[qubes-users] Re: Why is there no built-in nvidia driver support? aka GTX 980 issues
So my big question is: why does Qubes OS not have built-in GPU support? why is it working better on integrated graphics? Integrated graphics cards are mostly Intel based. Intel is one of the top contributors to Linux and provides free and open source drivers for their integrated GPU's. Nvidia is one of the worst companies [1] when it comes to Linux open source graphics drivers. On the other hand, Nvidia provides well supported proprietary driver. However, including binary drivers in an open source operating system is always difficult and raises security problems, since it is impossible to audit the source code of the proprietary driver. Who knows what the proprietary driver really does? Another problem is the switching mechanism between integrated and discrete GPU in Laptops, Nvidia did never provide any source code or driver for that. The open source community had to fill that gap. I personally would like to see a powerful open source Noveau driver for Nvidia cards which outperforms Nvidia's proprietary driver. [1]: [Linus Torvalds Gives Nvidia the Finger. Literally(]https://www.wired.com/2012/06/torvalds-nvidia-linux/) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/50d4825b-4e0d-4a22-899f-01b72b58244d%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Blob free linux kernel?
Thanks. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/98c3e385-d8f9-43bd-aca5-eea620dc1722%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: Negative test result for fedora 24... Was: Re: Request for test: Re: [qubes-users] Fedora 24?
Is it a good idea to spend time on fedora 24? Fedora 25 should be released in November/December and will use Wayland per default. Would it not be better to skip Fedora 24 and focus on resources and efforts on Fedora 25? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e5054298-6e4a-4e51-93b1-b7b55713b413%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Usb device
On Friday, 16 September 2016 06:53:25 UTC+10, kater...@sigaint.org wrote: > > On Tuesday, September 13, 2016 at 12:48:50 PM UTC+2, kater...@sigaint.org > > wrote: > >> Hello > >> I haven't understood yet how open an usb device in Qubes (or in VM that > >> I > >> choose). > >> Can someone explain me how do I do? > >> > >> Thank you > > > > See here for the how-to, at the bottom for 3.2: -> > > https://www.qubes-os.org/doc/usb/ > > I have the 3.1, is it the same? What do you mean by "open up a usb device"? Are you trying to connect via RAW data connection? Are you trying to connect via Telnet or SSH or something? Are you attempting to open a USB Data Device? Are you attempting to connect to a USB NIC/Modem? Please provide details. I have no issues connecting to anything like this on Qubes 2, 3, 3.0, 3.1, 3.2RC1. I may be able to help once I know details. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6b934694-a546-4b4f-95e9-445de2a84221%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: HCL - Lenovo T530 2429CQ9
On Thursday, 15 September 2016 09:19:37 UTC+10, Andrew wrote: > Installation from a USB stick took some time but worked fine. > > To boot, I have had to go into the BIOS and force the Intel integrated GPU on > (ie disable the NVIDIA GPU). I may try to work through the troubleshooting > steps for the NVIDIA GPU but for my needs, the Intel is fine for now. Do you have any issues with GPU speed on a second and third 1920x1080 monitor connected via DVI on a standard 120W Docking Station? I have noticed that when I tested it on my T530, on monitor 2 and 3 the mouse would lag really badly and monitor 4 on VGA was just fine. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d2887fef-2ef5-4af2-96d8-9d7626fa2fa7%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Encfs + Dropbox: How to keep your cloud files secure?!
On Friday, 16 September 2016 07:45:14 UTC+10, mara.k...@gmail.com wrote: > Hi, > > I just installed Qubes OS and I feel its freakin awesome! > > I am trying to set it up the way I want and one thing on my list is having a > dropbox vm that provides simply just the cloud storage... I would like to run > the actual encryption on a different qube because I dont at all trust dropbox. > > How would I setup a qube that runs dropbox and exposes its filesystem > securely to another qube that runs encfs which in turn can then be used to > safely store & view cloud files via qubes OS standard file sharing > capabilities?! > > My idea was to run NFS on dropbox qube and connect to NFS with the encfs > qube, but that's in several unfortunate. > > 1) I don't trust NFS > 2) NFS is unreliable in combination with EncFS > > > I want to get rid of the network connection... > > How would you solve this? > > Thanks a bunch! "Encfs + Dropbox: How to keep your cloud files secure?!" The answer to the question is "You can't" There is NO WAY to secure files in DropBox or any other third party cloud system that can be accessed by the entire world. Create your own cloud on your own servers behind your own firewall in your own office/house, and then secure it, then you will have a "cloud" system that isn't really a cloud (because you know where it is and also where your data is) that is relatively secure. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/84ec5fc2-4bec-4119-a3df-3f8307b53d3a%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] VGPU output access
Hi folks, I'm trying to access the VGPU output for a guest, and wondering where I would go to find out how to access it, or what file I had to read, or what data stream I had to access? Any information that would allow me to gain access to it would be grateful. Sincerely, Drew. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c9c4965e-9f92-4032-865f-3d6cb3d8db27%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Bitcoin Qubes tutorial
On Thu, Sep 15, 2016 at 5:26 AM, Andrew David Wongwrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 2016-09-14 19:11, Franz wrote: > > On Wed, Sep 14, 2016 at 8:54 PM, Marek Marczykowski-Górecki < > > marma...@invisiblethingslab.com> wrote: > >> On Wed, Sep 14, 2016 at 08:07:35PM -0300, Franz wrote: > >>> On Thu, Jun 30, 2016 at 12:42 AM, Andrew David Wong > >>> wrote: > On 2016-06-29 09:37, Franz wrote: > > But how can I trust a printing dispVM for something as sensitive as > > a hot wallet? We would need two different dispVMs but we are not > > there yet. > > Indeed, not yet, but it will be implemented in R4.0: > > https://groups.google.com/d/topic/qubes-devel/xLZU0R5ijCg/discussion > https://github.com/QubesOS/qubes-issues/issues/866 > https://github.com/QubesOS/qubes-issues/issues/2075 > > >>> > >>> Andrew, > >>> After various tests I am getting a bit more confidence about bitcoins. > >> So I > >>> prepared the promised tutorial. I tried to go to Qubes documentation to > >> see > >>> if there is any way to upload it, but found no reference. So I post it > >>> here. Perhaps you know what to do. > >> > > Thank you for taking the time to write this, Franz. However, we > already have a page on using Split Bitcoin wallets (using > Electrum) here: > > https://www.qubes-os.org/doc/split-bitcoin/ > > Nonetheless, it looks like your guide has some additional > information that is missing from the current page. Please > consider submitting a pull request against this page with your > additions. Andrew Additions? Well I used a somehow different way, because i sign the transactions on both the hot and the cold VM. So the hot VM is not for "watching" it is for doing exactly all what does the non-connected one (including signing) and obviously for doing the real job of generating addresses for receiving and sending bitcoins to other addresses. It is what is called multi-signature. Is it worth to sign the transaction two times, once for each VM? I do not know, but it is not so much additional work because in both cases you always have to copy a file forward and back between VMs. But the two ways are somehow alternative. I see no point to mix them in the tutorial just to increase confusion to a matter that is already a bit complicated. The final part of editing the firewall rules of hot VM to limit connection to Electrum servers may be worth to protect the keys in hot VM, but may have less sense if there are no keys to protect in hot VM. So did nothing, but am obviously open to suggestions. Best Fran > You can see the documentation guidelines including > a step-by-step how-to) here: > > https://www.qubes-os.org/doc/doc-guidelines/ > > - -- > Andrew David Wong (Axon) > Community Manager, Qubes OS > https://www.qubes-os.org > -BEGIN PGP SIGNATURE- > > iQIcBAEBCgAGBQJX2ltIAAoJENtN07w5UDAwZwwQAL6eJaF0jCqlsKkN94DTFfYw > 9fcC2w/ybGbPii7h0zHeuzpLsdKc8BQt1ijQ4UiBKzotEQIqyBGDW5xs/7ex6iYn > vZibLWsfDK9Zoxqj0kxlZrGTmHbzInvWTVIjtoKY7pOfDfosgGTBqvd9uM1RqSn3 > MfWuWbJtY2JjRp4+Q80IUS4soQB8Emcm7ZSEBqu6TvX61ycBWyxm/DDLt9xLoFNg > WFB6jVFnUGkucRoKEKwevVOfFoSiLTPjiDjIarlhTKaiG1NCT5otItbfq60mdZcf > BYqS+1vb5WDm55YdDy8p4znz0ImKcLErmUZK+TgRLK4Yi36bvKb3EXr3gUQa4Tqd > MZHpjR6IP/t4tbgBXWc7x6CDqFv+T8LRdD1v5IlsmMl7RmcyV8ES1xFwYXDl4I81 > 7iYvOPjTqoMOASIOejdkuufu+adfgy4BYLqd1SV/C1oJk8SXJ0dkuvoT4IJ1nDBc > FAHIDE9S1MiJZ2fdHGq/B6plrDe/JluhT9L0A8NPCIZetCkTcvgyQQ5CrNyR2UWw > nedk+L2zvzwNQxbZXXVmGSR3gczEkWYfn/ZT+OAFmo72qWPJmLwtmZg/q9zbm6Vw > Bd7ne4mbnOyLshrQ6ZFVui0ZnDfQn4QLauMEQEwS2xNEU88qjIjlNt4klpwtFPVN > 5AWniVUYJXpjwvKiJeSx > =OMbs > -END PGP SIGNATURE- > > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAPzH-qAAHdbVz9LkTTENM-f1_%2BPhhG7HHezOv%2B%3DcMHvpVs4pRg%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Encfs + Dropbox: How to keep your cloud files secure?!
On 09/15/2016 05:45 PM, mara.kuens...@gmail.com wrote: Hi, I just installed Qubes OS and I feel its freakin awesome! I am trying to set it up the way I want and one thing on my list is having a dropbox vm that provides simply just the cloud storage... I would like to run the actual encryption on a different qube because I dont at all trust dropbox. How would I setup a qube that runs dropbox and exposes its filesystem securely to another qube that runs encfs which in turn can then be used to safely store & view cloud files via qubes OS standard file sharing capabilities?! My idea was to run NFS on dropbox qube and connect to NFS with the encfs qube, but that's in several unfortunate. 1) I don't trust NFS 2) NFS is unreliable in combination with EncFS I want to get rid of the network connection... How would you solve this? Thanks a bunch! The operative word here is 'expose'... There is probably no secure way to share something as complex as a filesystem, which is why Qubes has no built-in file sharing capabilities. You could use qvm-copy-to-vm or the equivalent in the context menu of the file browser... but that copies whole files between vms. You could also create one disk image per vm on dropbox, and somehow set them up as loopback devices in the dropbox vm. This allows you to 'share' data to client vms as disk blocks using qvm-block, which is far less risky than sharing filesystems. You would also have to encrypt the disk images in each client vm to make this truly secure. Chris -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c7cd8a12-f6a5-c33e-477d-f18070f73ae7%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Encfs + Dropbox: How to keep your cloud files secure?!
Hi, I just installed Qubes OS and I feel its freakin awesome! I am trying to set it up the way I want and one thing on my list is having a dropbox vm that provides simply just the cloud storage... I would like to run the actual encryption on a different qube because I dont at all trust dropbox. How would I setup a qube that runs dropbox and exposes its filesystem securely to another qube that runs encfs which in turn can then be used to safely store & view cloud files via qubes OS standard file sharing capabilities?! My idea was to run NFS on dropbox qube and connect to NFS with the encfs qube, but that's in several unfortunate. 1) I don't trust NFS 2) NFS is unreliable in combination with EncFS I want to get rid of the network connection... How would you solve this? Thanks a bunch! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7a5fc95d-8fe8-4c00-8e53-94ae4d660456%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Spoof MAC address
Hello Little issue After running: cd /var/run/qubes-service/ sudo touch macspoof-enp0s0 sudo touch macspoof-wlp0s1 I see the files, but when I shutdown the VM and restart there aren't more. MAC address spoof anyway. Is it normal? Than you -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c2a44570b1fd5985cbcd504c888f5b95.webmail%40localhost. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Usb device
> On Tuesday, September 13, 2016 at 12:48:50 PM UTC+2, kater...@sigaint.org > wrote: >> Hello >> I haven't understood yet how open an usb device in Qubes (or in VM that >> I >> choose). >> Can someone explain me how do I do? >> >> Thank you > > See here for the how-to, at the bottom for 3.2: -> > https://www.qubes-os.org/doc/usb/ I have the 3.1, is it the same? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3c110d66e7c41c3378617c45654bcec3.webmail%40localhost. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Why is there no built-in nvidia driver support? aka GTX 980 issues
Hi, I've been toying with Qubes for the past week and it really struck me when I realized that it's the future of what an OS should be. Since then I've been obsessed trying to make it run anywhere but the only computer running it perfectly is my Lenovo X220 otherwise my other (Macbook Pro Retina, and a gaming PC with a GTX 980 nvidia GPU) are simply not even starting the install nor a completed install on a USB3 SSD drive I did to test. I tried every idea I could find with grub flags (nodemodeset, etc) the closest I got to doing something on my GTX 980 based PC has been starting the anaconda installer in CLI mode. It just won't show anything on that GPU. FYI it is hooked via an HDMI cable to a LG television. If I let it go without messing the grub flags my tv shows an "invalid format" error I guess because the resolution is wrong but if I start it and remove the quiet flags to see what goes on I can see some sys-net VM error or something but it just stops and never do anything. I can't switch to console nor try to see more logs. So my big question is: why does Qubes OS not have built-in GPU support? why is it working better on integrated graphics? It would be KICKASS to have this run on a monster machine. I swear I would install this everywhere. Put it on my toast when I wake up in the morning and even wash myself with it! Qubes OS blows my mind and I really really want to use it. Keep up the amazing work, sorry I wish I could provide more details/debug info but don't hesitate to ask for any kind of testing on my end. Thanks and have a nice day! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/75738424-2b09-489d-80a6-1e780d444b1c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Proper way of implementing unlock with keyfile instead of passphrase
Good evening. I'm hoping someone can give me a hand here. What I am trying to do is setup my Qubes install so that "/" is unlocked with a keyfile and not a passphrase. Preferably an encrypted keyfile that can be decrypted using keyscript in /etc/crypttab. Adding a keyfile using cryptsetup and then adding an entry in /etc/crypttab doesn't seem to work and I do not think forcing dracut to omit "systemd" is a good idea, from my limited know-how. Another solution I found is to copy the keyfile to initramfs but if it isn't encrypted, another bad idea. I have not yet found a way to get keyscript to work in order to encrypt the keyfile copied to initramfs. Any information and help on this matter is greatly appreciated. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/035bf29b-299a-4695-ab95-094df899dde9%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Compiling Archlinux Template failed on make qubes-vm/vmm-xen-vm
On Wednesday, September 14, 2016 at 3:05:22 PM UTC, pqg wrote: > The script is not outdated so much as incomplete. It merrily assumed > that the final component of the Archlinux release number was a counter, > but I now suspect it's actually the day-of-month. Most months the ISO > is cut on the first day of the month, but this month it was cut on the > third. > > You may override the release number without modifying the script by > exporting the following environment variable before building: > > export ARCHLINUX_REL_VERSION=2016.09.03 > > This is, of course, not at all clear to the casual user and a legitimate > bug. > > Secondly, as you note, the autoreconf command is missing from the build > chroot. autoreconf is a component of autoconf, and it is sufficient to > add "autoconf" and "automake" or, more succinctly, "base-devel" to the > "pkgs" variable in prepare-chroot-builder. I've not investigated what > changed here, but presumably base-devel used to be present by default or > as a dependency of something else, but ceased to be some time in the > last 9 months (when I last built the Qubes Archlinux template). I've > submitted a trivial pull request to integrate this: > > https://github.com/marmarek/qubes-builder-archlinux/pull/12 > > Alas, having cleared these obstacles, you'll hit another issue noted a > couple of weeks ago in the thread to which Foppe pointed you. This one > was precipitated by the Archlinux update to glibc 2.24 in early August. > 2.24 deprecated readlink_r, which is used by (at least) Xen 4.6; > meanwhile, Xen builds with deprecation warnings treated as compilation > errors. The fix went into Xen 4.7 a few months back, but has not been > backported to 4.6. > > The work-around reported by Jovan in the other thread involves pointing > at the Xen 4.7 branch of a couple of marmarek's development repos with a > custom builder.conf. I don't know enough about Xen to say whether this > risks weird and wonderful interactions between the client libraries and > the host Xen, but I think the balance of probability is that is should > be okay to talk to an older host with a newer client of the same major > version number. > > Let me know how you get on :) I've already follow the workaround, but still have another problem persist on 'gui-agent-linux-vm' while 'make qubes-vm' below: : Starting full system upgrade... there is nothing to do --> Archlinux dist-package (makefile) --> Building package in /home/user/qubes-src/gui-agent-linux sudo BACKEND_VMM=xen chroot "/home/user/qubes-builder/chroot-archlinux" su user -c 'cd "/home/user/qubes-src/gui-agent-linux" && cp archlinux/PKGBUILD* ./ && env http_proxy="" makepkg --syncdeps --noconfirm --skipinteg' ==> Making package: qubes-vm-gui 3.1.7-5 (Thu Sep 15 14:27:41 UTC 2016) ==> Checking runtime dependencies... ==> Installing missing dependencies... error: target not found: pulseaudio<9.0 ==> ERROR: 'pacman' failed to install missing dependencies. /home/user/qubes-builder/qubes-src/builder-archlinux/Makefile.archlinux:120: recipe for target 'dist-package' failed make[2]: *** [dist-package] Error 1 BTW, there's another error before that on 'gui-agent-linux', but I already solved it by installing 'xorg-server' package by using pacman on chroot-archlinux. By modifying the 'PKGBUILD' to solve the 'pulseaudio<9.0' version issues bring me another error like this: gcc -march=x86-64 -mtune=generic -O2 -pipe -fstack-protector-strong -Wno-deprecated-declarations -I../include/ `pkg-config --cflags vchan-xen` -g -Wall -Wextra -Werror -pie -fPIC -DUSE_XENSTORE_H -D_FORTIFY_SOURCE=2 -c -o ../gui-common/error.o ../gui-common/error.c ../gui-common/error.c: In function ‘dummy_handler’: ../gui-common/error.c:37:5: error: this ‘if’ clause does not guard... [-Werror=misleading-indentation] if (!print_x11_errors) ^~ ../gui-common/error.c:40:2: note: ...this statement, but the latter is misleadingly indented as if it is guarded by the ‘if’ XGetErrorText(dpy, ev->error_code, buf, sizeof(buf)); ^ cc1: all warnings being treated as errors make[1]: *** [: ../gui-common/error.o] Error 1 make[1]: Leaving directory '/home/user/qubes-src/gui-agent-linux/gui-agent' make: *** [Makefile:50: gui-agent/qubes-gui] Error 2 ==> ERROR: A failure occurred in build(). Aborting... /home/user/qubes-builder/qubes-src/builder-archlinux/Makefile.archlinux:120: recipe for target 'dist-package' failed make[2]: *** [dist-package] Error 2 Any help? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f7ca5969-b385-405f-8c3e-24bd62b959ad%40googlegroups.com. For more options, visit
Re: [qubes-users] Minor annoyancies in X since I've started using xfce
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Mon, Sep 12, 2016 at 08:49:06PM +0200, Achim Patzner wrote: > Hi! > > > 1) I never noticed this but I have been typing in dark rooms lately: The > screen saver does not dim the keyboard when it is turning off the > backlight on my P-series machines; I'm fairly sure it was working on R > 3.1 (but I was not using xfce there, I only noticed its presence after > someone decided to make it the only supported dm). Marek, could you try > that on a W-series, too (alt- and wait)? Will try it later, lack of space on desk to do it right now... > 2) If I mute the sound completely by pressing the respectice key (or > sending the X11 event) I cannot un-mute it any other way than using the > sound settings; none of the keys does the job. Yay, there is a fix for this one: https://github.com/QubesOS/qubes-issues/issues/2321 > Am I the only one who would like getting the good old times back? > > > > Achim > > - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJX2nppAAoJENuP0xzK19csAgUH/0oSxfGcYegiS63DDX6XjrEW LAA4+tfpZCILKdvOQyRj0RJT6/aI3sojrKkFxkSrXUpJ1uWkWvL6/qGkWhLatWMe kzy3hXI5hj/Vgx11z2+a1IHO+EVm9WlpwhWCm+gw/igosHKA4fx9ofpVRp5Cct9k 3y0Do8sN2TmVXbW3J13DgY5ITWMshT2/W9v8A0TdQ5CHlkfwpgSCHFE7xPzlf2Fq WSC80HUQAiBhy7+43xbSILc0gee7aiDL8xEoA+TFcmcDUmWjkCl/11S6FuQZZtr+ P9SiiJiM3h29EJ2CBuMmWojnfMTaKknWJj9FkB6mjIU1jmF3rckGIkMaV/ikt0I= =Gj4W -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20160915103937.GC31510%40mail-itl. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: got vagrant kinda working
On Thursday, September 15, 2016 at 3:28:36 AM UTC-7, pixel fairy wrote: > ssh.insert_key = false and libvirt.driver = "qemu" set globally. after > vagrant box add centos/7, vagrant up took 10minutes and 14 seconds. tried two > boxes with a private network to try to ping one from the other, and the > laptop rebooted while the vagrant boxes were coming up. > > dont know why. without virtualization, qemu is just an emulator. seems the laptop overheats, causing the shutdown. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7838185e-d714-4b8b-ad2e-92d77a1427b7%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] memory balancing for linux hvm?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Sep 15, 2016 at 02:51:24AM -0700, pixel fairy wrote: > is it possible to use the automatic memory balancing for linux hvms? Probably yes. You need qubes-meminfo-writer running there. You can install it as part of qubes-linux-utils package, or compile it manually from here: https://github.com/QubesOS/qubes-linux-utils/tree/master/qmemman `make && make install` from qmemman directory should be enough. - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJX2noiAAoJENuP0xzK19csviMH/2v7Ohly5yTTPWqi/eV8Fc84 J0pijq/qxZYR632P1fbiroWwgQWWlo2sWeNvmfQHB/h4V5//r3yUQp4bm+dRas2g hmnOTaN+VMD0rMzzH22w7x+efMbla/hr8eWGtaXQUwA7wOGL4AYtcA92oBx2oc7H pdons9RldFO6NjvakBqvdnD4Rc0FOygF842EgEEEM/unYMY1QxHsEi8m0RhwFzGE Q3p03JpKTLXhmPPos9IQWH1YDpZhK6LgUyP4Uc/D08yIqsPzF1ouEw5IkET0FeQ/ UPWTNiHey6GpEFnrr4WYwdgH/AVtw86a3+Wb5vOXkDXRhwCw2HVJUQTm8V4KqJE= =gwsp -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20160915103826.GV7339%40mail-itl. For more options, visit https://groups.google.com/d/optout.
[qubes-users] got vagrant kinda working
ssh.insert_key = false and libvirt.driver = "qemu" set globally. after vagrant box add centos/7, vagrant up took 10minutes and 14 seconds. tried two boxes with a private network to try to ping one from the other, and the laptop rebooted while the vagrant boxes were coming up. dont know why. without virtualization, qemu is just an emulator. conclusion: make a vagrant server you can ssh to. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/abc6f8a0-38ba-47e5-bc50-6dfb1b5c9263%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] new hardware for qubes.
On Thursday, September 15, 2016 at 12:25:04 AM UTC-7, Robin Schneider wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 15.09.2016 09:14, pixel fairy wrote: > > https://www.crowdsupply.com/design-shift/orwl > > > > personally wouldnt pay that kind of money for a box with only 8 gigs of > > ram, but its got some good ideas. > > > > Hey > > Have you seen > http://blog.invisiblethings.org/2016/09/03/thoughts-about-orwl.html yet :) ? lol! 12 days ago! ok, this contributes nothing to discussion. ill delete the thread. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3e83b311-67ee-4406-9e35-d9063e3be63c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] 3.2-rc1, xfce4 volume control
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-09-07 02:54, Connor Page wrote: > volumed and mixer are not maintained by xfce team anymore [1] > since audio relies on pulseaudio it would make sense to use pulseaudio plugin > and key bindings in dom0. > > [1] http://www.xfce.org/about/news/?post=1425081600 > Thanks. Tracking: https://github.com/QubesOS/qubes-issues/issues/2321 - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJX2mO4AAoJENtN07w5UDAwBe8P/iKlPkqlotabor7o7eALUjH0 WYf6XOU5zJVqT2sb85t2UdlGDfpfTJa/FvbdEeYE/2VT3Yxjwz7NBjJvk/eIo/2S R8msxW/bfIkgh0O/mo27afXRiLCgvhC4QnFWknFFyX2Tna8Agn5mt+imqWUKZnap GVTAvccmb4KNQkXdZxsRUmU4B21dTTvOqICZ8fKDqE2dSnNGmmOHbiDlVBYW0tBL KAxfLzcM/VB8RNFgubLcwGDcf9WVvX2UqmChGCpY0k46euDqeDNWQFSgdakVz/8w cy0zHIAUMLCgpeKLYB/FlMCtado7vkfLxZOOqpx3I+SU1RoPnxSU75gpiwBBGLh6 NneL05X2MyDpFtekbVuTBC/quC6DGVh8oj5UjUnRj7G9R9zYbtS0Emmf2r4clV4A XOmguN3duyF1BJdMWkNNtS71R7CvyNdmWTmHeS1yK9cxbnmEAX9ez8CMl/mBIOKC jv1hTGGY78K3ILqdeBYMj37t798ajRA1IjcCHF6HNUSm1Nk81/FhQpsIGbjUiF7b k24rzr2qP7ylil15GREDY13rgpSS0/MgT30xWPbPgX0FSrWstN2norynf/8q5nIb Rt6Y+Wb9Zkw2/OqKs6kVJX16jtPw2yN792lDlqwoQn7H32SXj+DmowuvAUidvn0Y WVIaUXdSyIE4zYZkFIoQ =CBYq -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a489fa51-8a90-9aaa-1a36-98a615a89765%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] macspoof broken in 3.2rc3
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-09-08 06:29, throw_a...@sigaint.org wrote: > *** Expected behavior: macspoof script automatically scrambles network > interface MACs at sys-net startup using instructions from [1], just like > in R3.1. > > [1] https://www.qubes-os.org/doc/anonymizing-your-mac-address/ > > *** Actual behavior: > > [user@sys-net ~]$ sudo systemctl status macspoof@wlp0s1 > macspoof@wlp0s1.service - macchanger on wlp0s1 >Loaded: error (Reason: Invalid argument) >Active: inactive (dead) > > Same on wired interface. ifconfig confirms MAC addresses are not changed. > > *** Workaround: > > Set configured wireless networks to not automatically connect; and start > the computer with no connected Ethernet cables. Then: > > [In sys-net:] > sudo ifconfig wlp0s1 down > sudo macchanger -r wlp0s1 > sudo ifconfig wlp0s1 up > [Repeat as necessary for each interface for which randomized MAC is desired.] > > [Manually connect to wireless network using Network Manager applet, plug > in cable, etc.] > > *** Additional notes: > > Could it be something flaky with my hardware's interaction with new > drivers? IIUC, sys-net was/is the same fedora-23 in both R3.1 and R3.2rc3. > So, same drivers. Or could a qubes-specific startup script ordering be now > wrong? > > Thanks! > Thanks for the report. Added as comment to our currently open MAC randomization tracking issue: https://github.com/QubesOS/qubes-issues/issues/938#issuecomment-247272139 - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJX2mLpAAoJENtN07w5UDAweJ8P/1+4cLxpalu4uCIU+JhALakS hCBuDUx1NY0d3cZ5OyoXATJqTN4Xn729ARpfr5phfqoMHKAPVfEivFIbV/xW7Ki/ WI6Hxsg+WKWAJ/Gf0GEir+iXhChhejA0FfEaWpaUP/0/COYedBrHxYUMslOksj0+ jQTOO1xvpROEGQ49OA1JjgzfB7SvrBCRu42c+KxS6iZ3gxOSC9YbiV3tWYjGeU3M ogVBMQc+mm9TWSlZgOIsD487tL5E/M/kMffADLj9L7jl0L62qkNnn+ZIa1TiMGLP VlI80YhEe6Pz92n7eKlZXyrOB1Qqa0FAhJG4Y9Yq2fHv725HZkEPy1VrudefomlS ryiAJ/iL5mSRY75s9e1UAeqa5NmUrqk1QPNoXe6VuUvdfrOeF/Uh/9TVVmsS+ClW zuzq4wK42sxA0UsTjySdPJr2guJL4LgFrZj8SfqHmm7ddeuiuK4XLHnRfAZEAJos oHQTvryKsVtUkDpT1a7brERFQmdo7thGsOeAFooIElggo9gQhdeltWrc43ZzhGi/ IG4x8ip0vv4MEgbcRJE4++6SmtUrSFpppGO5f37yK7UA4WZlkvEAit/hkWCmGgTV gYHlttb3uhae+iVMxCY2QY1aCrYhIvZARV1UFW+mYvMC8hbmEnMwHkI/BRMchBU8 TYSNRP0uNurvvUHuGJEw =FpqE -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/29612814-875c-49b8-ddd3-485981d138ff%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Split dm-crypt 0.1.0
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-09-08 11:11, Rusty Bird wrote: > Hi, > > I've worked on this mostly out of stubbornness :), but maybe it is > useful for someone here. README.md pasted below. > > https://github.com/rustybird/qubes-split-dm-crypt > > Rusty > Added a link to the Qubes doc index so that people can find this in the future: https://github.com/QubesOS/qubes-doc/commit/1448c1e7ab8ba17c7a9b9fdd53fcdefb0f1b329b - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJX2mG9AAoJENtN07w5UDAwJl4P/1L/J6UKQyyJZOgMPMafMuV0 iybOD9yYjJepUSpRJKxKDHnow6ETeBqgz8o0TdHIgfoTESjl12cPYI7mstVZo7oD W33fq6RzzGgjLtCuejCr92KYJwJiDffoGSFAIeZsAfKEqTbXKoDJ+pjO31ScAqu9 cEspODkJp6IAcYvEe5fF2s8W+3WyE/p6Z+qXcRuFtu5/Wg8NIREbPlU0Z9CZHND5 TwUJb3gqvX3DajIpZm/JwBtKbst7M3ky3TVWdLLZZw9oUvAluqOnlHC4SjO00z1T p2/KawXs+9BwHz5FTwJ1LLKcKu/0c+V23yrMU6hwwDFBbdknoJtQJBkqiS6fT/2d Pm0F1eLra/nlI2mb0z6H1wGY71I6kWMNeKoKcNYdosGmjBIAFcsn8MrmIWF9/GY9 NLxjNi2qI2f0VE6Z+s5bnWK3FeoViCHRufMjeFpFcy2hb7lUT+wvrkhyV5Amti/S GBif4jBAihiUT/EwZnD9AQd3s2MQLhmwjG+SwZENpJ2Y2AAyIgMEBcSz3Vtz72Yk FvdcH8EfgF7RclbgvEmL5PX2MhmIZc8ifWUIeXkprPVCFFU4zCcQsZd5UVkHAfTS RxaqKJXqFvu0VPr+evuCfQqcezvWlG6bQLFubZukWz0B8zj+XwV8RFvu+BWsyJrP yJXB8cuCfMFJXJTsGtFy =xPVu -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/007965ca-6563-ce81-5210-c745a396fb3a%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] VA-API in AppVM
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-09-14 10:42, Sebastian Jug wrote: > Hey guys, > > A big problem for me with Qubes is being able to do random mundane > tasks like watching YouTube videos. Is it possible to get video > acceleration working in appvm specifically VA-API? > > I know the 3d acceleration is not possible unless it's in a HVM but > this may be more straightforward? > > Thanks. > Can you be more specific about the problem you're currently encountering? A lot of people here watch YouTube videos in AppVMs without any problem (myself included). - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJX2l0MAAoJENtN07w5UDAwUIEQAIyn4nQ8wys7Da9aTReeekw/ vZ4rV1a0ROVLWMOzWXA8VjceizYo701qdYShpZwGQ593dFBd1WGmJliNV9FZfEGX 9NFEI5u9zoy2Gvb1do4ji+WzdzT1r4RXsyFlWLhu0CEKEvmEFmYv4DNwHQroaD95 hTc02GwGbz/LS9qtYjLliLWi9Irh9CHKePRZg3jJVYyXsGH4XgtIuZ4tsXvStNIl 2jU+Z6nIZ8Xdmc/puXUpC/CNmSdERqr67al9LTBfiIX7Y15Fk5Nr6hdwto2D8wW/ 5IBFyAidA0masIcV0m0DT3X1qfaCroDw1MirlOSX+8QqoY5HUraM5b+5G1R2+7D6 zlt2x7MKfttYTdyYYV422tifXN3WN24mTz7MeWBgzDfF9ttpDAl20GFvrHwqzfLV /Sdnf3zuc5MqDey1TpEA1fQ0n1+JDuR10eCx3GOZpIuQqNfL2Gn3nxgPLyMUub1z bY8LO/WGGjRXX0+mbQXH0P6cipYedNWVWkh/ogBWhguBUMJ7PYEjd0bmvWhwb2VM 1gu2vIG2Z71flO9B12xkkS2YP6CKlQzVPEQyef3bbLGEdM2WZgEFt+FT5TzzcgMn +HjieUGy8VtnQqj/FbQrJg549UdpEPmhTddrBbhhofEeZZC6L5xUbizzj8cFTIw1 zkPEQP56aiBKfvxSffhO =F4Ga -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9acb41ad-a3a0-8485-3450-26c75938d6c8%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Bitcoin Qubes tutorial
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-09-14 19:11, Franz wrote: > On Wed, Sep 14, 2016 at 8:54 PM, Marek Marczykowski-Górecki < > marma...@invisiblethingslab.com> wrote: >> On Wed, Sep 14, 2016 at 08:07:35PM -0300, Franz wrote: >>> On Thu, Jun 30, 2016 at 12:42 AM, Andrew David Wong>>> wrote: On 2016-06-29 09:37, Franz wrote: > But how can I trust a printing dispVM for something as sensitive as > a hot wallet? We would need two different dispVMs but we are not > there yet. Indeed, not yet, but it will be implemented in R4.0: https://groups.google.com/d/topic/qubes-devel/xLZU0R5ijCg/discussion https://github.com/QubesOS/qubes-issues/issues/866 https://github.com/QubesOS/qubes-issues/issues/2075 >>> >>> Andrew, >>> After various tests I am getting a bit more confidence about bitcoins. >> So I >>> prepared the promised tutorial. I tried to go to Qubes documentation to >> see >>> if there is any way to upload it, but found no reference. So I post it >>> here. Perhaps you know what to do. >> Thank you for taking the time to write this, Franz. However, we already have a page on using Split Bitcoin wallets (using Electrum) here: https://www.qubes-os.org/doc/split-bitcoin/ Nonetheless, it looks like your guide has some additional information that is missing from the current page. Please consider submitting a pull request against this page with your additions. You can see the documentation guidelines including a step-by-step how-to) here: https://www.qubes-os.org/doc/doc-guidelines/ - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJX2ltIAAoJENtN07w5UDAwZwwQAL6eJaF0jCqlsKkN94DTFfYw 9fcC2w/ybGbPii7h0zHeuzpLsdKc8BQt1ijQ4UiBKzotEQIqyBGDW5xs/7ex6iYn vZibLWsfDK9Zoxqj0kxlZrGTmHbzInvWTVIjtoKY7pOfDfosgGTBqvd9uM1RqSn3 MfWuWbJtY2JjRp4+Q80IUS4soQB8Emcm7ZSEBqu6TvX61ycBWyxm/DDLt9xLoFNg WFB6jVFnUGkucRoKEKwevVOfFoSiLTPjiDjIarlhTKaiG1NCT5otItbfq60mdZcf BYqS+1vb5WDm55YdDy8p4znz0ImKcLErmUZK+TgRLK4Yi36bvKb3EXr3gUQa4Tqd MZHpjR6IP/t4tbgBXWc7x6CDqFv+T8LRdD1v5IlsmMl7RmcyV8ES1xFwYXDl4I81 7iYvOPjTqoMOASIOejdkuufu+adfgy4BYLqd1SV/C1oJk8SXJ0dkuvoT4IJ1nDBc FAHIDE9S1MiJZ2fdHGq/B6plrDe/JluhT9L0A8NPCIZetCkTcvgyQQ5CrNyR2UWw nedk+L2zvzwNQxbZXXVmGSR3gczEkWYfn/ZT+OAFmo72qWPJmLwtmZg/q9zbm6Vw Bd7ne4mbnOyLshrQ6ZFVui0ZnDfQn4QLauMEQEwS2xNEU88qjIjlNt4klpwtFPVN 5AWniVUYJXpjwvKiJeSx =OMbs -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7525e69d-d899-3d1d-6e42-bf9c78daaca9%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: netvm doesn't recognize physical hardware switch state
no. it looks exactly as acpi problem. have you tried a Fedora live dvd/usb? If it doesn't work then the problem is not specific to Qubes. please try. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b9bf38a1-c63c-4e97-9faa-59cd41146cdd%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] new hardware for qubes.
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 15.09.2016 09:14, pixel fairy wrote: > https://www.crowdsupply.com/design-shift/orwl > > personally wouldnt pay that kind of money for a box with only 8 gigs of > ram, but its got some good ideas. > Hey Have you seen http://blog.invisiblethings.org/2016/09/03/thoughts-about-orwl.html yet :) ? - -- Live long and prosper Robin `ypid` Schneider -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJX2kzFAAoJEIb9mAu/GkD4+M0P/R6OjwTBOZ9N4pikguMZdf4/ lVzmmwFnoaLJgopjnb3Iou2TzjOQzIx6YxF1VYHFrAMO/47y+rrnf9m+fML7qlHM K5BAGSZsRr2tpQqXOvvIZarONKLmQtsUPiOM0My5VMfgPCz8Jkmx1ngGJsoDRo3M 14ozX3PD5/2r19KPviBGJQow2nPxnCKGxjhApgqqJMIsReDxF82gO3SFv22qARF9 LOMjS69G9b0ogT/+0y0I8fjGukK+u1F4VYib8N6ZY31wdvZ3g8B5t7yvAWmAOmGE CjMghJMT8cWOFgqpP73oAl+/l/0po0iVhVmD8ab8h2/t6/YM8YBv7W2v1fjFcFDi s0X2ZxVYYtCTW57STbtWQY4EXF3XEHbJWQekyFOqO19nVTJHYCTv9dyUTUq1Lb5e EHKkVhZXEJdNp/WNibIquUA8MQBNTC7/LMh+XiAh9MbMAvc61G/mYsLGdoKqWnqf FJPQKiuj2Z9cckOwNTc02ZIqc3waRajjdGVM11esVjjuOl+Z3pm5w+zueixxYJvK YWjWqOvTWkHAusNFV2JwOn1NVSDx7breCn8Pmv9XmcjHkmRLFfwFgDlONZKuLwb5 HlfFvCaB1GWHPdxq3nx8FTMDv9zXPSLc6ObroQEgT1oSbnwO7fxlfA+pV/s8YbZ3 0gzO6QcBkDgtRPsrbcXl =LPlU -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/386284e9-7a20-a7ca-1ea2-ff47fd9d00b3%40riseup.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] new hardware for qubes.
https://www.crowdsupply.com/design-shift/orwl personally wouldnt pay that kind of money for a box with only 8 gigs of ram, but its got some good ideas. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2a4189e2-b7e6-4acf-81f6-dbf7221c26a6%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.