[qubes-users] [Security] Anti-evil-maid didn't notice Xen update ?
Hello, I use Qubes 3.2 (recent, default installation) with anti-evil-maid on HP ProBook 6470b. Anti-evil-maid is installed to HD /boot per instructions, TPM is protected by a password, and I use a "secret" image instead of text. So far everything seemed to work. However this morning I had a Xen upgrade in dom0, and, as documented, I was expecting it to break my AEM secret image display at next reboot. So after upgrading Xen in dom0 I rebooted the system and... nothing special hapenned. AEM displayed my "secret" image as usual, without any unusual behaviour or warning whatsoever. So I wonder : Is AEM actually working on my system ? Any clue appreciated. TIA. Kind regards. -- Swâmi Petaramesh PGP 9076E32E -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7c561e26-4fd5-fba0-e4e7-8d1108e0d481%40petaramesh.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: safer typing in public places
in our test, it was still pretty easy to see at 5 and 7 oclock, probably because were both really skinny. a couple more strips in front on the sides fixes that. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/baec2768-b664-4272-8c22-e0d3510d839a%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: How to install Win 7 x64 from a USB stick
W dniu środa, 30 listopada 2016 04:26:19 UTC+1 użytkownik stevemic...@gmail.com napisał: > On Tuesday, November 29, 2016 at 9:07:08 PM UTC-6, Jean-Philippe Ouellet > wrote: > > It may make more sense to use qvm-block than qvm-usb here. Should in > > theory have a smaller attack surface and expose better-tested code > > paths. > > I must be missing something really basic that, as a noob, I don't understand. > The command qvm-block -a Win7 dom0:sdb returns > ERROR: VM Win7 not running. > > This seems like a catch 22 since I can't start the VM because there's no > bootable file system yet nor can I attach a device to a not running VM. Don't use qvm-block, use --drive argument for the qvm-start command instead. qvm-start Win7 --drive=/path/to/usb/drive -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d631acb2-295f-4f3f-b520-f150916f0dce%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] safer typing in public places
just lined the sides of the lid of my laptop with velcro, and stapled the other end to cloth to fold over the keyboard while the lid is lowered. this allows for safer typing in public places. seems to work really well, but waiting on a friend to come over for a real test. see pic (remember to use dispvm!) theres still audio and keyboard timing attacks. going to try playing randomly generated keyboard noises to turn on while typing and see if this can fool a directional mic. if so, that should cover cellphones mics and the like, but not for example a bugged hotel room. we would need qubes on a small device you can slide fingers around quietly. personally, i find it easy to use my phone under my t-shirt or blanket (in a hotel room) or just covering half the screen with fingers. only did a couple times because i dont believe anyones after, or that ive ever been in a bugged hotel room. but, i know its a known issue in china. if that tablet liberm is selling runs qubes, problem solved :) i think for most of us, the most sensitive thing we type is the login passphrase, and the disk encryption passphras(es) when booting (two if you also use on disk fde) so, there should be little exposure to begin with, especially if you change the login password often enough. has anyone here experimented with bluetooth locks? it seems like a lot of extra scary code to run in dom0, but i like the idea of auto shutdown if device loses range. or maybe after a timeout period of some trigger?thats another discussion. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/58865b4e-1810-4e45-87e3-e387a4d97b57%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: How to install Win 7 x64 from a USB stick
On Tuesday, November 29, 2016 at 9:07:08 PM UTC-6, Jean-Philippe Ouellet wrote: > It may make more sense to use qvm-block than qvm-usb here. Should in > theory have a smaller attack surface and expose better-tested code > paths. I must be missing something really basic that, as a noob, I don't understand. The command qvm-block -a Win7 dom0:sdb returns ERROR: VM Win7 not running. This seems like a catch 22 since I can't start the VM because there's no bootable file system yet nor can I attach a device to a not running VM. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1984bc15-8a5c-419f-9121-ce077690a94f%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: How to install Win 7 x64 from a USB stick
It may make more sense to use qvm-block than qvm-usb here. Should in theory have a smaller attack surface and expose better-tested code paths. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CABQWM_AdtxOkQS4KB7MHFQFDJRJcv0kEdbOi%2BLJUhDxeS9L9SA%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: How to install Win 7 x64 from a USB stick
W dniu wtorek, 29 listopada 2016 19:28:02 UTC+1 użytkownik stevemic...@gmail.com napisał: > On Tuesday, November 29, 2016 at 11:41:59 AM UTC-6, Grzesiek Chodzicki wrote: > > W dniu wtorek, 29 listopada 2016 17:17:03 UTC+1 użytkownik > > stevemic...@gmail.com napisał: > > > I'm a total newbie. I've been searching for a howto to boot the Win7 > > > domain from a USB stick so that Windows installs from the USB stick. I > > > went thru the process to attach the PCI channel using qvm-pci -a command > > > in Dom0. When I checked the Win7 Devices in VM Manager I see 00:14.0 USB > > > Controller ... > > > > > > What I can't figure out is how to get the domain to boot from the USB > > > stick nor have my searches been fruitful. When I try to boot the domain I > > > get a PCI error that isn't displayed long enough for me to make a note of > > > it. The log file for the domain in VM Manager is greyed out. > > > > > > I'm stuck. > > > > Attack the stick using qvm-usb and then use the qvm-start windowsvmname > > --drive=windowsvmname:/dev/xvdi > qvm-usb -l shows my stick at dom0:3-2 > qvm-usb -a Win7 dom0:3-2 gives the error message "VM Win7 not running". Win7 > is an HVM template that has no boot information and therefore won't start. Okay, if your usb stick is assigned to dom0 then all you need to do is qvm-start windowsvmname --drive=/dev/xvdi -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6744193d-f816-4378-8556-c638653388bf%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] GUI Daemon error with new fedora-24-minimal template
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Tue, Nov 29, 2016 at 11:14:23AM -0500, 'Vincent Adultman' via qubes-users wrote: > It looks like template uploaded to 3.1 repository was built for Qubes > 3.2, so this is why it's incompatible. I've just removed this faulty > template, building new one - will be ready in few hours. > > Whoops. Thanks Marek. Will uninstall it and wait a bit then. Seems like I'm > an oddball still using 3.1 and fedora-minimal if I'm the first to run into it! New templates uploaded. - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJYPhCTAAoJENuP0xzK19cs1ZoH/3bm/GBVHSvlcS6WCYdWX42u 22Gk3aXX7Ax888sbi4VWBoUSy0p1dXkHpScJs8nnmsl7M8NPvpnspnLtotfHvyoc nHkIR+qI2wHwFZQlUGlDq6T1Ks/3R2mkbOK8NORQKr2k4vQR2RYZ9Gr9khuKXq8i eBkq0xPfuXZhUASTx/xvVRjXAn7kS1kY3jQoO+6hMQYbP/kRiRT0G0zR+RSVsscM x34QCQ0ESBs0w+3PxG9M0o+5pH8cVNy5Vtl/GjQgr2D4BJmbRCHhj/OQ9CLsw5Di tBJSZKK3ppLWIpzZwTvezHmkMC5xpb19mKhQhcYjtsA3ez7q4JzA0tBBTtDIHZo= =s6/+ -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161129233443.GS2130%40mail-itl. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Qubes 3.1 on Skylake NUC?
On Mon, Nov 28, 2016 at 06:09:36PM -0800, aesir.mag...@gmail.com wrote: > > I have a new i3 Skylake NUC (NUC6i3SYK) and am trying to install > > Qubes OS 3.1 on it. Unfortunately, it's not working. > > 3.2 is working great on my NUC6i3SYK. Have you tried it yet? I'm typing > this message from it now. Yep. The 3.2 release works fine, I'm guessing either the updated kernel or X driver updates added support for the latest Skylake integrated graphics. Thanks, Matthew -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161129225006.GA10817%40tonks.home.mattwilson.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] How do I get past this critical error?
On Tue, Nov 29, 2016 at 7:15 AM, Joshua van den Hoven wrote: > Hello guys, > > I am having a few isses with installing Qubes on my Dell Latitude e6330. I > have checked and i do have the correct chipset and a TPM available but still > get two errors the first is when i let the bootable media check after 4.8% it > returns an error and it stops. Qubes does a checksum of the installation media before trying to use it, and some bits here have been flipped for you. Your installation media is simply corrupted. I saw someone run into this problem (same stop at exactly 4.x%) because he created the installation media from a Windows machine which then modified the disk before ejecting it (adding some indexing metadata or some such? i don't remember exactly why). If this is the case for you, try using dd from some non-windows machine. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CABQWM_Btt1r7CiUwW5tkFw65VRj9M%2Bzwq1YV-LY-CTnn%3DiK3Ew%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: How to install Win 7 x64 from a USB stick
On Tuesday, November 29, 2016 at 11:41:59 AM UTC-6, Grzesiek Chodzicki wrote: > W dniu wtorek, 29 listopada 2016 17:17:03 UTC+1 użytkownik > stevemic...@gmail.com napisał: > > I'm a total newbie. I've been searching for a howto to boot the Win7 domain > > from a USB stick so that Windows installs from the USB stick. I went thru > > the process to attach the PCI channel using qvm-pci -a command in Dom0. > > When I checked the Win7 Devices in VM Manager I see 00:14.0 USB Controller > > ... > > > > What I can't figure out is how to get the domain to boot from the USB stick > > nor have my searches been fruitful. When I try to boot the domain I get a > > PCI error that isn't displayed long enough for me to make a note of it. The > > log file for the domain in VM Manager is greyed out. > > > > I'm stuck. > > Attack the stick using qvm-usb and then use the qvm-start windowsvmname > --drive=windowsvmname:/dev/xvdi qvm-usb -l shows my stick at dom0:3-2 qvm-usb -a Win7 dom0:3-2 gives the error message "VM Win7 not running". Win7 is an HVM template that has no boot information and therefore won't start. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/97e98e98-08e3-4d8b-b3d3-10f79be6a7d8%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Clear Containers in Qubes
Are Intel Clear Containers technology a viable alternative to VMs currently used by Qubes? According to Intel, the Clear Containers are supposed to be regular containers (similar to Docker) but with isolation enforced by VT-x https://clearlinux.org/blogs/intel%C2%AE-clear-containers-20-announced-dockercon-16 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fac1551d-9a25-4f55-b428-ebc1d0ed5d3b%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: How to install Win 7 x64 from a USB stick
W dniu wtorek, 29 listopada 2016 17:17:03 UTC+1 użytkownik stevemic...@gmail.com napisał: > I'm a total newbie. I've been searching for a howto to boot the Win7 domain > from a USB stick so that Windows installs from the USB stick. I went thru the > process to attach the PCI channel using qvm-pci -a command in Dom0. When I > checked the Win7 Devices in VM Manager I see 00:14.0 USB Controller ... > > What I can't figure out is how to get the domain to boot from the USB stick > nor have my searches been fruitful. When I try to boot the domain I get a PCI > error that isn't displayed long enough for me to make a note of it. The log > file for the domain in VM Manager is greyed out. > > I'm stuck. Attack the stick using qvm-usb and then use the qvm-start windowsvmname --drive=windowsvmname:/dev/xvdi -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e77540b5-74ff-44ca-a8b3-fca5572392fc%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: HCL submission : Dell Precision 5510
> >> Qubes 3.2 on a new Dell Precision 5510 ... seems to be working fine > > Yes, I have the NVMe drive, and it seems to be working fine. Great! Thanks for the info. I'll go ahead with my own order from Dell now. > > How has the battery life been for you with the Dell Precision 5510? > > No idea, I only really have the laptop since saturday, so a bit early to > judge. In any case, I generally see ~6h estimae in the panel, with the > 6-cell battery. A 6h estimate sounds good. That's an encouraging sign. Thanks for sharing your experiences. :o) Brian -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8e174d40-7a41-4ee3-81b3-61e67f09b6bb%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] How to install Win 7 x64 from a USB stick
I'm a total newbie. I've been searching for a howto to boot the Win7 domain from a USB stick so that Windows installs from the USB stick. I went thru the process to attach the PCI channel using qvm-pci -a command in Dom0. When I checked the Win7 Devices in VM Manager I see 00:14.0 USB Controller ... What I can't figure out is how to get the domain to boot from the USB stick nor have my searches been fruitful. When I try to boot the domain I get a PCI error that isn't displayed long enough for me to make a note of it. The log file for the domain in VM Manager is greyed out. I'm stuck. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ca9644e4-241a-4d20-a3cb-13438345f1b4%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] GUI Daemon error with new fedora-24-minimal template
It looks like template uploaded to 3.1 repository was built for Qubes 3.2, so this is why it's incompatible. I've just removed this faulty template, building new one - will be ready in few hours. - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? Whoops. Thanks Marek. Will uninstall it and wait a bit then. Seems like I'm an oddball still using 3.1 and fedora-minimal if I'm the first to run into it! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5wSXKApkkvtr1O2jze_vjxiwAVxsohfdnVVT4fq_ouBRskazEr5jQLuXeOy88oEsaoaZdogzVsURMTkGScdueAzkKZ6dSsgZpCrVtPaFB34%3D%40protonmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] GUI Daemon error with new fedora-24-minimal template
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Tue, Nov 29, 2016 at 10:56:55AM -0500, 'Vincent Adultman' via qubes-users wrote: > Hi all > > Qubes 3.1 > > Have downloaded the new qubes-template- fedora-24-minimal however on starting > it the following message is received > > "Dom0 GUI daemon do not support protocol version 1:1 requested by VM. To > update Dom0..." etc > > Does the template require a version of gui currently only in testing repo? > I'd have imagined yum would have warned me if so. It looks like template uploaded to 3.1 repository was built for Qubes 3.2, so this is why it's incompatible. I've just removed this faulty template, building new one - will be ready in few hours. - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJYPaenAAoJENuP0xzK19csy24H/2L6Et9Zqq3ak5CTBg0QvP9e R+hZIbMpHsSSnd7H+HwcE+fo4ApqrY+Eu6XmXGeHemL2w0S93+0kgFR7j9c7netS qGQPQpVwcwlVLcQpO4kD1GG3L7ylhP7NSU1GKa8UpHEpluq10zefQ7lFiN7ZKYVC /Pl9GEo4V8Ntpzr9T/T+S2UHVyd7Z9rmv+6LXA5nnnODbV21zt6qsfIyH9EcnEag sJUOtXetQzByno1/3z9osa937hjx9Y6KsygIzNoiws7thbcPtGKfPS9v5kMRnbDU Uys/kkCdXD7S4fbat99hQlBMO3ASJPTA9JbAjVMjbz/jUNDR26+jN+Xj9TDpky4= =zFzo -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161129160703.GO1145%40mail-itl. For more options, visit https://groups.google.com/d/optout.
[qubes-users] GUI Daemon error with new fedora-24-minimal template
Hi all Qubes 3.1 Have downloaded the new qubes-template- fedora-24-minimal however on starting it the following message is received "Dom0 GUI daemon do not support protocol version 1:1 requested by VM. To update Dom0..." etc Does the template require a version of gui currently only in testing repo? I'd have imagined yum would have warned me if so. Thanks -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/tgKwqYg1wmJsRQSeLyp7WSou_LhTLLCcyRCbzx_zQGOhmXa1-IDBAVKiKZeL8Ub4vAYgAdR5hQSXvzkpDnd8x1hUELQrFu8Brn-QrjD36mc%3D%40protonmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: HCL submission : Dell Precision 5510
Dne 11/29/2016 v 06:10 AM Brian Skinner napsal(a): On Saturday, November 26, 2016 at 1:03:23 PM UTC-8, Tomas Vondra wrote: Qubes 3.2 on a new Dell Precision 5510 ... seems to be working fine Hi Tomas, Thank you for posting your HCL report. I'm planning to buy a Dell 5510 laptop soon and it's great to have some reassurance that Qubes 3.2 will run smoothly on it! Did you get your laptop with the PCIe NVMe drive? I've heard that those drives can be a problem for some Linux installations, so I'm hoping you can reassure me on that too. Yes, I have the NVMe drive, and it seems to be working fine. I suspect it might be related to the UEFI issues (unable to boot from NVMe or something), but I might bee wrong. In any case, it works for me. How has the battery life been for you with the Dell Precision 5510? I'll be curious to see how the battery life compares when running Qubes 3.2 vs. Ubuntu 16.04 vs. Windows. No idea, I only really have the laptop since saturday, so a bit early to judge. In any case, I generally see ~6h estimae in the panel, with the 6-cell battery. regards Tomas -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a1431f0e-564c-2d36-2566-3c386285b552%40fuzzy.cz. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Qubes 3.1 on Skylake NUC?
On Wednesday, March 9, 2016 at 10:35:09 PM UTC-5, mwi...@mattwilson.org wrote: > I have a new i3 Skylake NUC (NUC6i3SYK) and am trying to install Qubes OS 3.1 > on it. Unfortunately, it's not working. 3.2 is working great on my NUC6i3SYK. Have you tried it yet? I'm typing this message from it now. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7809c1af-d80b-41ca-854d-1745ada80073%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.