On Wed, September 12, 2018 8:39 pm, Chris Laprise wrote:

> Another alternative would be to configure a single sys-net with either
> dispVM or Qubes-VM-hardening so that neither passwords nor malware would be
> retained when sys-net is restarted.

Was going to suggest a dispVM as well, per
https://www.qubes-os.org/doc/dispvm-customization/#using-static-disposable-vms-for-sys-
.

> Then you could control wifi
> connections from a dom0 script.

How would you do that? qvm-run some nmcli command(s), passing along the
wifi credentials?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f5f003cb9eac7cb3e5d9b1cb2eae0cd2.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.

Reply via email to