[qubes-devel] Re: Should we migrate the documentation to another platform?
So, what do you all think? The goal should be that a lot more of the available attention and energy can flow towards the actual content, rather than maintaining "the system". RTD vs. Wiki Wiki's are ubiquitous and very easy to edit. But that could end up being a problem, as Konstantin already pointed out. RTD appears to be purpose built for what we need and widely used. The ability to retain git version history and signed commits is a huge plus. With documentation having the wrong information displayed is worse then having nothing. So making it easy to contribute is important, but having a tight review before publishing is too. Wiki's seem to be more of a mess in that context. /Sven -- public key: https://www.svensemmler.org/2A632C537D744BC7.asc fingerprint: DA59 75C9 ABC4 0C83 3B2F 620B 2A63 2C53 7D74 4BC7 -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-devel/97f2d979-90a7-b715-09c0-3689c53aae0c%40SvenSemmler.org. OpenPGP_signature Description: OpenPGP digital signature
Re: [qubes-devel] RFC - Salt formula - distribution and package removal
On 5/18/21 9:53 AM, unman wrote: Should this be a generic GUI or one for each package? Ideally there would be both. 1) "Configuration Wizard" - main view shows a list of available actions (from installed packages) - [add/remove actions] dialog that shows a list of available packages and allows to install/uninstall them. - [run] ... runs the selected action - [close] ... exits the "wizard" 2) "action" -specific GUI - some formula might need parameters (e.g. VPN config) before or during execution ... I don't see how that can be done with a generic GUI. Sorry for the late response, I've been fighting a strange issue (#6227) /Sven -- public key: https://www.svensemmler.org/0x8F541FB6.asc fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6 -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-devel/a389ce60-48b7-fc16-c1d3-c0e618f74170%40SvenSemmler.org. OpenPGP_signature Description: OpenPGP digital signature
Re: [qubes-devel] RFC - Salt formula - distribution and package removal
On 5/16/21 7:13 AM, unman wrote: Remove the effect of the state as best we can? That sounds messy to impossible as you already point out with "as best we can". I don't think a (non-technical) user would anticipate this to happen or be able to accurately predict the consequences. /Sven -- public key: https://www.svensemmler.org/0x8F541FB6.asc fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6 -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-devel/f7a51c4c-c9ec-d0a0-8bae-db0d513892e0%40SvenSemmler.org. OpenPGP_signature Description: OpenPGP digital signature
Re: [qubes-devel] broken dom0 updates, shall I report this at qubes-issues?
On 3/19/21 6:35 PM, Marek Marczykowski-Górecki wrote: Ah, you probably have Debian-based updatevm, which doesn't support this option. Then, use --clean. I do & did. Thank you! /Sven -- public key: https://www.svensemmler.org/0x8F541FB6.asc fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6 -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-devel/663cf5b5-5312-02a8-1f99-c1f4a3355c59%40SvenSemmler.org. OpenPGP_signature Description: OpenPGP digital signature
Re: [qubes-devel] broken dom0 updates, shall I report this at qubes-issues?
On 3/19/21 4:44 PM, Demi M. Obenour wrote: ‘qubes-dom0-update --clean’ should work. It did. Thank you! /Sven -- public key: https://www.svensemmler.org/0x8F541FB6.asc fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6 -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-devel/8113febf-ca0c-4272-6149-b69d7d986d21%40SvenSemmler.org. OpenPGP_signature Description: OpenPGP digital signature
Re: [qubes-devel] broken dom0 updates, shall I report this at qubes-issues?
On 3/19/21 2:03 PM, Marek Marczykowski-Górecki wrote: Are you sure you don't have security-testing or current-testing enabled? Those packages are currently only there. I had it enabled once to see which packages would update, but did not say yes ... so they might have been cached in the updatevm? You can retry with `qubes-dom0-update --refresh` That tells me "Command line error: no such option: --refresh" I am actually fine with enabling security-testing, I just said "no" because the dependency errors scared me. When I try again now, I still see the errors. Either the dependencies or with the additional parameters the warning that something critical will be removed. Is there another way I can force a --refresh? ... should I just wait? Since this is the devel list and this not a bug but something I did, shall I take it to qubes-users? Sorry for the noise. /Sven -- public key: https://www.svensemmler.org/0x8F541FB6.asc fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6 -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-devel/25dd4fe2-8065-d760-1c3c-89a165898eff%40SvenSemmler.org. OpenPGP_signature Description: OpenPGP digital signature
[qubes-devel] broken dom0 updates, shall I report this at qubes-issues?
This is on a install from the 4.0.3 ISO running for several months. I always only do sudo qubes-dom0-update (no security or other testing). Today I see this: Package Arch VersionRepository Size Upgrading: device-mapper-persistent-data x86_64 0.7.5-3.1.fc25 qubes-dom0-cached 435 k grub2-starfield-themex86_64 1:2.02-0.38.1.fc25 qubes-dom0-cached 2.2 M qubes-core-dom0-linux-kernel-install x86_64 4.0.29-1.fc25 qubes-dom0-cached 14 k qubes-mgmt-salt-dom0-update noarch 4.0.10-1.fc25 qubes-dom0-cached 55 k xorg-x11-drv-ati x86_64 18.0.1-1.1.fc25 qubes-dom0-cached 169 k xorg-x11-drv-nouveau x86_64 1:1.0.15-4.1.fc25 qubes-dom0-cached 100 k Skipping packages with conflicts: (add '--best --allowerasing' to command line to force their upgrade): PackageKit-glib x86_64 1.1.5-1.1.fc25 qubes-dom0-cached 129 k Skipping packages with broken dependencies: PackageKit x86_64 1.1.5-1.1.fc25 qubes-dom0-cached 664 k createrepo_c x86_64 0.10.0-6.1.fc25 qubes-dom0-cached 69 k createrepo_c-libsx86_64 0.10.0-6.1.fc25 qubes-dom0-cached 95 k deltarpm x86_64 3.6-17.1.fc25 qubes-dom0-cached 89 k drpm x86_64 0.3.0-3.1.fc25 qubes-dom0-cached 67 k hawkey x86_64 0.6.4-3.1.fc25 qubes-dom0-cached 64 k libsolv x86_64 0.6.29-2.1.fc25 qubes-dom0-cached 361 k python2-deltarpm x86_64 3.6-17.1.fc25 qubes-dom0-cached 36 k python3-hawkey x86_64 0.6.4-3.1.fc25 qubes-dom0-cached 47 k qubes-core-dom0-linuxx86_64 4.0.29-1.fc25 qubes-dom0-cached 54 k satyrx86_64 0.21-2.1.fc25 qubes-dom0-cached 108 k Transaction Summary Upgrade 6 Packages Skip 12 Packages So if I then try sudo qubes-dom0-update --best --allowerasing I get this error: "The operation would result in removing the following protected packages: qubes-core-dom0, dnf." /Sven -- public key: https://www.svensemmler.org/0x8F541FB6.asc fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6 -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-devel/aa34f007-c4ad-749f-9457-5570c302a2b6%40SvenSemmler.org. OpenPGP_signature Description: OpenPGP digital signature
Re: [qubes-devel] Re: Seeking an additional HCL maintainer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi Andrew et al, the PR is here: https://github.com/QubesOS/qubes-hcl/pull/32 I monitor the qubes-user list pretty much daily and will add new HCLs as they appear. Future-plans: * automate cleanup * validate format / fields (e.g. 'type') * build lookup tables for chip set and GPU short names ... so things are named consistently * export CSV format for download * find a way to recheck the mailing list against the HCL to find missing entries (found some from 2018 by chance) I was looking for a way to contribute, but are not a good (docu-) writer and my programming experience is more embedded C (no Python and/or XEN knowledge). /Sven - -- public key: https://www.svensemmler.org/0x8F541FB6.asc fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6 -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAl/DSPMACgkQ2m4We49U H7accg/+MVWCD27nNy4rcPZl+24aoiVXU8ISoZkgWQfFX1JSbx9uAyeJkLFYVFgL GJcFxGw46EMrW70ogZVM8PsvOJKeQLHMHVQrtgo851f2wgHKhFW3Ez12pJC0d2r5 Cq47SF2QzUSZAs4VQ649VwmOAItex2VdnhN1Dcek3WEuApvpMOcCW+UPnObupCRO PwlZXPyBXRk4Z2JyhkWmcL4Zra9VDnAkIA41TzWshw8ikmz+Iys5N2sfCilupgPJ ogq2bxomypD98FYr8qwjR0SQ8Sw7xJtvddJGaODM0/uDWDT5tsfmb4xbuUIKkJko BivRTbXdXzZlXj5yWDu7TX9KEdywWpKFnA6PIiBluqzJlU0XdoHYypFMhqhL/78G OxaJcWyi2xpq1CHui017Uj1+wbecdprZ4+qkT2c4mEo7SOYH2i/wm94aHh4LUQQ7 K2cVCjQfhzE9SeCL8WMZbuEQiFo9J/ofxyu5Km8LAbJBn54ihZ/N7m0SpmJaHB3X +6xUsZJHdUOslocEEWXmWd7FZUGUeACOC+8K3y0Z4m0mXrxpzxmw+z0/HdE7tz+f duO+CLb+uFuoCIKztMg0BOx/Qka8M+KtDFjnpqzVfzaAHPK0FbVzMj8+x30qjTh2 2XxTEJVgsZP7Pv/Z/v6FjDtmELM3qZhTUH/L3W66JTQlpNpqehw= =w5LY -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-devel/0bb93732-403f-0f34-5775-4ec0aef350b8%40SvenSemmler.org.
[qubes-devel] Re: Seeking an additional HCL maintainer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 11/25/20 6:05 AM, Andrew David Wong wrote: > If you'd like to volunteer for this role, please let us know by > replying to this thread or directly to me. Thank you! Started working on it: https://github.com/SvenSemmler/qubes-hcl/commits/master PR in a day to two. /Sven - -- public key: https://www.svensemmler.org/0x8F541FB6.asc fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6 -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAl++0yUACgkQ2m4We49U H7YxiRAAorvbmGze90hdJyZGIV7MdxpEJwFGqBecwwFnHZNwxmYgMf4txnQm5ljn 3tOKKoCvBnM95M9KZ1QggKHiKBaVfpcIv2X/8h0Op3YO2qRGrZV0a9PshdKkabU7 iPy5gbMtsjDpETzQhmkgTth4diNjnwv3mb1++xgq7tort8bYcDvdOt+Mkh/7u3Qt MBztHG1vkqaLaGEwa99YMm1ESjpa5YJ9SUOGVKD7ztublogF2ImxU7fyKkXouYZo djBiNTwc09BqynUMntYgDqdIZw188TKRcoys//AqT9/e0cehIiZgnICXaxzzKkUn 1Nw4LaJGhIgKfXAPVaJT49aUL6VAhxpk6awZc39S4dtCxPd0BkqQLeRdhsPHnDL8 EnVTFi/gLoPDsGtJhYx1LBkwNszzCai7pBu34GvWzWwaz6pmh6dkGPiCmmg2Lbbs j9zzYSzFDWhIPbIOd0/F3IUOjM9PiTQ0TLwMlfQyIB0OwNB8TFbWTyEXonZ/CAw5 jA/K+lXxHdYRHYZFOVyJ+0PMRPixaVbyPbzrBLUATuT/udWeyuJACKYf7Bt2gGO2 cRysuZFNKcEqCsPxCwNak7qYBVnHsMlcCAQAsrHmRIxH+RlPdWmSRVsIa1R2QLjx A9dndbP4ss2afqWZ7s796X6PU4mapeUK1fEDrD62+7DFLAr/64I= =XSJF -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-devel/83a639c5-85aa-d120-ac8f-d12dd300bf02%40SvenSemmler.org.
Re: [qubes-devel] Re: Help create a Qubes Users Forum! // news group // rfc3977!! news.qubes-os.org !!
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 7/28/20 2:39 PM, ludwig...@gmail.com wrote: > So having a security internet nerd operating system, why you > suggest a http based forum that loads tons of javascript shit to a > browser in order to simulate a news group?! Qubes OS is not (only) a "security internet nerd operating system", it is targeted at Journalists, Activists and everyone else having the need for a "reasonably secure OS". Requiring these people to download and configure a NNTP reader just to start asking questions would be counter productive. I miss the Usenet too and if this where a "nerd-only" thing I'd be totally with you -- but it's not. As you are surely aware qubes-(devel|user|project) are currently mailing lists and will surely continue to be for a long time to come. As it shapes up currently the Discourse Forums are additional and might take over in some distant future. > Use the tools and protocols that were designed for a service, > don't try to forcibly invent some shit using web browsers. I am with you. Nothing is stopping you from participating even in the Discourse Forum just using your Mail Reader (aka "Mailing List mode"). Those Mails are full of noise and HTML non-sense but a "nerd" like you surely knows how to filter that out. ;-) /Sven - -- public key: https://www.svensemmler.org/0x8F541FB6.asc fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6 -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAl8iLQgACgkQ2m4We49U H7ZTJRAA5P6n7JQpmIhT0DnhXs+dzgIolDxNHmIwl7OBFuMdUBnL4sXMsUOjXI9Y qGro3606ZCWufD1MridiMBVg/KxP4nXZo6R08TpdS/uEAh/HLhD7QQoi6EGnD2Hd m2H4K4j7ddJDxkIhlACMle62J6bo5rZAOzZ/F/k746K896qAjmV/YtxkNQtcrYuw 6nQp42wgrwXSv6+0f+XuM3jvJUYQYgZ2gBhczLXzcYh0T/RqftpHTT2rHRt4sGtr TFMX8IgKJGnqe7dcaXslxSQOyu4+NLjKh+vnpcE1X7Oyz8OE6dANtp5UekqRkmhD BhHQDBawhIW7MQl4wMzQUcTmpEXORaFPytHDPSjc0sOZM/wT3FruRtxkn7ifTVu0 OArMXK2eK447QG5Qs+nap0iOS4JIuEmVFITFOPJfhD/8lbX1pHr+BSbYZlCHTZVI xcDXAuem9txm4/HX6ViRhphItpU/9IGOpzNy630wNRQi2Gf+/ZZI1IAGuyN2WrlO 2+mxchxDInoNvcboOQR2g4eOdm868thtOIC1Q6CTeWEK1mYryKny5w1pFtMI9+MN 1EHQh7MZt0PZENt8a/iRQVKifow5owVI0x3RXc3ZogjiiKi+3hvR9ZVmBYi/b0MY 9DzJm+N1SKXcSr+VmYA9VaD67yHD+Q9iQYqwN9xtVKKiwdru9ms= =1c+3 -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-devel/321b73b2-97a3-8bd8-d3d3-bc12637864ed%40SvenSemmler.org.
Sorry! OT - Re: [qubes-devel] Bug, Qubes 4.1
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 I am sorry ... just realize this went to qubes-devel. It is obviously off topic here. Mea culpa! /Sven - -- public key: https://www.svensemmler.org/0x8F541FB6.asc fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6 -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAl7uk+sACgkQ2m4We49U H7aEHBAA5D1uJ+mQTyWBrTggIkI4vhZSR0w5KM6IJJ2ZDvjPQOwoQyaXVl2N/Fy0 7JuPOtGahCKnS4eKCJ+cL1tW06jyDeXGI8qlJVuNqCWaIKieVFfxwoRbFiLOuXoq nIH0kLyPvbDoM1z1+dA7n0zOgb6mbONs5joi2zyDUWB2szQsPH201uZJYeLBTKNf WraT4yuWuKgAL0nH1ZjebICt7bnGwWwcDuyDnnf4yVsmo48AzqJPYch1pi8xS4t6 KobWfThcB2oBfTf3OnQmxy8ZjpY3v5UTlZYDMqzzOjNQi4WY43FKn6RLS2libUFS E9ry03HUEQI78pt6u+lEq39kGGPDF1KunEit1hvwRavz4a1+ERH31V7N84TREYZ9 Cgl3PlWmoSZjqnpjzHqLNY3MUHSPS0IubGc1ig15sc/HYaNL5oABzVBCN8ElfX+z mJ2g2BxSJIBYm41x5duSGKDgfQgWwFr9TkB20hHmkG+AowbdsEoUUxhQeZdbPPmt axiB3mFqkJV8HRfNRSezXZXzbiMzP1OHkyYZjjmfd/uI/TFx8cKIjnZWSNF9YiHf rngL0qtPsfuN9vA3om1/fyTUpyklfVye+QN2s3oTE2kpqiXH0+dL0bYFmEwJPDvW A2sThtYxw64e85wYiirLar0hEhG57MW1l0fjykse4/zNzMniano= =WhMj -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-devel/97f274bf-08c3-91d1-1159-239497d5c0b7%40SvenSemmler.org.
Re: [qubes-devel] Bug, Qubes 4.1
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 6/20/20 5:21 PM, catacombs wrote: > Which makes me wonder how some view backups with Qubes. Obviously backups are essential, especially if you are still learning and like me sometimes do something that results in rather catastrophic states. Also, I do not keep anything in any cloud. It only exists on my Qubes install. So again: backups are essential. There are efforts of providing incremental backups for Qubes to only copy what changes and reduce backup time. I have no experience with that . Here is what I do: with the build-in backup of Qubes a full compressed and encrypted backup of everything on my machine takes between 4-5 hours and consumes ~260 GB. I have a 2TB USB3 external drive that is encrypted. When I am ready to go to bed, I shutdown all Qubes except sys-net (which in my case doubles as sys-usb), delete the oldest backup on the drive and start the backup with the option to turn the computer off once it is done. This way I always have the last 7 days. I also have a second drive where I manually copy the last backup of the month for the last 4 months. However, if I do something stupid I usually am aware of it right away and simply restore the backup from last night. Another advantage is that you can usually very well recall what you have been doing since the morning and copy just those few mails, projects / documents to a USB stick to be restored after restoring the big backup. Side note: maybe I do something fundamentally wrong, but my SSD based system slows down noticeably after several months. There's nothing like a clean Qubes install and restoring from backup to regain full performance. ;-) Also often I mess up just a single template, which can be restored much faster. In general, besides all the security related advantages of Qubes, I find it greatly liberating to have the freedom to experiment knowing I can always switch back to the working template / backup. Or even move my entire install to another computer as long as that computer runs Qubes. Fully recovering from any disaster never takes more than 5 hours. Try doing that with any other OS! /Sven - -- public key: https://www.svensemmler.org/0x8F541FB6.asc fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6 -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAl7ukzMACgkQ2m4We49U H7Z0nhAAwaOIXCJ4lL/U8d8LR1tzJ3tOEuKgWekdBGpcTwVKRrwr2D6ydL/ForX1 J16r+QBLUiKmM96rtASxpd44U1UkB7kAJC+HbuLjw6vbjCMErEfqC2A8VrSJU6zi 294B3KuQLV8jg8rrrETDSKRmV9vPBWsjo2J5Wb7rwAoL2mF+78jJkbpYKW4uGnBd N058bcP0ypdxBYHNue2HZ4N7IlPP1MTJzR0RRdNbgFWX9UYNqOjITl0TNZBKvwm7 eKQsujj6uNM32dalwx2/7SdfHT04wDdZKzmSGMPYEC52UDl6YN0BwZe/pjD81j63 Gfk3eFS3mWNNKSVWCMwGRFZSZwdUN4mpqU/GRyX6KHRP5u3kGm8fQoHUhGshHDux H0/lS5o1EXihq9yzUvpJd8fGfiaUNcPsCDeYBikl0F90I6QfEFSCO5Q5oa5utANh D2wwOWEqANIEJe5neh48FCFel7RzVdMqcKzhs3+yJyrYgXs5AHiVkqc59I5Y/Brd Du6tYVKvrtz9S9H/BGbC1LWOgp1xf0ERzH1+DEVFOwDPz6jOeM5ccyDuo/sFJyQK mg1OoGWVwmrQNJoP/0xmzb+QLIlMdamelCmEPK/2LkvM6v/fbCsYsvX5Lk4vsAuT EdyzC9U2tx36gcJ7MlmpzYV4TXmqB/8IR2DGs1d3EY/S4KN3VtU= =YPdf -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-devel/15eaccab-7157-7151-560e-22a0adc2c5e9%40SvenSemmler.org.
Re: [qubes-devel] Thoughts on PGP vs signify and age?
On Thu, Mar 19, 2020 at 06:11:05PM -0400, Konstantin Ryabitsev wrote: > That doesn't need to be any different from minisign. There are still > fingerprints people can post in their slides and in email signatures. :) > Or even the whole key, since it fits well within 80 columns. Got it. > with PGP. I merely suggest that it could be used in delegated-trust > situations and make the verification process much simpler for users to > follow. Thanks for the clarification! /Sven -- public key: https://www.svensemmler.org/0x8F541FB6.asc fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6 -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-devel/20200320012634.GB1126%40app-email-private. signature.asc Description: PGP signature
Re: [qubes-devel] Thoughts on PGP vs signify and age?
On Wed, Mar 18, 2020 at 02:24:48PM -0400, Konstantin Ryabitsev wrote: > I'm not at all saying we should abandon PGP -- I'm just suggesting that > Qubes releases can offer .minisign signature *in addition* to PGP. I > believe this has a benefit of making one-off verification a more > straightforward process. You are clearly an authority on the topic, so please take this as a question not critisism ... what's the point of a signature if I haven't verified they key? That's my take-away from this thread. That signify makes it easier for people who don't care to validate the key. Some years ago when I first started using Qubes I followed this instruction: https://www.qubes-os.org/security/verifying-signatures/#1-get-the-qubes-master-signing-key-and-verify-its-authenticity In particular the part where I searched they web for fingerprints of the qubes master signing key and also looked at slides from Joanna using serveral machines at different locations / networks. Only then I trusted it. I get all of that. That makes sense to me. And the trust flows from the master key to the release signing keys. Without that ... what's the signature worth? /Sven -- public key: https://www.svensemmler.org/0x8F541FB6.asc fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6 -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-devel/20200319025148.GA1106%40app-email-private. signature.asc Description: PGP signature
Re: [qubes-devel] Qubes 4.x Backup setting should not be set to save (replace) default settings by default
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 This thread might be better located in qubes-users. On 2/13/19 9:49 AM, Teqleez Motley wrote: > a) Where exactly does qubes save this password/backup settings > (file+folder, please) /etc/qubes/backup/qubes-manager-backup.conf > b) It seems to be ticked by default (per 4.0.1-RC/December, not > the latest bugfix which I am about to prepare to upgrade to...), in > case that is not changed this last month, isn't that default > setting actually bad (for the personal...) security? It depends... one could argue that if an attacker has *any* access to dom0 it's game over. So unless you tend to leave your PC unlocked and walk away ... in which case the saved backup password should be the least of your issues. /Sven -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAlxkq9MACgkQ2m4We49U H7ZoCQ/9HYPWOrBeiUxwSEQeqs4+Tm6QXp2ix8KmX9PNQZ2HQhmd/2EzER99VdSO B4obqlPdLc0Hr86RtwJbMFXrTjFe7HaM8ujMJPjVsvPZkEdpsMSlxZOLGDG6geL5 AYnr+ypRFJvguucSK6/CdoYj50N2wYZVxSieBHv4vVy2RO9T5bz/ihWu5EehsURs 5aV1iEqhMfi3t3qhxKdKQUyPMW9OqHcmOoHb+mFX/TCRgYIFKWbsjHq7Vi4fG9iz 8lwfKzDewoVkDyvZPjZMSRxmUf7Wop3+yzHjNsqlIrA98XnrxNBupF9PkfzoU3yl zRjJREnQ+QDcv8ivoW7WXhSxY0gBBYj9Kk8B6/XJe5ERXYPmDUdzw/YxBHJJx5q2 BSDSZHCjw++JvwyhRzPdtJAyQixa/JhwsdIz0Q1aYMEDo9kSfESXhIxH1UEJrRnv QzJcHvHtknu/W+8W9Fo9IQsi9+jhgEl/uh+qwyaxPG0DsCa/uQ7TZ+ywLCnmed4d eEUpj/A4My5O7WM17eVuU9rFo+ZQPGquqPqE0Gl0xwlSfxFsvLieS2NEfSL/M3rr +jNl/TogUM0h2bMV3W/zU5wXGj+2ZeL/nkq3kinrL75IdnJMqhdlfjgGOeg0XgkB p9Rm7ghegDcY2/dvDNRu1uN1HDaZb+5kSWEdlzgr2I6JWt6azdg= =MaKW -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To post to this group, send email to qubes-devel@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-devel/1f1a5b54-ec17-41c9-9bdc-f6383e6245a1%40SvenSemmler.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-devel] Qubes as #NextGen #FileManagement efficiency tool (alleviating Information Overload while securing the info..?!)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi Teqleez, you wrote: > a) the GUI / semi-automation / flow tools (or lack thereof), Can you name some example tools / use cases? Why would that be Qubes specific as opposed to be template specific (reusing tools from e.g. Manjaro)? > b) USB technology itself (not Qubes problem; but related to making > strategies for how/when to use Qubes...) I'm sorry to see you struggle that much. Do you experience these issues also on your Manjaro machine or just on Qubes? I too have frequent use cases with two USB3 HDDs connected and have not observed any problem (moving data between them). > I have also a recurring problem with connecting USB disks that are > firstly auto-recognized by dom0, but then impossible to attach to > a running Qube without restarting that Qube. You might want to create a USB qube, which will have several advantages for you: 1) increased security (dom0 never sees your USB device and whatever you connect is isolated in the USB qube) 2) assigning USB devices to other qubes still works 3) you could use the USB qube itself exactly as you would your standalone Manjaro machine (the USB controller is attached to that qube) https://www.qubes-os.org/doc/usb/ > Complicating challenge: More VMs, more RAM, less and less OK to > restart "anything"... What is your spec? I used Qubes for many months with 8 GB which was usable but sometimes showed limitations. Now with 32 GB I have not seen any issues (frequently running 12+ qubes in parallel) > There is simply too much time lost when having to restart, even > just one Qube, let alone the whole physical machine. Restarting a qube should be very fast ... I start to think you are maybe experiencing hardware issues. Maybe your computer is not well suited to run Qubes, maybe your USB controller has issues? > There is now a whole new sleuth of memory technologies coming out > shortly, which both boosts capacity and speed, and preserves data > through shutdown/restart/power-off (non-volatile memory). > > Perhaps Qubes would do well to skip its further development of > USB-related features, and go directly for the "new reality", which > will revamp almost all work/-flow and how we use computers in > general? You lost me there. Could you explain your meaning a bit more? > With that in mind, I would like to know if there is interest in > discussing the "next-generation-file-management" in Qubes context. > > How can Qubes help push the world forward when it comes to > smart(er) file handling (with security)? > > A framework with integrated automation tools comes to mind. (Think > "low-level AI tools", with emphasis on automation <-> GUI, not " > artificial intelligence".) Could you name examples. Do such tools exist on other distributions? /Sven -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAlv1ZZUACgkQ2m4We49U H7bOxg/+PfT3+2ehaDKlX5iqJuj9Ox5eovVACCkjwOgzpagExzeOt0Rzp3O4j26V Hx8CiaENwu97GOo8/6hkfnQcNcNA228yeUS1eJ6kf/EiNNkPWx1Z5RZHL3EDvQRE n0qcsY/ktUs+/QxEDBTcToYK+d32gEQjnFS9FL0rQhw+uE07fysQaJiudMsmi6T4 JLIw4AB1aB6/44TpH46CzQyuDJQqJFBhB+bYOsxZ38mz9dGb0R42i660XMn6DZZm jEsY+7J9l+WsbuP9o/YaJhQxxOPAmam4xWdhndrCeUbZk9m7MUuLCq8rklxaGC+h NpOn2m0cXq32gK5penU66olDd9vQ33kTY2C4uG2TkReVw+qXBLUx/2w0AxgnhlCN 6tXNOz7Ahy1zF6ZqiYP+qScGcPLA1l8nt6ofPm4nHJRFFc1jf9Y6PTYpiLALVivu SyYeX1le6VSttXZgY0o9kkwB3tEElDEbyzvB4ddViCobxYK55IfyP10VcXinnvSd fJ18Xp6DcyQJ0vSfNSiGIm5RPdxW/KV3Kie+T+ePRm0tcwxUrK76OFbFx08bxpFk r03j1PZJ6zF6LeUHxoPY5DwX6g+SY7Mc0zaI+jora2gKRenNic1PwIM9gntEdztJ +JXO+DYBVsAMdFuyo0JJg2ztpWAQHTrWMtAf58isi6l0UdXCoNw= =8hvU -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To post to this group, send email to qubes-devel@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-devel/305d3088-6238-f4cb-ce66-b25e39d06a94%40SvenSemmler.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-devel] Where does Qubes-UX fit in?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 11/20/18 1:30 PM, Doesnt Work wrote: > I want to know weather enduring the steep learning curve of a new > OS, or waiting for a more UX-focused version 4.1? I asked myself the same question, but then just couldn't wait to use R4. Now I am glad to have made the switch and must say the learning curve was not steep at all. There are only a handful of commands which will become second nature in no time: - -> qvm-ls ... shows your qubes and their state. The default output is sufficient in 99% of all cases. If you are missing something you will easily find a parameter to add it. - -> qvm-prefs ... is how you manipulate qubes. Easy and straight forward. - -> qvm-create, qvm-clone, qvm-remove ... are obvious. - -> qvm-pci to assign devices to qubes (hvm only!) - -> qvm-usb to assing usb devices There is also a qvm-features but I use that one only by instruction when creating named disposable qubes. I have no idea where you stand when it comes to UX. Personally I tried I3 on Qubes out of curiosity and didn't plan on using it at all. That was several months ago ... I still use it. -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAlv0susACgkQ2m4We49U H7Ysfg/+InE4GbnGljEAvvk5ZXizqdCO1FlRwxJww1XwRHFUGjPLgbrssE8U6xjw oetNGI9U4iFlekjCri03S/t3tdJo/JrphF791EwJIDUEDEEpORiZ7gKTzzQFMYDi XMd4SIBhCG9gFcHUefg7oDjQfjwiH1c5C7Dfn/XMblwOC1vLd8aC9Rc4UR4WBmxM WvkEzZywtar3oErUygz2UyU+Q5yTIb3TSr+JCu/V7hHigJsCL2C+I+aJQZiIXv7E rdgiArRSbwprC3PanDQ9AZZXoSZGii64/ru0ZuQ+Bro5cgvxNCVKuAErn+in7q5l F91o1cYARiSLKA8ouycITGBiAus2G8Ls0gEZW6VLI5iS3ubMqldj5FMnpHyngHBL toNZVNZcUds36auVqTiZtkwTC0jQF9h0xqjh4TQAQJdBHdsOGNVC45qBhIw5V4yf JUUJGWvNohtP+zs54G1orRWg7r5Iok2RgZ+9Gr4203USaYWFKRaLfXg4+BYTkIwy ZQ66Mbmswjbbm3//lfbgjQ8cEJQQ0pa0A9fqUaB/g6aUVSup9adZy8pEh6PqKafr iPXs/54pwtf74qyS4b54GNx+JbOV6BOB6q+gOLe1v6dEtwkB6Qc9Lmi9J4zTGMhn xKifPo2mf924t41C6R4b5jtoyVK8+p41YGSETKqaTzPYOKKUlnE= =8aDS -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To post to this group, send email to qubes-devel@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-devel/f922897d-5548-e66e-43e0-25323884b79e%40SvenSemmler.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-devel] [proposing new feature] Edit in VM: an idea that can improve security when managing documents
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 9/14/18 7:14 PM, unman wrote: > You dont say this, but if you use a minimal template for the > document vm, then you minimise the risk of inadvertently opening a > file there by mistake. That's in fact what I am doing - thank you for pointing that out. My 'documents vm' is based on fedora-28-minimal and only runs TheBrain 8, which is what I use to organize all my documents, thoughts and projects. Nothing ever gets open there. /Sven -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAluclU4ACgkQ2m4We49U H7ZB2A//W/xMR7dSGnOp8iRygKKli1OqCucu7oTdGneSp6yCLeYveZXu5invczPG rKGUofwIIWfW3EqRPu2Td/j2P0Dt5UV0Q7CDKJ39zFOS9liv9yYAcGgE2HcV59WX GcPwK8Kkbf/sFPKV8VkEfQVVsBlHl79KpsuF3Ixf6NX//YXyQV5Y9HA1MKg4AFdX WuFJXCTBIJjrrlMk/hfPPlXQDHS9uhOEW079So4nfk/hbMMocmuk9Zs0RW/cJ/pV +JBFo8JRT6B2E17p37ilnv0S0/adrbimkpfDzYUpecxRh/z+caP4oEg02bsR7gCQ HdQ1H/ahxaW4TUgUgtpJozidgZb9qrgBzK5bNsserRFQpgC+5kS5CXMz1Gv4CXZ2 FbVuQuXrpTH2jZXRvWk5IYYINY8tfilg/9Y3kYHG+gV61A8rSdNaI4pibznSYMd0 YKE2j89a+aNc2x73GkojT534FF406aZjoRW/s1Xmrxynd92Z210vgiPpoeeTu1Hm nD2IzwqhPJ9wowYZ3HhrUi40Tty4GC0VlvlYZJDasmG0Qh6C5P9FhLdq4TmiI1rI fPHUl0NHZeYbZ6ZS8OzKXqiqBc+BwkDW7A/vS89WJOEbBIvVsPPeorbpNXMByuGf 3l+YHJHIPhFCIp+ss07cIT8B2o8WtqoLa2WNaTveqkNxSOvOt2g= =8nHf -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To post to this group, send email to qubes-devel@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-devel/2b310f35-e2a9-ac2c-0360-9f146cbe036d%40SvenSemmler.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-devel] [proposing new feature] Edit in VM: an idea that can improve security when managing documents
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 9/14/18 2:16 PM, Matteo wrote: > there is a docx in the "documents vm" but you open it in a special > vm that allows you to edit it safely (kind of dispvm), all this > with just double click. You can already do this. All you have to do is set the default handler in your "documents vm" to use qvm-open-in-dispvm. You can even go a step further and hook up qvm-open-in-vm via a desktop shortcut (to provide an ignored vm parameter) and then change the policy in dom0 to always show you the dialog of all VMs to choose which one to open it in. Ivan Mitev explained the details to me back in May: https://groups.google.com/d/msg/qubes-devel/0CpN7ol1ZdM/0cBPvwc6CgAJ So in my setup: - -> whenever I click a web link I get a dialog and can choose to either open a new online dispvm or tor dispvm or open in an already running (disp) vm - -> whenever I open a document I get a dialog and I can choose to open in an offline disp vm or an already running offline disp vm ... in other words: everything I ever open (links and documents) is always in a disp vm and I can choose on the fly whether offline, online or with TOR. Since changes to a document in a dispvm propagate back to the calling VM this also works great for document I work on. If it wouldn't require customization of the guest vm (the default handler and the desktop shortcut), I would promote this to be the default behavior. But I should probably write it all up nicely and submit to the Qubes documentation. It's really powerful. Cheers, Sven -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAlucJJIACgkQ2m4We49U H7b7nQ/9HGyOn2Z1XWhvquuWAzBQPuJgE85cZ9IKCLK1OwjXpcUnej0/Dwa3jjL8 J6g2UVtsRx9/5jt0+tifRzFAlfOuFjvh/R80P335hnc4R+UceLq95dfnFaPFtLZk +TelcKnJ5haSIsO/XErKPs+OqA4L5Ukdf7Wym36zIOm5TGU5QnrXHlIYr/Dpyjdt sEG3gzk2itnTyEL4GOwK652tqMWHrzkc8ZnYLSmOOOdRCRJy/SCM+DV/DOSHrsvH SZr5HpnCVLFWHn8WZ2af7h28g+foautDpsHGDfoU6hC/GU21nmCYKchKWUeuE7jM sQCiVTv36MLgFD6WJg3hRZxr0x/T75V0iOAbS5rWZ+IRJaIoOF26ZrskYRfi5I62 MaeXgBFCMgvQr01pL6GUMMCrCIu01LViuJT8DsXW0vbxAI34gq1XexaUPaBWZJo5 rns+5oIixBUfuvROZPy3vwSKHxKdwFecHWkmVldFHcetnC9Q3rPveSRdAvhkNdQv JpiFeCy/3n20cU7yOAJhEhs1xnRA1XH7VhyW6Dn4T1MgHWh74eVaEqQOUyl9Q+J1 p8HGONz8zSsPO+o9e+OCa2fMaPA8nfrTo1VjazMP1OmW5xLWedJb915aG+nxEfCy ray1zbl2O8nCoOvtOOeJG1NeD7tv46m50Sv3SqbIXUOxS2KfLNs= =zISj -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To post to this group, send email to qubes-devel@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-devel/aa05d57c-724a-6235-1083-945a9ef783e0%40SvenSemmler.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-devel] help with creating a dispVM with a non-random name
On 05/02/2018 09:22 AM, Ivan Mitev wrote: > I'm trying to implement "semi-persistent" dispVMs (in 4.0) that could > be used for more than one time, until the service call ends (eg. the > browser is closed by the user). I understand what you are looking for and would like something like that too. Unfortunately I lack the knowledge/skill to contribute this myself but let me at least share the idea: You know the dialog that pops up in Qubes 4 now when one calls qvm-copy or qvm-move to select the target VM? It would be great if qvm-open-in-vm would show a simliar dialog if no target VM was specified. In that dialog one could choose an app VM, an existing DispVM instance or create a new DispVM. I copy and paste plenty of URLs everyday. My default DispVM connects to TOR ... but there are other URLs in my email that link either to a specific Jira issues (open in dev VM) or a link that identifies me in some way (makes no sense to open that over a TOR connection - is actually harmful). Still most links I want to open in the DispVM with TOR (Whonix) as they are just links to articles, presentations and nothing in the URL identifies me. /Sven -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To post to this group, send email to qubes-devel@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-devel/313c65f1-9834-5b2e-9d01-3f2070a3e7f9%40SvenSemmler.org. For more options, visit https://groups.google.com/d/optout. signature.asc Description: OpenPGP digital signature
Re: [qubes-devel] R4.0-rc4 installation image considerations
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 02/02/2018 03:34 PM, Sven Semmler wrote: > I am struggling to see your perspective. Maybe I am an old fart, > but Thunderbird and Firefox are very much essential to me. I am > not looking for a big debate, which would be off topic here anyway > ... just wanted to give feedback that there might be more people > like me very much depending on the duo. Ignore me. I am totally on board with bare-bones templates and then downloading whatever you actually like to use. /Sven -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAlp02icACgkQ2m4We49U H7Yo2A//eL8GxtOWCHiLd9DuMkqSoZMH0+wLVhf7jPs3thXxsZAUHHqDLbni14AA mO/vmxDcq+UCK6D4ok1OGIcfrwv19YioNKPJN59mn3CKI5DOGOp5LYkB37YnNYOy z7McnmXq1TyjIO82XG+rdjMfr8QBT+KVgQqlWJWNx0HdsSyGdk2bzOf5RfHE1/HD trTZ3fDU+1IV9/yLzcQ0li1hVTR1lswGnxDkWoDN4csPPdufd9hFDiAnnqRXqZv2 zmqpuoeB1prRs+l44yUcgtbyt1EAVuT+RLacVIICJKR/nnXL/uuKohk4Z1JZFGWq kXm//L75kk+4KqfuXsx4w4sYv0VzjSAKRDQbTra+5SihJiinYNnSaSIs6tXjuFFh vKerNHzxip3kvFfp1+4BTNa3t9fU8RSIw9Aq4YJrVQ8kCAdpb3f35W4GLuwt+0GX EVe1Qkp9rANYW5ZMEXKrVQRhDyW5ov5kLomLPbZNsmikc2a+nq8lSj/GL62NuVor OstSFyKkMfz5RtjKxsBJT68lGUl4owf9AXRcchfM7l+UHWDRmW06TbAm3lmHMdUl h71XZrK48Y8eeEj32hLUDzlpPa1rUrBEo4EOz1CgbkEEoN4MUkThLIe6sJ11XC8a 4aV9DI6+x83kNNR14iRkNpH46nqXQVy85BVTJupVzqBaydOE0D4= =GDqN -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To post to this group, send email to qubes-devel@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-devel/50db52da-6447-3dc4-8624-682d066b8ed1%40SvenSemmler.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-devel] Re: Delay of Qubes 4.0rc2
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 09/20/2017 01:25 PM, yuraei...@gmail.com wrote: > Qubes comes across as being a bit too modest, or too silent for > that matter. Essentially at times leaning over towards the other > opposite extreme. I don't speak for anybody other than myself. Just a user, not a Qubes OS developer. Yes, Qubes OS is awesome... but it's not ready for the masses. Installing and customizing Qubes OS requires troubleshooting, time/commitment and often compromise. The team seems well aware of it: https://www.qubes-os.org/news/2017/07/08/toward-a-reasonably-secure-lapt op/ Until adopting Qubes OS is a lot easier, it might be better to target enthusiasts and people who have an urgent need (journalists, activists etc) and are hence motivated to work through the initial roadblocks. Until there are Level 0 (compatible) or maybe even Level 1 (certified) laptops available. One gets only one shot at making a first impression. If Qubes OS gets hyped now, most people will try and give up. It will be hard then to get them to try again. /Sven -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQIcBAEBCAAGBQJZwsZAAAoJENpuFnuPVB+2hZoP/07z3Y/39TptbUp+Rqa3vSzr I052yK5DxLqPCD7LAJmuEnT27gwCHHWG/wL+ayKv84TgSlMxNQC9lGOb4qH5EdBe pHSS1Q4KzheJzNsGirOp6IPtAQ3eDdGL/1PzraNHWu6Xx8Ve1EC5cuW6k2tG1QIk lKCi4Hl8xGeF8MY79MlY3gyFMLHtYl1x0aiSXlJNBwpWy4KWHJv8U7NGD4TXD5ii bAVr3o/zQOwAcXx2Q8E/MHKWTLlYjBJOm3bKCdqUnsLNkdqTfTyG3hMprZLJJewd mQsMmpBdYpBSI5io4T1OE7HDgcgoi6eAqbC8e950VMC114yUiQpszL5452vAQXMI su7/6KHo4PXDHA7l8Ab3LG9hadN8UzRcbnPesF2sjayfoz2Jx20lcnrOn/aqRWAH PM4KZY5OveXnAQi/nTiVlPQm7b9a6J9yHjLr7HoZEsF2aW+JzETkac8LLrCPht24 R7ABh57hZZ/0/huyKLGL3Gli58Dc6TdR5BNgZ+TWSIN5JvYhpcYQk0xvMCOGHp4T 4nZ1TLRPCFXmDv/l6xLKKfvzMw5DTYJyoIStvnynZYxpj4+cD3pKTu2oif7Gi+8q TUMRfxNUqOjZtrpJcG3oiDwdAx7f+uUbhj2hS28Rzp4y88ajWwDor8yXF7gyUdH+ kDBfjqZemp/GKUn0SrOb =Ylbs -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To post to this group, send email to qubes-devel@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-devel/67d58640-9b0a-8dcf-4a42-c296825b395d%40SvenSemmler.org. For more options, visit https://groups.google.com/d/optout.