Another (perhaps hacky solution) is to replace pacat-simple on dom0
with a script which invokes pacat-simple in sys-usb over qrexec. This
would have a much smaller attack surface than USB passthrough.
You may also need to configure some pulseaudio settings in sys-usb.
--
You received this
W dniu piątek, 9 grudnia 2016 09:11:39 UTC+1 użytkownik Zbigniew Łukasiak
napisał:
> Two more surprises from me:
>
> 1. I have USB headphones. So fare I have not yet found a way to make
> them work under Qubes - but I found some headphones with the old audio
> jack - and this works.
>
> 2. Once
Two more surprises from me:
1. I have USB headphones. So fare I have not yet found a way to make
them work under Qubes - but I found some headphones with the old audio
jack - and this works.
2. Once I detached an USB memory device from a VM, before unmounting
the device inside the VM. Then I
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-12-05 00:57, Alex wrote:
> On 12/05/2016 09:40 AM, Zbigniew Łukasiak wrote:
>> 2. The suspend button activates a popup that says:
>>
>> "Do you want to suspend to RAM?"
>>
>> This is a bit confusing - I thought that suspension saves the RAM
On 12/05/2016 09:40 AM, Zbigniew Łukasiak wrote:
> Here is a list of stuff that I got into trouble trying out Qubes. I
> am a long time Linux user (since 1993) - so I know a bit about the
> Linux environment - but I never liked administration stuff.
Welcome to Qubes!
As you have noticed, this is
Here is a list of stuff that I got into trouble trying out Qubes. I am
a long time Linux user (since 1993) - so I know a bit about the Linux
environment - but I never liked administration stuff.
This is just a list - I guess I did a lot of silly things, and I don't
suggest that the system should