Re: [qubes-users] Setting up privateinternetaccess on qubes 3.2
On 06/15/2017 11:02 PM, Chris Laprise wrote: On 06/15/2017 08:15 PM, Steven Walker wrote: Can anyone give me any feedback on how to setup privateinternetaccess on qubes. I wrote to pia, and they didn't really give me much help on how to set this up. Any help greatly appreciated. Thanks, Steve You want to first download the openvpn config from pia's Download/Support page: Choose Advanced OpenVPN SSL Usage Guides, then OpenVPN Configuration Files... 'default' or 'strong'. Then follow the Qubes doc "iptables and CLI" instructions here: https://www.qubes-os.org/doc/vpn/#set-up-a-proxyvm-as-a-vpn-gateway-using-iptables-and-cli-scripts BTW, I noticed there is an "easy" way to setup Network Manager connections from pia, if NM is what you prefer. Their "Advanced OpenVPN Ubuntu" instructions have a script that adds VPN connections to Network Manager. You can run this 'pia-nm.sh' script in a Qubes proxyVM *each* time you start it. To make the settings work permanently, you could copy /etc/openvpn/pia*crt to /rw/config, then go into /rw/config/NM-connections and edit the PIA files you intend to use and change the path for the "ca " entry from /etc/openvpn to /rw/config. Another way to make it permanent is to setup bind-dirs for /etc/openvpn. Finally, you can protect against leaks by adding these lines to /rw/config/qubes-firewall-user-script (and make it executable): iptables -I FORWARD -o eth0 -j DROP iptables -I FORWARD -i eth0 -j DROP -- Chris Laprise, tas...@openmailbox.org https://twitter.com/ttaskett PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d6613155-eca3-52c3-8c28-86b320fa61cb%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Great difficulty installing Qubes OS 3.2 (current release) on MSI Intel i7 7th gen, HD 630 graphics
Not sure why this is working now when it didn't before, but I changed the boot mode to uefi+legacy and now I get a graphical Qubes installer menu booted from USB DVD. It still dumps to grub prompt when trying to boot from USB stick tho. I'm pretty sure this is a legacy booted installation process. It fails to start X, and falls back to text mode. I began to run thru the installation steps but it fails to partition the disk. It doesn't offer anything like the typical installation options to pick a device and then a partition scheme. I notice it complains about not having keys for the SSD device, which is probably why partitioning fails. Could be why X won't start as well. I am going to go back and restore the factory keys (they're all deleted now) and turn secure boot back off after doing so, then seeing if that will change things. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a301aac9-20dd-4dcd-a1d6-c542638d5914%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Great difficulty installing Qubes OS 3.2 (current release) on MSI Intel i7 7th gen, HD 630 graphics
On Friday, June 16, 2017 at 3:35:09 PM UTC-5, motech man wrote: > I've been trying to install Qubes for several days now with no luck at all. > I'm not a linux newb, and I recognize Qubes is quite different. Problem is > that the errors and info about booting are displayed and gone to rapidly to > read. > > This system doesn't have removable media, except thru USB. I have a USB DVD > and I've copied the ISO onto USB key as well. On DVD I see a grub menu with > all entries just chainload to xen.efi. I verfied the ISO with sha512 hash, > and verified the DVD when it was burnt. Used dd to copy ISO to USB. > > When I boot usb key no grub and different errors > > This mobo uses an MSI "Click BIOS". I have zeroed out all keys. I have > disabled all secure boot options. It's kindof odd where the key management > lives, but I disabled all options under the "Advanced/Windows OS > Configuration" menu. > > There are 3 areas that relate to booting: > 1) Advanced/Windows OS Configuration menu > 2) Boot menu > 3) Under Save / Exit - boot overrides > > I can access an EFI shell under #3, but don't know what the cmd line to > invoke is. Help not useful for listing devices. When booting off the DVD I > can list the devices by typing ls . There is an SSD + HDD + whatever usb > devices I plug in. > > Under the Boot menu is a Boot mode, which has 2 settings: UEFI or > UEFI+Legacy. In UEFI only mode (the main one I've focused on) there are 7 > options for boot order. I set 2 and disable all the rest. 1=UEFI USB Key, > 2=UEFI USB CD/DVD. > > Under Windows OS Configuration there are 4 settings: > 1) Windows 8.2/Windows 10 WHQL > 2) Windows 7 > 3) MSI FAST Boot (no scan for boot devices, use only configured) > 4) FAST Boot > > I have all 4 options set to disabled, which implicitly disables Secure Boot I > believe. BTW - the MSI mobo manual is no help for BIOS setup. > > If I enable option 1 I can see additional Secure Boot options, including key > management. I have backed up then cleared all keys, then disabled secure boot > by switching option #1 back to disabled. > > With boot mode = UEFI I briefly see 8 or 9 lines of text and then am dumped > into grub prompt which erases that info. If I boot the USB DVD I get the 4 > Qubes lines which chainload to xen.efi with various options. I have read the > troubleshooting guide and appened efi=attr=uc and one other variation > (nobootexit I believe) which has no visible effect. > > Not sure why grub runs when booting off DVD when BIOS allows ONLY UEFI. That > looks like a legacy boot response to me. Silly to boot a UEFI grub which > chainloads to an EFI, so perhaps BIOS is not doing ONLY a UEFI boot as the > setting indicates. > > Not sure what to try next. I did stumble onto a PDF file from Linux.org IIRC > about how Open OS devs CAN boot using Secure Boot by checking if the UEFI > BIOS is in "setup mode" and if so the OS can then install it's own keys. The > PDF described the process in considerable detail. I don't know why Qubes > doesn't use that method, unless they discovered there are too many bugs in > UEFI implementations or UEFI versions capable of that process are too new and > not widespread enough to rely on. > > Anyway, looking for any help or alternative to get Qubes installed you can > offer. I have an old rEFInd CD I could try to boot, maybe it could be booted > and from that it could load Qubes from the USB key. Other than that I am not > sure what to do next. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/19763276-94ca-4451-8e15-86397826fa86%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Terminalcomman Lockscreen
On Fri, Jun 09, 2017 at 08:16:21AM -0700, Finsh wrote: > Hello, > i want to create a shortcut with the windows-key to lock my screen, but > therefore i guess i would have to know the terminal-command to lock the > screen, which i dont know? is there a "library" ore something like that to > search for the commands? > > > greetings > Try 'xscreensaver-command -lock'? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20170616223441.GC21693%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] accessing nfts secondary harddrive in qube
On Fri, Jun 16, 2017 at 10:02:27AM -0700, carr...@gmail.com wrote: > I mounted a secondary hard drive to my qube using the "qvm-block" cmd and it > shows up in the file explorer. When I double click it, nothing happens and > don't have permissions to access it via the terminal. What else do I need to > do to access my drive? > This really isn't a Qubes problem, and is solvable with a quick search. You most likely need to install ntfs-3g and associated packages - for Debian look at wiki.debian.org/NTFS The only Qubes specific thing here is that you will want to install the drivers in the template on which your qube is based. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20170616222453.GB21693%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: tools for "burning" bootable USB to install qubes
I was hoping to hear what is known to work, aside from Rufus. I'll probably reinstall when the next version comes out and try a few other options. I like etcher - used that on a Raspberry Pi project, so that will be my first test. On Fri, Jun 16, 2017 at 4:40 PM motech man wrote: > On Wednesday, June 14, 2017 at 10:56:03 AM UTC-5, Raymond Rizzuto wrote: > > Are their any other Windows tools aside from Rufus that can be used to > successfully create a bootable USB drive for installing Qubes? I.e. > Etcher, Unetbootin, YUMI, etc. > > > > The install manual mentions that "Be sure to select “DD image” mode (you > need to do that after selecting the Qubes ISO)" when using Rufus. Is there > an equivalent step if using other tools? > > You might try https://www.rmprepusb.com/ or https://unetbootin.github.io/ > > -- > You received this message because you are subscribed to a topic in the > Google Groups "qubes-users" group. > To unsubscribe from this topic, visit > https://groups.google.com/d/topic/qubes-users/LXR8p9UFgQQ/unsubscribe. > To unsubscribe from this group and all its topics, send an email to > qubes-users+unsubscr...@googlegroups.com. > To post to this group, send email to qubes-users@googlegroups.com. > To view this discussion on the web visit > https://groups.google.com/d/msgid/qubes-users/44733768-f8a4-4508-a7de-2c2f030838f6%40googlegroups.com > . > For more options, visit https://groups.google.com/d/optout. > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAA5JeVTnUJdrht_Nt%2BVg3mwimMYAgKLtdS3i_Bd%3DaAZ3o%2BtZqw%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Question(s) regarding Qubes minimal templates
On Thu, Jun 15, 2017 at 11:00:31AM +0200, Noor Christensen wrote: > On Wed, Jun 14, 2017 at 10:50:10PM +, Qubed One wrote: > > 'Tomei Ningen' via qubes-users: > > >> I'm a strong advocate of using minimal (or smaller) templates, > > >> customised for specific use cases. Some people HATE this approach. > > >> > > >> unman > > > > > > Really? Coming from the sort of people with the patience for an OS > > > like Qubes? I'd think anyone who's involved enough to have an opinion > > > would be in favor of that -- that's kind of the idea here, isn't it? > > > One thing I wish I could change would be the visual clutter it > > > produces; anybody know of a means to flag these VMs as internal so I > > > can hide the ones I'm not interested in seeing regularly? > > > > In dom0, type this from the command line: > > > > qvm-prefs -s internal True > > Does the internal flag affect the VM in any other way than how it is > displayed in the GUI manager? Like, are they automatically started at > boot or similar? No, nothing like that - setting that flag does also affect the display in Menus, as I said in another thread.Otherwise, I dont think there is any change. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20170616220624.GA21693%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: tools for "burning" bootable USB to install qubes
On Wednesday, June 14, 2017 at 10:56:03 AM UTC-5, Raymond Rizzuto wrote: > Are their any other Windows tools aside from Rufus that can be used to > successfully create a bootable USB drive for installing Qubes? I.e. Etcher, > Unetbootin, YUMI, etc. > > The install manual mentions that "Be sure to select “DD image” mode (you need > to do that after selecting the Qubes ISO)" when using Rufus. Is there an > equivalent step if using other tools? You might try https://www.rmprepusb.com/ or https://unetbootin.github.io/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/44733768-f8a4-4508-a7de-2c2f030838f6%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Great difficulty installing Qubes OS 3.2 (current release) on MSI Intel i7 7th gen, HD 630 graphics
I've been trying to install Qubes for several days now with no luck at all. I'm not a linux newb, and I recognize Qubes is quite different. Problem is that the errors and info about booting are displayed and gone to rapidly to read. This system doesn't have removable media, except thru USB. I have a USB DVD and I've copied the ISO onto USB key as well. On DVD I see a grub menu with all entries just chainload to xen.efi. I verfied the ISO with sha512 hash, and verified the DVD when it was burnt. Used dd to copy ISO to USB, but as I write this I realize the USB has 2 partitions so I will dd it again after reformatting to a single partition using gparted. Not sure that will matter but it just occurred to me. When I boot usb key no grub and different errors This mobo uses an MSI "Click BIOS". I have zeroed out all keys. I have disabled all secure boot options. It's kindof odd where the key management lives, but I disabled all options under the "Advanced/Windows OS Configuration" menu. There are 3 areas that relate to booting: 1) Advanced/Windows OS Configuration menu 2) Boot menu 3) Under Save / Exit - boot overrides I can access an EFI shell under #3, but don't know what the cmd line to invoke is. Help not useful for listing devices. When booting off the DVD I can list the devices by typing ls . There is an SSD + HDD + whatever usb devices I plug in. Under the Boot menu is a Boot mode, which has 2 settings: UEFI or UEFI+Legacy. In UEFI only mode (the main one I've focused on) there are 7 options for boot order. I set 2 and disable all the rest. 1=UEFI USB Key, 2=UEFI USB CD/DVD. Under Windows OS Configuration there are 4 settings: 1) Windows 8.2/Windows 10 WHQL 2) Windows 7 3) MSI FAST Boot (no scan for boot devices, use only configured) 4) FAST Boot I have all 4 options set to disabled, which implicitly disables Secure Boot I believe. BTW - the MSI mobo manual is no help for BIOS setup. If I enable option 1 I can see additional Secure Boot options, including key management. I have backed up then cleared all keys, then disabled secure boot by switching option #1 back to disabled. With boot mode = UEFI I briefly see 8 or 9 lines of text and then am dumped into grub prompt which erases that info. If I boot the USB DVD I get the 4 Qubes lines which chainload to xen.efi with various options. I have read the troubleshooting guide and appened efi=attr=uc and one other variation (nobootexit I believe) which has no visible effect. Not sure why grub runs when booting off DVD when BIOS allows ONLY UEFI. That looks like a legacy boot response to me. Silly to boot a UEFI grub which chainloads to an EFI, so perhaps BIOS is not doing ONLY a UEFI boot as the setting indicates. Not sure what to try next. I did stumble onto a PDF file from Linux.org IIRC about how Open OS devs CAN boot using Secure Boot by checking if the UEFI BIOS is in "setup mode" and if so the OS can then install it's own keys. The PDF described the process in considerable detail. I don't know why Qubes doesn't use that method, unless they discovered there are too many bugs in UEFI implementations or UEFI versions capable of that process are too new and not widespread enough to rely on. Anyway, looking for any help or alternative to get Qubes installed you can offer. I have an old rEFInd CD I could try to boot, maybe it could be booted and from that it could load Qubes from the USB key. Other than that I am not sure what to do next. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/cbad62e6-0a35-42d0-b889-d828d01c5545%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Ubdate Electrum offline-wallet
update: I restored the same seed on an other computer.and everything works, the btc are there, everything fine.I really dont get it. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a00cfdea-d23e-485b-bcbd-f6880506da9c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Ubdate Electrum offline-wallet
Im sorry, im a bit nervous(i need to pay my VPN untill tomorrow) i only run the new version in the template with /.electrum(because its not installed) the installed version however from debain is 2.7.9, which has a bug so i cant use it as an offlinewallet. I experimented a little in the meantime.i uninstalled the btc client, reinstalled it in a regulär debian-8 template, and made a appwm for the wallet whit sys-whonix as netvm. i restored the old wallet(the offline seed) but the btc are gone? i could see them on the online/whatching olny wallet. does this mean the btc are gone?! i -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e5e17ee4-0f8b-4440-b8e5-672359bf5d95%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] accessing nfts secondary harddrive in qube
I mounted a secondary hard drive to my qube using the "qvm-block" cmd and it shows up in the file explorer. When I double click it, nothing happens and don't have permissions to access it via the terminal. What else do I need to do to access my drive? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9697b1fd-12fa-4b2e-9f7e-f90883eab892%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Request for feedback: 4.9 Kernel
Not using i915 driver on new CPU is my experience with i7-7500U (Intel HD graphics 620). But Haswell is not so new and I believe even Skylakes should be covered by i915.preliminary_hw_support=1. Regards, Vít Šesták 'v6ak' -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8de2e809-6965-4605-9b4e-50eb36ca58c0%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Ubdate Electrum offline-wallet
On 06/16/2017 06:45 AM, Finsh wrote: > Hello? Anyone? i Really need help now, Electrum doesnt boot at al in Qubes, > regardles from the app-vm, templatevm ore whatever.How is this even possible?! > Woah slow down. We need some details if we're going to help you. If you spawn a new terminal in your AppVM containing electrum, and run `electrum` in the terminal, is there any output? If so, and it's still not launching, can you paste it here? Since you stated you're running `./electrum` in an earlier post, it sounds like you're trying to run a copy of electrum that's not from the package manager. If you reinstall electrum as normal (sudo apt-get install electrum) do it run then? If a program is uninstalled without Qubes knowing shortcuts that don't work can be left over in the dom0 menu. To remedy this first run `qvm-sync-appmenus ` in dom0, then navigate to the 'Add more shortcuts...' menu for your desired VM and try to remove and re-add electrum. If there binary is valid it should now launch. Let us know how you get on. Andrew Morgan -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/oi0rjs%245i1%241%40blaine.gmane.org. For more options, visit https://groups.google.com/d/optout. signature.asc Description: OpenPGP digital signature
[qubes-users] AEM: Should we drop .png support?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi everyone, What do you think about getting rid [1] of .png image secret support in the next major version of Anti Evil Maid? This would offset some of the increase in complexity incurred by the upcoming TOTP/keyfile support, in addition to other benefits: - - Considering that AEM is a security oriented feature, it's kind of bad to implicitly encourage the user to copy a complex image format from some VM to dom0 - where it will be parsed during boot. (It would be possible to build something [2] secure using the qubes.GetImageRGBA RPC service, but I don't know if anyone's particularly interested in working on that.) - - .png support is hacky and weird: We show text secrets in the current dialog, but images appear in the *next* dialog. And text secrets are cleared from the screen as soon as possible, whereas image secrets stay visible until Plymouth finishes. For users who prefer the more visual approach, we could tweak the Plymouth theme to use a monospace font for text secrets. That should make ASCII art a viable replacement for conventional images. Rusty 1. https://github.com/rustybird/qubes-antievilmaid/commit/4e45af289d0e651a380f3182cb07901a3002905f 2. Similar to the WIP dom0 wallpaper service: https://github.com/QubesOS/qubes-issues/issues/215 -BEGIN PGP SIGNATURE- iQJ8BAEBCgBmBQJZQ+FtXxSAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ4NEI1OUJDRkM2MkIxMjlGRTFCMDZEMDQ0 NjlENzhGNDdBQUYyQURGAAoJEEadePR6ryrfclYP/0zs3z4DcTOKPWwovD5Ly0VQ LYBJsJE4VBqo2JOpdpArvf2i8nOGD5bkgTUKtPisS/0XLgEvurvGejFe0x6wlV13 HFhD42sHxWC65JxCyw1kS6bhnoYbIINiOneoyGikiStneiGqyzqz5ylEEdzPAkkP Q7eXqbVBVfYBlfdrWNMNv6EPtdmBpkWU4c3EzJ9Qtm/StWGuhDxJgOKtzu10ZOi/ vJH5bIvhaNvbmNjqyT3OFlP2YLlqFZw2LHLH0x2cjmSEpQ0uUjQt+MCIowWqecYy TgRTV9y5f7frS2SOEwwq8Wg+5OSryU8VanLb2nwGV8r4X0ro7dbkJ8++CzRVhi93 lrctzX9xcrfzGAD+3BSOvd6ZtxhquC2Ff9dHVSBc4fsCdgNBH5vXeWH4GiotGZP1 DxtQhuWIa6tZWwq9mhc/g8NYB0kVcgQ4fIQN2I7W09JtJuSiqx0txPwB6/S4Yw+o gaMjmjr2Robi5gDBjouFNYRJSIWfhHTW89/bZakjub2nU2kvKQUqce/TwzBmAqGG qBnDqUnre5pFTvN/hKZhbvIbfbOlPlc5EYxA1JqCUqoCEGb7sqLETDJc/HGcP8PV kLfUTnoWU/dgnjJylKyxhH/pOQUbW2m8QqLoMZZcDK96xJ+YeCXm7iUEq3lfIq/8 59c9bYVCtoHd35x5c+kz =em7I -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20170616134725.GA31534%40mutt. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Ubdate Electrum offline-wallet
Hello? Anyone? i Really need help now, Electrum doesnt boot at al in Qubes, regardles from the app-vm, templatevm ore whatever.How is this even possible?! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a5ad5db8-a0b5-45a6-b953-ca0e42ea5169%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Qubes and USB Ethernet adapter
On Friday, June 16, 2017 at 7:28:53 AM UTC+1, Swâmi Petaramesh wrote: > Hi, > > I have a new Asus laptop which comes with no integrated Ethernet, but an > USB Gigabit Ethernet adapter. > > I wonder if this will be compatible with Qubes' Net VM, or if I will > need to allocate the complete USB controller to the net VM - which would > be extremely annoying to me... > > Any clue appreciated. > > Kind regards. > > -- > Swâmi Petaramesh PGP 9076E32E I've tried using an ASUS USB Ethernet adapter (with a Dell laptop in my case, but probably not relevant) without luck. I found that an USB Wifi Dongle worked better. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/dfe4f76f-980c-4ab6-8f28-56715cf0797b%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.