syntax
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google
know how to set colors in kwin on an application by
> application basis, but I don't know how to do it on a domain basis. Is
> there a mechanism for that in KDE?
This got readded in a recent update in the 'testing' repo, but only on the
default window-manager decorations calle
wiki that had a banner for
articles (or sections) that were known to be "disputed".
I was wondering if it might be useful to have such a concept on the doc
pages, it may invite people to actually add their knowledge.
--
Tom Zander
Blog: https://zander.github.io
Vlog:
d after locking (x seconds)"
and "dim screen", "turn off screen" etc are all separately configurable.
And, yes, on Q4 I run kde in dom0.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because
e the qvm-pool before you do a
'qvm-create'.
Related;
https://github.com/QubesOS/qubes-issues/issues/3438
and
https://groups.google.com/d/msgid/qubes-users/2932962.V7N4gufabA%40cherry
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
they do what they are supposed to be
doing (check the Exec line).
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe fro
ks to me.
I really like this idea.
Thanks for sharing it!
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group an
tly like the approach my (very naive) proposal was thinking
of; but these guys actually seem to know their GL and went ahead
and did it :)
Their proof-of-concept showing that the result is *faster* (much less
bandwidth) than the Qubes approach is very exciting.
Thanks for the link!
--
Tom Zander
On Friday, 19 January 2018 16:38:54 CET Marek Marczykowski-Górecki wrote:
> Specifically qmemman was broken in qubes-core-dom0 in 4.0.16 and 4.0.17.
Can confirm it works much better 4.0.18 than it ever did before :)
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/chann
rst line with memory usage.
Good luck!
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving e
server.
I'm not aware of any way to avoid this data-leakage using the screenshot
application in dom0.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-
/forum/#!msg/qubes-devel/40ImS390sAw/Z7M0E8RiAQAJ
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop
ivers/input/tablet/waco
> m_serial4.ko
>
> I get the error
>
> rm: cannot remove
> '/lib/modules/4.9.56-21.pvops.qubes.x86_64/kernel/drivers/input/tablet/wa
> com_serial4.ko': Read-only file system
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vime
#x27;root.img' if you are talking about a template.
Not sure if this command is available on 3.2, but qvm-volume is useful too.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the G
ubes-dom0-update' to install the whonix
template after this which probably includes downloading it.
Good luck!
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
&
On Friday, 12 January 2018 13:09:35 GMT Holger Levsen wrote:
> I'm not so sure, why not use git branches?
That has my preference still, but I'm ok for any workable solution.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You
more
is the main one that I think is causing pain right now.
Thanks!
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from
ther than filleting our bits from each page.
This would be even better, if qubes ever wants to they can just remove the
subrepository.
What do others think?
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you
es times 0.6GB of mem used) and maybe 10 seconds
later I get out-of-memory issues.
To my annoyance xentop shows me that there is still >10 GB free,
unallocated. For some reason it just doesn't seem to allow growth of memory
fast enough, regardless of my settings.
I "solved" th
ke to actually use that 2½GB that dom0 now claims but doesn't use,
anyone got ideas how?
Thanks!
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-u
ils, please specify what you did and how it failed, this avoids
guessing on our side :)
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To
On Thursday, 11 January 2018 03:42:11 GMT Andrew David Wong wrote:
> On 2018-01-10 12:53, 'Tom Zander' via qubes-users wrote:
> > I poked the Qubes guys about providing a separate dir on the website to
> > make it clear what is 3.x and what is 4.x specific, but they sta
ite to make
it clear what is 3.x and what is 4.x specific, but they stated we should
instead put notices about exceptions in the document pages.
So I guess things like ProxyVMs should be mentioned to be old and AppVM is
the new.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vim
nough for this app, your actual usage may depend on how your app
installs itself.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsub
the
> device is detected, they ignore the tablet.
So maybe you can use that website to find out how to configure your wacom to
just be a HID (human interface device) and make it send those mouse clicks.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptoch
> please don't apologize for your incognizable hard and important work. ;)
I second the motion. I am so thankful for the Qubes team's work to
protect us users.
On Mon, Jan 8, 2018 at 5:37 AM, rob_66 wrote:
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On Sat, 6 Jan 2018 18:15:21 -060
g they are git repos
> cloned to /etc/skel)
Using /etc/skel just causes the data to be copied to the appvm homedir on
first start.
You end up duplicating the data anyway, maybe you can use a different way to
copy everthing between VM homedirs.
Notice that you can just do a qvm-copy [dir] which
never gets updated again.
Bottom line; your homedir is unique and different in each and every VM.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" gro
le-x86-PTI
So its an up / down :)
* AMD is faster (no PTI)
* AMD has a remote code execution issue, at least until you can turn off PSA
using a bios update.
* Bios updates are not much seen in the wild.
Time will tell.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/chan
icy/qubes.UpdatesProxy
>
> In that file there is a line that says target=sys-net.
> I changed it to the same name as my net vm.
That did the trick!
Thanks, I would never have found that...
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
-
e the qid property. :-(
The docs on the website talk about a service "qubes-yum-proxy" can't find
that one, though. I guess its a 3.2 property.
Anyone here able to explain how this proxy works? Would make a nice doc on
the website too!
I'd love some suggestions on how to fix th
space available
And, yeah, it also still needs a user-interface.
The simplest way to get the space usage if you are using a LVM based pool
(which requires completely manual setup at the moment) is
sudo lvs
and you can read under the column "Data%" how much actual usage you reache
On Saturday, 6 January 2018 23:19:54 GMT pixel fairy wrote:
> The app menu, top left, keeps entries for old template VMs. is there a way
> to get rid of them?
You find the data backing this in
$HOME/.local/share/qubes-appmenus/
--
Tom Zander
Blog: https://zander.github.io
Vlog:
d Qubes
on was 21GiB.
But you have to skip the debian and the whonix templates and I turned off
swap.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-
ter loads of messages).
I noticed that if I manually shut down all qubes, INCLUDING, sys-net, before
logging out then this problem is avoided.
Next time you reboot, can you try that and let us know if this isn't just
me?
That may help with debugging.
Cheers!
--
Tom Zander
Blog: https://za
y my personal preferences. Hence I have no time
> to write a new manager for the Qubes 4.x I just shared my use case.
> Feel free to ignore them if you don't like 'em
They are excellent ideas, thanks!
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/to
On Friday, 5 January 2018 15:37:37 GMT Unman wrote:
> Look at the nat table in the upstream netvm.
> You'll see that sys-net NATs these requests to the NS used by sys-net.
Ah, that hint was enough, I didn't expect NAT, thanks!
Got it working now.
--
Tom Zander
Blog: https://
ms to listen on this address.
* how can I change this in indidivual qubes in the correct matter.
I have some qubes routing through sys-vpn and I adjusted the vpn VM to find
the DNS, but users of the vpn can't find any DNS service now.
Any help appreciated.
--
Tom Zander
Blog: https://zander.g
n one way or another.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, s
significantly faster.
I also removed swap in fstab on all templates, the only effect this has had
so far is show that the memory balancer is in need of work. It fails to give
hosts memory when they use significantly more than others.
--
Tom Zander
Blog: https://zander.github.io
Vlog: ht
in a TemplateVM,
anything you run or download has sudo and can install or change data which
then will cause all your VMs based on this template to be contaminated.
Be safe.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this mes
rum, you likely will get some more
publicity out of it as well.
If you want any details, feel free to ask me more in private email.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to th
On Wednesday, 3 January 2018 16:16:13 GMT Fabrizio Romano Genovese wrote:
> I am trying to install texlive on a fedora-26 template vm. The package is
> quite big, nevertheless it is correctly downloaded. After this, when the
> actual installation process would be supposed to start, it fails with th
you have this content at /etc/sudoers.d/qubes)
https://www.qubes-os.org/doc/vm-sudo/
also I suggest double checking that sudo is actually installed.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subs
r
kernel with unknown exploits in any usb driver shipped by the kernel.
Just using a different firmware.
This is why there is the suggestion to have a sys-usb qube to isolate those
drivers, should you fear your hardware in future falling in the hands of bad
people.
> What about sata?
I hope
series of trusted IP
addresses and only allow outgoing connections from them, and likely no
incoming connections at all.
Those IPs would be someting from friends, or some you find on;
https://bitnodes.earn.com/
But notice you need to then tell your bitcoin software to actually connect
to those IPs and likel
them and at least one is a bling bash which has root.
Not sure how easy it is to use, but that may just be the entry point you
were looking for.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscrib
On Sunday, 31 December 2017 20:57:36 GMT davidmizr2...@gmail.com wrote:
> I can see e permission problem here
> "/net/wireless/realtek/rtlwifi/rtl_pci.ko' Read-only file system,
That is not a permission problem.
Nobody can write to a read-only filesystem.
Try to make sure that you configured you
On Friday, 29 December 2017 19:23:01 CET taii...@gmx.com wrote:
> I am sure the massive
> markup over parts cost is worth it for a "tested working properly"
> system right?
Yes. Yes it is.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryp
On Thursday, 28 December 2017 03:49:07 CET cooloutac wrote:
> chrome doesn't have a good track record either.
Not to be confused with the project “Chromium” which is based on the open
source version of google-Chrome.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/
now it is possible. Just don' t know how.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop rece
nd I agree intent is tricky
to guess about.
I definitely will not advice people either way, my opinion is irrelevant and
browsers are not my specialty.
The situation left a bad taste in my mouth, I had to conclude that their
priorities are not aligned with mine. Your millage may vary.
--
To
olution.
Please give it a try.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails f
ou to specify
which files or directories are kept between restarts.
Hope this helps.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
T
nd the whole thing got
leaked and after a lot of heat, a lot of bad press they eventually
apologised.
I'm more concerned that they tried then how they failed.
It leaves a bad taste in my mouth.
Google for "looking glass" and "mozilla" if you want to know more.
--
Tom Zander
tually resolve conflicts...
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from
that information.
So make sure your software is from a trusted source.
Personally, I' d avoid thunderbird and anything from mozilla, but thats just
me.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you a
u let it remember your site passwords, then it would just send it out t
the evil website immediately.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-use
:-)
It took some more puzzling and I now have some VMs on LVM pools instead of
everything as huge files in my dom0 filesystem.
Great success.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to
data lvm_thin -o
volume_group=Slow,thin_pool=data,revisions_to_keep=0
qvm-create -P qubes_ssd --template fedora-25 -l green --class AppVM test
app: Error creating VM: b' Logical volume qubes_dom0/systems is not a thin
pool.\n'
Any help appreciated!
--
Tom Zander
Blog: https://zander
On Friday, 22 December 2017 02:42:57 CET yreb...@riseup.net wrote:
> assuming
> 4.0 is going to come out of the box with like Debian 9 and Fed 26?
Fedora 26 is not going to be used in 4.0, maybe in 4.1
source;
https://groups.google.com/forum/#!msg/qubes-devel/13PZgSOaajA/RvBh02ANCAAJ
-
access.
What do people think about this?
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving ema
ed on this...”.
My thinking is that we have to work *with* people, not against them. Provide
more useful options, don't take away ones you think are dangerous.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message beca
an AppVM which will be a
template for disposable VMs launched by the system.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe
minute.
Creating enough to write to a many gigabytes data would take centuries.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe
n as root in a shell.
First run something like;
# sudo su
which should give you a shell that is owned by root. Type who ami to
confirm.
Then you can copy/paste the line from the archlinux wiki to do the work.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tom
to say that I’m programming this for myself and for people that
have indicated they want a similar solution.
It would be nice if it were packaged in Qubes, but I’m not depending on it.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You receive
On Tuesday, 19 December 2017 16:33:49 CET Unman wrote:
> Tom
>
> Ive suggested before that if you give this advice you should
> clearly state the consequences.
Ok, no worries. Here you go:
The consequences is that the template, which has no personal or identifying
information, ca
as Fedora or Debian etc.
I don’t know fedora at all,
in archlinux you’ll have a file in /etc/pacman/ which sets the current proxy,
in debian you’ll likely have one in /etc/apt/
grep -R -i PROXY /etc/*
may be useful too.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com
one to instruct the full-screen option.
That tends to work better.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/floweethehub
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this g
Last weeks there was a lot of talk about a lot of us missing the
qubes-manager, or frankly any sort of useful graphical user interface.
As I’m a long time programmer I decided to just give this a go and try to
get something useful going.
My approach is one where I talk directly to the Admin-API (
on of the total.
Reusing it for non-mining purposes (while mining) just doesn't make any
sense. Both from an economics as well as a security point of view.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because y
secure).
I claim no expertise in the domain you address in this thread, so apologies
for the generic answer.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-use
stone”.
Also hae to make clear that I see very little communication from the core
devs, so I have no idea about their thinking here. My thinking is that since
the milestone is there, it likely is important to someone :)
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/chan
but
> yes, layers and layers of metadata processing required.
>
> BTW, has anyone started a btrfs driver for storage pools? I think it could
> very tricky if at all possible.
related;
https://github.com/QubesOS/qubes-issues/issues/3334
--
Tom Zander
Blog: https://zander.github.io
Vl
ng around the house.
I think thats a great solution for the more common attack.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To uns
1 - 100 of 149 matches
Mail list logo