*Installer r4.0 hung on sys-net step due to a Broadcom BCM* wifi card
issue. Installer worked fine and boot as well after tossing the card aside.
Everything else worked great out of the box:
- NVIDIA Quadro K2000M is good with HDMI out fine. Displayport output
went up to 2560x1440 (~2 or
For the Precision, I fortunately had an Intel NIC (Precision M4700
https://groups.google.com/forum/#!topic/qubes-users/-5Vbi5vhbms) but
experienced the Broadcom pains too. Here's some ideas:
You can get an RTL8187 for about $5 on eBay, works great. I would remove
the Broadcom wifi card and swap
libgnome-keyring, not just gnome-keyring.
Various forums suggest an issue (is there though?) in Fedora where PAM and
the gnome keyring do not play nice together and an additional theory that
the Fedora keyring is just not making Nextcloud entries due to some bug.
My current solution:
1. Boot
libgnome-keyring is a dependency. No idea what
the Nextcloud forum are referenced with libgnome-keyring0.
On Friday, August 16, 2019 at 4:58:08 PM UTC-4, sourcexorapprentice wrote:
>
> libgnome-keyring, not just gnome-keyring.
>
> Various forums suggest an issue (is there though?) in
China changes everything, as 799 hinted at thinking about what threads
you're concerned about.
For "they certainly won't be after me" as a foreigner in China I just used
my home internet with a VPN and skipped Whonix. If I was going to get in
trouble/deported, it wouldn't have anything to do wi
1. Download and verify the latest Qubes iso in your AppVM:
https://github.com/tasket/Qubes-vpn-support
2. Plug in your USB flash drive, mount it to your AppVM
https://www.qubes-os.org/doc/usb-devices/
3. Flash the ISO to the USB using standard Linux command line instruction
This should be a dd c
The process is to verify the Qubes ISO signature is correct, and not to
trust a SHA256 checksum posted on the same website hosting the file. The
hash only confirms the integrity and not the validity of the file (which
may be infected). It's a security theater exercise we're used to doing
elsewh
A correction and addendum brought to my attention, thanks!
1. MAC changing -- Do it anyway, you're more likely to be tracked down that
way than cameras, excellent Qubes documentation on that:
https://www.qubes-os.org/doc/anonymizing-your-mac-address/
You can confirm it works by randomizing it and