[qubes-users] Re: Why is there no built-in nvidia driver support? aka GTX 980 issues

2016-09-15 Thread J. Eppler
So my big question is: why does Qubes OS not have built-in GPU support? why is 
it working better on integrated graphics?

Integrated graphics cards are mostly Intel based. Intel is one of the top 
contributors to Linux and provides free and open source drivers for their 
integrated GPU's. 

Nvidia is one of the worst companies [1] when it comes to Linux open source 
graphics drivers. On the other hand, Nvidia provides well supported proprietary 
driver.

However, including binary drivers in an open source operating system is always 
difficult and raises security problems, since it is impossible to audit the 
source code of the proprietary driver. Who knows what the proprietary driver 
really does?

Another problem is the switching mechanism between integrated and discrete GPU 
in Laptops, Nvidia did never provide any source code or driver for that. The 
open source community had to fill that gap. 

I personally would like to see a powerful open source Noveau driver for Nvidia 
cards which outperforms Nvidia's proprietary driver. 

[1]: [Linus Torvalds Gives Nvidia the Finger. 
Literally(]https://www.wired.com/2012/06/torvalds-nvidia-linux/)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/50d4825b-4e0d-4a22-899f-01b72b58244d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Blob free linux kernel?

2016-09-15 Thread J. Eppler
Thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/98c3e385-d8f9-43bd-aca5-eea620dc1722%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: Negative test result for fedora 24... Was: Re: Request for test: Re: [qubes-users] Fedora 24?

2016-09-15 Thread J. Eppler
Is it a good idea to spend time on fedora 24? Fedora 25 should be released in 
November/December and will use Wayland per default. Would it not be better to 
skip Fedora 24 and focus on resources and efforts on Fedora 25?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e5054298-6e4a-4e51-93b1-b7b55713b413%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Usb device

2016-09-15 Thread Drew White
On Friday, 16 September 2016 06:53:25 UTC+10, kater...@sigaint.org  wrote:
> > On Tuesday, September 13, 2016 at 12:48:50 PM UTC+2, kater...@sigaint.org
> > wrote:
> >> Hello
> >> I haven't understood yet how open an usb device in Qubes (or in VM that
> >> I
> >> choose).
> >> Can someone explain me how do I do?
> >>
> >> Thank you
> >
> > See here for the how-to, at the bottom for 3.2: ->
> > https://www.qubes-os.org/doc/usb/
> 
> I have the 3.1, is it the same?

What do you mean by "open up a usb device"?
Are you trying to connect via RAW data connection?
Are you trying to connect via Telnet or SSH or something?
Are you attempting to open a USB Data Device?
Are you attempting to connect to a USB NIC/Modem?

Please provide details.

I have no issues connecting to anything like this on Qubes 2, 3, 3.0, 3.1, 
3.2RC1.

I may be able to help once I know details.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6b934694-a546-4b4f-95e9-445de2a84221%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HCL - Lenovo T530 2429CQ9

2016-09-15 Thread Drew White
On Thursday, 15 September 2016 09:19:37 UTC+10, Andrew  wrote:
> Installation from a USB stick took some time but worked fine. 
> 
> To boot, I have had to go into the BIOS and force the Intel integrated GPU on 
> (ie disable the NVIDIA GPU). I may try to work through the troubleshooting 
> steps for the NVIDIA GPU but for my needs, the Intel is fine for now.

Do you have any issues with GPU speed on a second and third 1920x1080 monitor 
connected via DVI on a standard 120W Docking Station?

I have noticed that when I tested it on my T530, on monitor 2 and 3 the mouse 
would lag really badly and monitor 4 on VGA was just fine.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d2887fef-2ef5-4af2-96d8-9d7626fa2fa7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Encfs + Dropbox: How to keep your cloud files secure?!

2016-09-15 Thread Drew White
On Friday, 16 September 2016 07:45:14 UTC+10, mara.k...@gmail.com  wrote:
> Hi,
> 
> I just installed Qubes OS and I feel its freakin awesome!
> 
> I am trying to set it up the way I want and one thing on my list is having a 
> dropbox vm that provides simply just the cloud storage... I would like to run 
> the actual encryption on a different qube because I dont at all trust dropbox.
> 
> How would I setup a qube that runs dropbox and exposes its filesystem 
> securely to another qube that runs encfs which in turn can then be used to 
> safely store & view cloud files via qubes OS standard file sharing 
> capabilities?!
> 
> My idea was to run NFS on dropbox qube and connect to NFS with the encfs 
> qube, but that's in several unfortunate.
> 
> 1) I don't trust NFS
> 2) NFS is unreliable in combination with EncFS
> 
> 
> I want to get rid of the network connection...
> 
> How would you solve this?
> 
> Thanks a bunch!

"Encfs + Dropbox: How to keep your cloud files secure?!"

The answer to the question is "You can't"
There is NO WAY to secure files in DropBox or any other third party cloud 
system that can be accessed by the entire world.

Create your own cloud on your own servers behind your own firewall in your own 
office/house, and then secure it, then you will have a "cloud" system that 
isn't really a cloud (because you know where it is and also where your data is) 
that is relatively secure.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/84ec5fc2-4bec-4119-a3df-3f8307b53d3a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] VGPU output access

2016-09-15 Thread Drew White
Hi folks,

I'm trying to access the VGPU output for a guest, and wondering where I would 
go to find out how to access it, or what file I had to read, or what data 
stream I had to access?

Any information that would allow me to gain access to it would be grateful.

Sincerely,
Drew.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c9c4965e-9f92-4032-865f-3d6cb3d8db27%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Bitcoin Qubes tutorial

2016-09-15 Thread Franz
On Thu, Sep 15, 2016 at 5:26 AM, Andrew David Wong  wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-09-14 19:11, Franz wrote:
> > On Wed, Sep 14, 2016 at 8:54 PM, Marek Marczykowski-Górecki <
> > marma...@invisiblethingslab.com> wrote:
> >> On Wed, Sep 14, 2016 at 08:07:35PM -0300, Franz wrote:
> >>> On Thu, Jun 30, 2016 at 12:42 AM, Andrew David Wong 
> >>> wrote:
>  On 2016-06-29 09:37, Franz wrote:
> > But how can I trust a printing dispVM for something as sensitive as
> > a hot wallet? We would need two different dispVMs but we are not
> > there yet.
> 
>  Indeed, not yet, but it will be implemented in R4.0:
> 
>  https://groups.google.com/d/topic/qubes-devel/xLZU0R5ijCg/discussion
>  https://github.com/QubesOS/qubes-issues/issues/866
>  https://github.com/QubesOS/qubes-issues/issues/2075
> 
> >>>
> >>> Andrew,
> >>> After various tests I am getting a bit more confidence about bitcoins.
> >> So I
> >>> prepared the promised tutorial. I tried to go to Qubes documentation to
> >> see
> >>> if there is any way to upload it, but found no reference. So I post it
> >>> here. Perhaps you know what to do.
> >>
>
> Thank you for taking the time to write this, Franz. However, we
> already have a page on using Split Bitcoin wallets (using
> Electrum) here:
>
> https://www.qubes-os.org/doc/split-bitcoin/
>
> Nonetheless, it looks like your guide has some additional
> information that is missing from the current page. Please
> consider submitting a pull request against this page with your
> additions.


Andrew
Additions? Well I used a somehow different way, because i sign the
transactions on both the hot and the cold VM. So the hot VM is not for
"watching" it is for doing exactly all what does the non-connected one
(including signing) and obviously for doing the real job of generating
addresses for receiving and sending bitcoins to other addresses. It is what
is called multi-signature.

Is it worth to sign the transaction two times, once for each VM? I do not
know, but it is not so much additional work because in both cases you
always have to copy a file forward and back between VMs.

But the two ways are somehow alternative. I see no point to mix them in the
tutorial just to increase confusion to a matter that is already a bit
complicated.

The final part of editing the firewall rules of hot VM to limit connection
to Electrum servers may be worth to protect the keys in hot VM, but may
have less sense if there are no keys to protect in hot VM.

So did nothing, but am obviously open to suggestions.
Best
Fran


> You can see the documentation guidelines including
> a step-by-step how-to) here:
>
> https://www.qubes-os.org/doc/doc-guidelines/
>
> - --
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> -BEGIN PGP SIGNATURE-
>
> iQIcBAEBCgAGBQJX2ltIAAoJENtN07w5UDAwZwwQAL6eJaF0jCqlsKkN94DTFfYw
> 9fcC2w/ybGbPii7h0zHeuzpLsdKc8BQt1ijQ4UiBKzotEQIqyBGDW5xs/7ex6iYn
> vZibLWsfDK9Zoxqj0kxlZrGTmHbzInvWTVIjtoKY7pOfDfosgGTBqvd9uM1RqSn3
> MfWuWbJtY2JjRp4+Q80IUS4soQB8Emcm7ZSEBqu6TvX61ycBWyxm/DDLt9xLoFNg
> WFB6jVFnUGkucRoKEKwevVOfFoSiLTPjiDjIarlhTKaiG1NCT5otItbfq60mdZcf
> BYqS+1vb5WDm55YdDy8p4znz0ImKcLErmUZK+TgRLK4Yi36bvKb3EXr3gUQa4Tqd
> MZHpjR6IP/t4tbgBXWc7x6CDqFv+T8LRdD1v5IlsmMl7RmcyV8ES1xFwYXDl4I81
> 7iYvOPjTqoMOASIOejdkuufu+adfgy4BYLqd1SV/C1oJk8SXJ0dkuvoT4IJ1nDBc
> FAHIDE9S1MiJZ2fdHGq/B6plrDe/JluhT9L0A8NPCIZetCkTcvgyQQ5CrNyR2UWw
> nedk+L2zvzwNQxbZXXVmGSR3gczEkWYfn/ZT+OAFmo72qWPJmLwtmZg/q9zbm6Vw
> Bd7ne4mbnOyLshrQ6ZFVui0ZnDfQn4QLauMEQEwS2xNEU88qjIjlNt4klpwtFPVN
> 5AWniVUYJXpjwvKiJeSx
> =OMbs
> -END PGP SIGNATURE-
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qAAHdbVz9LkTTENM-f1_%2BPhhG7HHezOv%2B%3DcMHvpVs4pRg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Encfs + Dropbox: How to keep your cloud files secure?!

2016-09-15 Thread Chris Laprise

On 09/15/2016 05:45 PM, mara.kuens...@gmail.com wrote:

Hi,

I just installed Qubes OS and I feel its freakin awesome!

I am trying to set it up the way I want and one thing on my list is having a 
dropbox vm that provides simply just the cloud storage... I would like to run 
the actual encryption on a different qube because I dont at all trust dropbox.

How would I setup a qube that runs dropbox and exposes its filesystem securely to 
another qube that runs encfs which in turn can then be used to safely store & 
view cloud files via qubes OS standard file sharing capabilities?!

My idea was to run NFS on dropbox qube and connect to NFS with the encfs qube, 
but that's in several unfortunate.

1) I don't trust NFS
2) NFS is unreliable in combination with EncFS


I want to get rid of the network connection...

How would you solve this?

Thanks a bunch!



The operative word here is 'expose'... There is probably no secure way 
to share something as complex as a filesystem, which is why Qubes has no 
built-in file sharing capabilities.


You could use qvm-copy-to-vm or the equivalent in the context menu of 
the file browser... but that copies whole files between vms.


You could also create one disk image per vm on dropbox, and somehow set 
them up as loopback devices in the dropbox vm. This allows you to 
'share' data to client vms as disk blocks using qvm-block, which is far 
less risky than sharing filesystems. You would also have to encrypt the 
disk images in each client vm to make this truly secure.


Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c7cd8a12-f6a5-c33e-477d-f18070f73ae7%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Encfs + Dropbox: How to keep your cloud files secure?!

2016-09-15 Thread mara . kuenster
Hi,

I just installed Qubes OS and I feel its freakin awesome!

I am trying to set it up the way I want and one thing on my list is having a 
dropbox vm that provides simply just the cloud storage... I would like to run 
the actual encryption on a different qube because I dont at all trust dropbox.

How would I setup a qube that runs dropbox and exposes its filesystem securely 
to another qube that runs encfs which in turn can then be used to safely store 
& view cloud files via qubes OS standard file sharing capabilities?!

My idea was to run NFS on dropbox qube and connect to NFS with the encfs qube, 
but that's in several unfortunate.

1) I don't trust NFS
2) NFS is unreliable in combination with EncFS


I want to get rid of the network connection...

How would you solve this?

Thanks a bunch!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7a5fc95d-8fe8-4c00-8e53-94ae4d660456%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Spoof MAC address

2016-09-15 Thread katerimmel
Hello
Little issue
After running:
cd /var/run/qubes-service/
sudo touch macspoof-enp0s0
sudo touch macspoof-wlp0s1

I see the files, but when I shutdown the VM and restart there aren't more.
MAC address spoof anyway. Is it normal?

Than you



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c2a44570b1fd5985cbcd504c888f5b95.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Usb device

2016-09-15 Thread katerimmel
> On Tuesday, September 13, 2016 at 12:48:50 PM UTC+2, kater...@sigaint.org
> wrote:
>> Hello
>> I haven't understood yet how open an usb device in Qubes (or in VM that
>> I
>> choose).
>> Can someone explain me how do I do?
>>
>> Thank you
>
> See here for the how-to, at the bottom for 3.2: ->
> https://www.qubes-os.org/doc/usb/

I have the 3.1, is it the same?


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3c110d66e7c41c3378617c45654bcec3.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Why is there no built-in nvidia driver support? aka GTX 980 issues

2016-09-15 Thread tom
Hi,

I've been toying with Qubes for the past week and it really struck me when I 
realized that it's the future of what an OS should be. Since then I've been 
obsessed trying to make it run anywhere but the only computer running it 
perfectly is my Lenovo X220 otherwise my other (Macbook Pro Retina, and a 
gaming PC with a GTX 980 nvidia GPU) are simply not even starting the install 
nor a completed install on a USB3 SSD drive I did to test. I tried every idea I 
could find with grub flags (nodemodeset, etc) the closest I got to doing 
something on my GTX 980 based PC has been starting the anaconda installer in 
CLI mode.

It just won't show anything on that GPU. FYI it is hooked via an HDMI cable to 
a LG television. If I let it go without messing the grub flags my tv shows an 
"invalid format" error I guess because the resolution is wrong but if I start 
it and remove the quiet flags to see what goes on I can see some sys-net VM 
error or something but it just stops and never do anything. I can't switch to 
console nor try to see more logs.

So my big question is: why does Qubes OS not have built-in GPU support? why is 
it working better on integrated graphics?

It would be KICKASS to have this run on a monster machine. I swear I would 
install this everywhere. Put it on my toast when I wake up in the morning and 
even wash myself with it! Qubes OS blows my mind and I really really want to 
use it.

Keep up the amazing work, sorry I wish I could provide more details/debug info 
but don't hesitate to ask for any kind of testing on my end.

Thanks and have a nice day!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/75738424-2b09-489d-80a6-1e780d444b1c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Proper way of implementing unlock with keyfile instead of passphrase

2016-09-15 Thread 0mn1cub3
Good evening.

I'm hoping someone can give me a hand here. What I am trying to do is setup my 
Qubes install so that "/" is unlocked with a keyfile and not a passphrase. 
Preferably an encrypted keyfile that can be decrypted using keyscript in 
/etc/crypttab. 

Adding a keyfile using cryptsetup and then adding an entry in /etc/crypttab 
doesn't seem to work and I do not think forcing dracut to omit "systemd" is a 
good idea, from my limited know-how.

Another solution I found is to copy the keyfile to initramfs but if it isn't 
encrypted, another bad idea. I have not yet found a way to get keyscript to 
work in order to encrypt the keyfile copied to initramfs.

Any information and help on this matter is greatly appreciated.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/035bf29b-299a-4695-ab95-094df899dde9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Compiling Archlinux Template failed on make qubes-vm/vmm-xen-vm

2016-09-15 Thread necrokulto
On Wednesday, September 14, 2016 at 3:05:22 PM UTC, pqg wrote:
 
> The script is not outdated so much as incomplete.  It merrily assumed
> that the final component of the Archlinux release number was a counter,
> but I now suspect it's actually the day-of-month.  Most months the ISO
> is cut on the first day of the month, but this month it was cut on the
> third.
> 
> You may override the release number without modifying the script by
> exporting the following environment variable before building:
> 
> export ARCHLINUX_REL_VERSION=2016.09.03
> 
> This is, of course, not at all clear to the casual user and a legitimate
> bug.
> 
> Secondly, as you note, the autoreconf command is missing from the build
> chroot.  autoreconf is a component of autoconf, and it is sufficient to
> add "autoconf" and "automake" or, more succinctly, "base-devel" to the
> "pkgs" variable in prepare-chroot-builder.  I've not investigated what
> changed here, but presumably base-devel used to be present by default or
> as a dependency of something else, but ceased to be some time in the
> last 9 months (when I last built the Qubes Archlinux template).  I've
> submitted a trivial pull request to integrate this:
> 
> https://github.com/marmarek/qubes-builder-archlinux/pull/12
> 
> Alas, having cleared these obstacles, you'll hit another issue noted a
> couple of weeks ago in the thread to which Foppe pointed you.  This one
> was precipitated by the Archlinux update to glibc 2.24 in early August.
> 2.24 deprecated readlink_r, which is used by (at least) Xen 4.6;
> meanwhile, Xen builds with deprecation warnings treated as compilation
> errors.  The fix went into Xen 4.7 a few months back, but has not been
> backported to 4.6.
> 
> The work-around reported by Jovan in the other thread involves pointing
> at the Xen 4.7 branch of a couple of marmarek's development repos with a
> custom builder.conf.  I don't know enough about Xen to say whether this
> risks weird and wonderful interactions between the client libraries and
> the host Xen, but I think the balance of probability is that is should
> be okay to talk to an older host with a newer client of the same major
> version number.
> 
> Let me know how you get on :)


I've already follow the workaround, but still have another problem persist on 
'gui-agent-linux-vm' while 'make qubes-vm' below:

: Starting full system upgrade...
 there is nothing to do
--> Archlinux dist-package (makefile)
  --> Building package in /home/user/qubes-src/gui-agent-linux
sudo BACKEND_VMM=xen chroot "/home/user/qubes-builder/chroot-archlinux" su user 
-c 'cd "/home/user/qubes-src/gui-agent-linux" && cp archlinux/PKGBUILD* ./ && 
env http_proxy="" makepkg --syncdeps --noconfirm --skipinteg'
==> Making package: qubes-vm-gui 3.1.7-5 (Thu Sep 15 14:27:41 UTC 2016)
==> Checking runtime dependencies...
==> Installing missing dependencies...
error: target not found: pulseaudio<9.0
==> ERROR: 'pacman' failed to install missing dependencies.
/home/user/qubes-builder/qubes-src/builder-archlinux/Makefile.archlinux:120: 
recipe for target 'dist-package' failed
make[2]: *** [dist-package] Error 1





BTW, there's another error before that on 'gui-agent-linux', but I already 
solved it by installing 'xorg-server' package by using pacman on 
chroot-archlinux. By modifying the 'PKGBUILD' to solve the 'pulseaudio<9.0' 
version issues bring me another error like this:



gcc -march=x86-64 -mtune=generic -O2 -pipe -fstack-protector-strong 
-Wno-deprecated-declarations -I../include/ `pkg-config --cflags vchan-xen` -g 
-Wall -Wextra -Werror -pie -fPIC -DUSE_XENSTORE_H -D_FORTIFY_SOURCE=2  -c -o 
../gui-common/error.o ../gui-common/error.c
../gui-common/error.c: In function ‘dummy_handler’:
../gui-common/error.c:37:5: error: this ‘if’ clause does not guard... 
[-Werror=misleading-indentation]
 if (!print_x11_errors)
 ^~
../gui-common/error.c:40:2: note: ...this statement, but the latter is 
misleadingly indented as if it is guarded by the ‘if’
  XGetErrorText(dpy, ev->error_code, buf, sizeof(buf));
  ^
cc1: all warnings being treated as errors
make[1]: *** [: ../gui-common/error.o] Error 1
make[1]: Leaving directory '/home/user/qubes-src/gui-agent-linux/gui-agent'
make: *** [Makefile:50: gui-agent/qubes-gui] Error 2
==> ERROR: A failure occurred in build().
Aborting...
/home/user/qubes-builder/qubes-src/builder-archlinux/Makefile.archlinux:120: 
recipe for target 'dist-package' failed
make[2]: *** [dist-package] Error 2

Any help?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f7ca5969-b385-405f-8c3e-24bd62b959ad%40googlegroups.com.
For more options, visit 

Re: [qubes-users] Minor annoyancies in X since I've started using xfce

2016-09-15 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Mon, Sep 12, 2016 at 08:49:06PM +0200, Achim Patzner wrote:
> Hi!
> 
> 
> 1) I never noticed this but I have been typing in dark rooms lately: The
> screen saver does not dim the keyboard when it is turning off the
> backlight on my P-series machines; I'm fairly sure it was working on R
> 3.1 (but I was not using xfce there, I only noticed its presence after
> someone decided to make it the only supported dm). Marek, could you try
> that on a W-series, too (alt- and wait)?

Will try it later, lack of space on desk to do it right now...

> 2) If I mute the sound completely by pressing the respectice key (or
> sending the X11 event) I cannot un-mute it any other way than using the
> sound settings; none of the keys does the job.

Yay, there is a fix for this one:
https://github.com/QubesOS/qubes-issues/issues/2321

> Am I the only one who would like getting the good old times back?
> 
> 
> 
> Achim
> 
> 

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJX2nppAAoJENuP0xzK19csAgUH/0oSxfGcYegiS63DDX6XjrEW
LAA4+tfpZCILKdvOQyRj0RJT6/aI3sojrKkFxkSrXUpJ1uWkWvL6/qGkWhLatWMe
kzy3hXI5hj/Vgx11z2+a1IHO+EVm9WlpwhWCm+gw/igosHKA4fx9ofpVRp5Cct9k
3y0Do8sN2TmVXbW3J13DgY5ITWMshT2/W9v8A0TdQ5CHlkfwpgSCHFE7xPzlf2Fq
WSC80HUQAiBhy7+43xbSILc0gee7aiDL8xEoA+TFcmcDUmWjkCl/11S6FuQZZtr+
P9SiiJiM3h29EJ2CBuMmWojnfMTaKknWJj9FkB6mjIU1jmF3rckGIkMaV/ikt0I=
=Gj4W
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160915103937.GC31510%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: got vagrant kinda working

2016-09-15 Thread pixel fairy
On Thursday, September 15, 2016 at 3:28:36 AM UTC-7, pixel fairy wrote:
> ssh.insert_key = false and libvirt.driver = "qemu" set globally. after 
> vagrant box add centos/7, vagrant up took 10minutes and 14 seconds. tried two 
> boxes with a private network to try to ping one from the other, and the 
> laptop rebooted while the vagrant boxes were coming up. 
> 
> dont know why. without virtualization, qemu is just an emulator.

seems the laptop overheats, causing the shutdown.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7838185e-d714-4b8b-ad2e-92d77a1427b7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] memory balancing for linux hvm?

2016-09-15 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Thu, Sep 15, 2016 at 02:51:24AM -0700, pixel fairy wrote:
> is it possible to use the automatic memory balancing for linux hvms? 

Probably yes. You need qubes-meminfo-writer running there. You can
install it as part of qubes-linux-utils package, or compile it manually
from here:
https://github.com/QubesOS/qubes-linux-utils/tree/master/qmemman

`make && make install` from qmemman directory should be enough.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJX2noiAAoJENuP0xzK19csviMH/2v7Ohly5yTTPWqi/eV8Fc84
J0pijq/qxZYR632P1fbiroWwgQWWlo2sWeNvmfQHB/h4V5//r3yUQp4bm+dRas2g
hmnOTaN+VMD0rMzzH22w7x+efMbla/hr8eWGtaXQUwA7wOGL4AYtcA92oBx2oc7H
pdons9RldFO6NjvakBqvdnD4Rc0FOygF842EgEEEM/unYMY1QxHsEi8m0RhwFzGE
Q3p03JpKTLXhmPPos9IQWH1YDpZhK6LgUyP4Uc/D08yIqsPzF1ouEw5IkET0FeQ/
UPWTNiHey6GpEFnrr4WYwdgH/AVtw86a3+Wb5vOXkDXRhwCw2HVJUQTm8V4KqJE=
=gwsp
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160915103826.GV7339%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] got vagrant kinda working

2016-09-15 Thread pixel fairy
ssh.insert_key = false and libvirt.driver = "qemu" set globally. after vagrant 
box add centos/7, vagrant up took 10minutes and 14 seconds. tried two boxes 
with a private network to try to ping one from the other, and the laptop 
rebooted while the vagrant boxes were coming up. 

dont know why. without virtualization, qemu is just an emulator.

conclusion: make a vagrant server you can ssh to.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/abc6f8a0-38ba-47e5-bc50-6dfb1b5c9263%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] new hardware for qubes.

2016-09-15 Thread pixel fairy
On Thursday, September 15, 2016 at 12:25:04 AM UTC-7, Robin Schneider wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> On 15.09.2016 09:14, pixel fairy wrote:
> > https://www.crowdsupply.com/design-shift/orwl
> > 
> > personally wouldnt pay that kind of money for a box with only 8 gigs of 
> > ram, but its got some good ideas.
> > 
> 
> Hey
> 
> Have you seen
> http://blog.invisiblethings.org/2016/09/03/thoughts-about-orwl.html yet :) ?

lol! 12 days ago!

ok, this contributes nothing to discussion. ill delete the thread.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3e83b311-67ee-4406-9e35-d9063e3be63c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] 3.2-rc1, xfce4 volume control

2016-09-15 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-09-07 02:54, Connor Page wrote:
> volumed and mixer are not maintained by xfce team anymore [1]
> since audio relies on pulseaudio it would make sense to use pulseaudio plugin 
> and key bindings in dom0.
> 
> [1] http://www.xfce.org/about/news/?post=1425081600
> 

Thanks. Tracking:

https://github.com/QubesOS/qubes-issues/issues/2321

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJX2mO4AAoJENtN07w5UDAwBe8P/iKlPkqlotabor7o7eALUjH0
WYf6XOU5zJVqT2sb85t2UdlGDfpfTJa/FvbdEeYE/2VT3Yxjwz7NBjJvk/eIo/2S
R8msxW/bfIkgh0O/mo27afXRiLCgvhC4QnFWknFFyX2Tna8Agn5mt+imqWUKZnap
GVTAvccmb4KNQkXdZxsRUmU4B21dTTvOqICZ8fKDqE2dSnNGmmOHbiDlVBYW0tBL
KAxfLzcM/VB8RNFgubLcwGDcf9WVvX2UqmChGCpY0k46euDqeDNWQFSgdakVz/8w
cy0zHIAUMLCgpeKLYB/FlMCtado7vkfLxZOOqpx3I+SU1RoPnxSU75gpiwBBGLh6
NneL05X2MyDpFtekbVuTBC/quC6DGVh8oj5UjUnRj7G9R9zYbtS0Emmf2r4clV4A
XOmguN3duyF1BJdMWkNNtS71R7CvyNdmWTmHeS1yK9cxbnmEAX9ez8CMl/mBIOKC
jv1hTGGY78K3ILqdeBYMj37t798ajRA1IjcCHF6HNUSm1Nk81/FhQpsIGbjUiF7b
k24rzr2qP7ylil15GREDY13rgpSS0/MgT30xWPbPgX0FSrWstN2norynf/8q5nIb
Rt6Y+Wb9Zkw2/OqKs6kVJX16jtPw2yN792lDlqwoQn7H32SXj+DmowuvAUidvn0Y
WVIaUXdSyIE4zYZkFIoQ
=CBYq
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a489fa51-8a90-9aaa-1a36-98a615a89765%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] macspoof broken in 3.2rc3

2016-09-15 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-09-08 06:29, throw_a...@sigaint.org wrote:
> *** Expected behavior:  macspoof script automatically scrambles network
> interface MACs at sys-net startup using instructions from [1], just like
> in R3.1.
> 
> [1] https://www.qubes-os.org/doc/anonymizing-your-mac-address/
> 
> *** Actual behavior:
> 
> [user@sys-net ~]$ sudo systemctl status macspoof@wlp0s1
>  macspoof@wlp0s1.service - macchanger on wlp0s1
>Loaded: error (Reason: Invalid argument)
>Active: inactive (dead)
> 
> Same on wired interface. ifconfig confirms MAC addresses are not changed.
> 
> *** Workaround:
> 
> Set configured wireless networks to not automatically connect; and start
> the computer with no connected Ethernet cables.  Then:
> 
> [In sys-net:]
> sudo ifconfig wlp0s1 down
> sudo macchanger -r wlp0s1
> sudo ifconfig wlp0s1 up
> [Repeat as necessary for each interface for which randomized MAC is desired.]
> 
> [Manually connect to wireless network using Network Manager applet, plug
> in cable, etc.]
> 
> *** Additional notes:
> 
> Could it be something flaky with my hardware's interaction with new
> drivers? IIUC, sys-net was/is the same fedora-23 in both R3.1 and R3.2rc3.
> So, same drivers. Or could a qubes-specific startup script ordering be now
> wrong?
> 
> Thanks!
> 

Thanks for the report. Added as comment to our currently open
MAC randomization tracking issue:

https://github.com/QubesOS/qubes-issues/issues/938#issuecomment-247272139

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJX2mLpAAoJENtN07w5UDAweJ8P/1+4cLxpalu4uCIU+JhALakS
hCBuDUx1NY0d3cZ5OyoXATJqTN4Xn729ARpfr5phfqoMHKAPVfEivFIbV/xW7Ki/
WI6Hxsg+WKWAJ/Gf0GEir+iXhChhejA0FfEaWpaUP/0/COYedBrHxYUMslOksj0+
jQTOO1xvpROEGQ49OA1JjgzfB7SvrBCRu42c+KxS6iZ3gxOSC9YbiV3tWYjGeU3M
ogVBMQc+mm9TWSlZgOIsD487tL5E/M/kMffADLj9L7jl0L62qkNnn+ZIa1TiMGLP
VlI80YhEe6Pz92n7eKlZXyrOB1Qqa0FAhJG4Y9Yq2fHv725HZkEPy1VrudefomlS
ryiAJ/iL5mSRY75s9e1UAeqa5NmUrqk1QPNoXe6VuUvdfrOeF/Uh/9TVVmsS+ClW
zuzq4wK42sxA0UsTjySdPJr2guJL4LgFrZj8SfqHmm7ddeuiuK4XLHnRfAZEAJos
oHQTvryKsVtUkDpT1a7brERFQmdo7thGsOeAFooIElggo9gQhdeltWrc43ZzhGi/
IG4x8ip0vv4MEgbcRJE4++6SmtUrSFpppGO5f37yK7UA4WZlkvEAit/hkWCmGgTV
gYHlttb3uhae+iVMxCY2QY1aCrYhIvZARV1UFW+mYvMC8hbmEnMwHkI/BRMchBU8
TYSNRP0uNurvvUHuGJEw
=FpqE
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/29612814-875c-49b8-ddd3-485981d138ff%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Split dm-crypt 0.1.0

2016-09-15 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-09-08 11:11, Rusty Bird wrote:
> Hi,
> 
> I've worked on this mostly out of stubbornness :), but maybe it is
> useful for someone here. README.md pasted below.
> 
> https://github.com/rustybird/qubes-split-dm-crypt
> 
> Rusty
> 

Added a link to the Qubes doc index so that people can find
this in the future:

https://github.com/QubesOS/qubes-doc/commit/1448c1e7ab8ba17c7a9b9fdd53fcdefb0f1b329b

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=xPVu
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/007965ca-6563-ce81-5210-c745a396fb3a%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] VA-API in AppVM

2016-09-15 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-09-14 10:42, Sebastian Jug wrote:
> Hey guys,
> 
> A big problem for me with Qubes is being able to do random mundane
> tasks like watching YouTube videos. Is it possible to get video
> acceleration working in appvm specifically VA-API?
> 
> I know the 3d acceleration is not possible unless it's in a HVM but
> this may be more straightforward?
> 
> Thanks.
> 

Can you be more specific about the problem you're currently
encountering? A lot of people here watch YouTube videos in
AppVMs without any problem (myself included).

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=F4Ga
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9acb41ad-a3a0-8485-3450-26c75938d6c8%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Bitcoin Qubes tutorial

2016-09-15 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-09-14 19:11, Franz wrote:
> On Wed, Sep 14, 2016 at 8:54 PM, Marek Marczykowski-Górecki <
> marma...@invisiblethingslab.com> wrote:
>> On Wed, Sep 14, 2016 at 08:07:35PM -0300, Franz wrote:
>>> On Thu, Jun 30, 2016 at 12:42 AM, Andrew David Wong 
>>> wrote:
 On 2016-06-29 09:37, Franz wrote:
> But how can I trust a printing dispVM for something as sensitive as
> a hot wallet? We would need two different dispVMs but we are not
> there yet.

 Indeed, not yet, but it will be implemented in R4.0:

 https://groups.google.com/d/topic/qubes-devel/xLZU0R5ijCg/discussion
 https://github.com/QubesOS/qubes-issues/issues/866
 https://github.com/QubesOS/qubes-issues/issues/2075

>>>
>>> Andrew,
>>> After various tests I am getting a bit more confidence about bitcoins.
>> So I
>>> prepared the promised tutorial. I tried to go to Qubes documentation to
>> see
>>> if there is any way to upload it, but found no reference. So I post it
>>> here. Perhaps you know what to do.
>>

Thank you for taking the time to write this, Franz. However, we
already have a page on using Split Bitcoin wallets (using
Electrum) here:

https://www.qubes-os.org/doc/split-bitcoin/

Nonetheless, it looks like your guide has some additional
information that is missing from the current page. Please
consider submitting a pull request against this page with your
additions. You can see the documentation guidelines including
a step-by-step how-to) here:

https://www.qubes-os.org/doc/doc-guidelines/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=OMbs
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7525e69d-d899-3d1d-6e42-bf9c78daaca9%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: netvm doesn't recognize physical hardware switch state

2016-09-15 Thread Connor Page
no. it looks exactly as acpi problem. have you tried a Fedora live dvd/usb? If 
it doesn't work then the problem is not specific to Qubes. please try.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b9bf38a1-c63c-4e97-9faa-59cd41146cdd%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] new hardware for qubes.

2016-09-15 Thread Robin Schneider
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 15.09.2016 09:14, pixel fairy wrote:
> https://www.crowdsupply.com/design-shift/orwl
> 
> personally wouldnt pay that kind of money for a box with only 8 gigs of 
> ram, but its got some good ideas.
> 

Hey

Have you seen
http://blog.invisiblethings.org/2016/09/03/thoughts-about-orwl.html yet :) ?

- -- 
Live long and prosper
Robin `ypid` Schneider
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJX2kzFAAoJEIb9mAu/GkD4+M0P/R6OjwTBOZ9N4pikguMZdf4/
lVzmmwFnoaLJgopjnb3Iou2TzjOQzIx6YxF1VYHFrAMO/47y+rrnf9m+fML7qlHM
K5BAGSZsRr2tpQqXOvvIZarONKLmQtsUPiOM0My5VMfgPCz8Jkmx1ngGJsoDRo3M
14ozX3PD5/2r19KPviBGJQow2nPxnCKGxjhApgqqJMIsReDxF82gO3SFv22qARF9
LOMjS69G9b0ogT/+0y0I8fjGukK+u1F4VYib8N6ZY31wdvZ3g8B5t7yvAWmAOmGE
CjMghJMT8cWOFgqpP73oAl+/l/0po0iVhVmD8ab8h2/t6/YM8YBv7W2v1fjFcFDi
s0X2ZxVYYtCTW57STbtWQY4EXF3XEHbJWQekyFOqO19nVTJHYCTv9dyUTUq1Lb5e
EHKkVhZXEJdNp/WNibIquUA8MQBNTC7/LMh+XiAh9MbMAvc61G/mYsLGdoKqWnqf
FJPQKiuj2Z9cckOwNTc02ZIqc3waRajjdGVM11esVjjuOl+Z3pm5w+zueixxYJvK
YWjWqOvTWkHAusNFV2JwOn1NVSDx7breCn8Pmv9XmcjHkmRLFfwFgDlONZKuLwb5
HlfFvCaB1GWHPdxq3nx8FTMDv9zXPSLc6ObroQEgT1oSbnwO7fxlfA+pV/s8YbZ3
0gzO6QcBkDgtRPsrbcXl
=LPlU
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/386284e9-7a20-a7ca-1ea2-ff47fd9d00b3%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] new hardware for qubes.

2016-09-15 Thread pixel fairy
https://www.crowdsupply.com/design-shift/orwl

personally wouldnt pay that kind of money for a box with only 8 gigs of ram, 
but its got some good ideas.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2a4189e2-b7e6-4acf-81f6-dbf7221c26a6%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.