Re: [qubes-users] Special template to isolate less trusted software?

2020-09-06 Thread 'hut7no' via qubes-users
I do this, but I use a squid proxy setup from rustybird to cache updates. Starting up and shutting down VMs still takes the same amount of time though. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop

Re: [qubes-users] Special template to isolate less trusted software?

2020-09-06 Thread Dan Krol
(By "local install" I mean per-user install) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on

Re: [qubes-users] Special template to isolate less trusted software?

2020-09-06 Thread Dan Krol
My (perhaps naive) approach is to just use flatpak local install in the AppVM. I don't have to mess with bind-dirs. I have a couple different AppVMs where I have such proprietary software away from anything I want to keep safe/private. I'm curious why people are talking about reinstalling on

Re: [qubes-users] Special template to isolate less trusted software?

2020-09-03 Thread Mike Keehan
On 9/3/20 12:44 AM, 'Ryan Tate' via qubes-users wrote: I've started making special templateVMs where I install less trusted software, typically closed source binaries or code distributed directly from a vendor. I am curious if others do this and if people think it adds much security wise.

Re: [qubes-users] Special template to isolate less trusted software?

2020-09-03 Thread Chris Laprise
On 9/2/20 11:39 PM, airelemental via qubes-users wrote: I just don't like the idea of putting untrusted code in a templateVM used by sensitive VMs. Me neither! But I avoid multiplying templates by installing apps directly into appvms. This minimizes the number of templates I have to keep

Re: [qubes-users] Special template to isolate less trusted software?

2020-09-02 Thread airelemental via qubes-users
> I just don't like the idea of putting untrusted code in a templateVM used by > sensitive VMs. > Me neither! But I avoid multiplying templates by installing apps directly into appvms. This minimizes the number of templates I have to keep up-to-date. > fedora-32-zoom (the proprietary

[qubes-users] Special template to isolate less trusted software?

2020-09-02 Thread 'Ryan Tate' via qubes-users
I've started making special templateVMs where I install less trusted software, typically closed source binaries or code distributed directly from a vendor. I am curious if others do this and if people think it adds much security wise. For example, in addition to vanilla fedora-32, where I