Re: [qubes-users] Setting up privateinternetaccess on qubes 3.2

2017-06-16 Thread Chris Laprise

On 06/15/2017 11:02 PM, Chris Laprise wrote:

On 06/15/2017 08:15 PM, Steven Walker wrote:

Can anyone give me any feedback on how to setup privateinternetaccess
on qubes. I wrote to pia, and they didn't really give me much help on
how to set this up.

Any help greatly appreciated.

Thanks,

Steve



You want to first download the openvpn config from pia's
Download/Support page:
Choose Advanced OpenVPN SSL Usage Guides, then OpenVPN Configuration
Files... 'default' or 'strong'.

Then follow the Qubes doc "iptables and CLI" instructions here:

https://www.qubes-os.org/doc/vpn/#set-up-a-proxyvm-as-a-vpn-gateway-using-iptables-and-cli-scripts



BTW, I noticed there is an "easy" way to setup Network Manager 
connections from pia, if NM is what you prefer. Their "Advanced OpenVPN 
Ubuntu" instructions have a script that adds VPN connections to Network 
Manager. You can run this 'pia-nm.sh' script in a Qubes proxyVM *each* 
time you start it.


To make the settings work permanently, you could copy 
/etc/openvpn/pia*crt to /rw/config, then go into 
/rw/config/NM-connections and edit the PIA files you intend to use and 
change the path for the "ca " entry from /etc/openvpn to /rw/config.


Another way to make it permanent is to setup bind-dirs for /etc/openvpn.

Finally, you can protect against leaks by adding these lines to 
/rw/config/qubes-firewall-user-script (and make it executable):


iptables -I FORWARD -o eth0 -j DROP
iptables -I FORWARD -i eth0 -j DROP

--

Chris Laprise, tas...@openmailbox.org
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d6613155-eca3-52c3-8c28-86b320fa61cb%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Great difficulty installing Qubes OS 3.2 (current release) on MSI Intel i7 7th gen, HD 630 graphics

2017-06-16 Thread motech man
Not sure why this is working now when it didn't before, but I changed the boot 
mode to uefi+legacy and now I get a graphical Qubes installer menu booted from 
USB DVD. It still dumps to grub prompt when trying to boot from USB stick tho.

I'm pretty sure this is a legacy booted installation process. It fails to start 
X, and falls back to text mode. I began to run thru the installation steps but 
it fails to partition the disk. It doesn't offer anything like the typical 
installation options to pick a device and then a partition scheme. I notice it 
complains about not having keys for the SSD device, which is probably why 
partitioning fails. Could be why X won't start as well.

I am going to go back and restore the factory keys (they're all deleted now) 
and turn secure boot back off after doing so, then seeing if that will change 
things.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a301aac9-20dd-4dcd-a1d6-c542638d5914%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Great difficulty installing Qubes OS 3.2 (current release) on MSI Intel i7 7th gen, HD 630 graphics

2017-06-16 Thread motech man
On Friday, June 16, 2017 at 3:35:09 PM UTC-5, motech man wrote:
> I've been trying to install Qubes for several days now with no luck at all. 
> I'm not a linux newb, and I recognize Qubes is quite different. Problem is 
> that the errors and info about booting are displayed and gone to rapidly to 
> read.
> 
> This system doesn't have removable media, except thru USB. I have a USB DVD 
> and I've copied the ISO onto USB key as well. On DVD I see a grub menu with 
> all entries just chainload to xen.efi. I verfied the ISO with sha512 hash, 
> and verified the DVD when it was burnt. Used dd to copy ISO to USB.
> 
> When I boot usb key no grub and different errors
> 
> This mobo uses an MSI "Click BIOS". I have zeroed out all keys. I have 
> disabled all secure boot options. It's kindof odd where the key management 
> lives, but I disabled all options under the "Advanced/Windows OS 
> Configuration" menu.
> 
> There are 3 areas that relate to booting:
> 1) Advanced/Windows OS Configuration menu
> 2) Boot menu
> 3) Under Save / Exit - boot overrides
> 
> I can access an EFI shell under #3, but don't know what the cmd line to 
> invoke is. Help not useful for listing devices. When booting off the DVD I 
> can list the devices by typing ls . There is an SSD + HDD + whatever usb 
> devices I plug in.
> 
> Under the Boot menu is a Boot mode, which has 2 settings: UEFI or 
> UEFI+Legacy. In UEFI only mode (the main one I've focused on) there are 7 
> options for boot order. I set 2 and disable all the rest. 1=UEFI USB Key, 
> 2=UEFI USB CD/DVD.
> 
> Under Windows OS Configuration there are 4 settings:
> 1) Windows 8.2/Windows 10 WHQL
> 2) Windows 7
> 3) MSI FAST Boot (no scan for boot devices, use only configured)
> 4) FAST Boot
> 
> I have all 4 options set to disabled, which implicitly disables Secure Boot I 
> believe. BTW - the MSI mobo manual is no help for BIOS setup.
> 
> If I enable option 1 I can see additional Secure Boot options, including key 
> management. I have backed up then cleared all keys, then disabled secure boot 
> by switching option #1 back to disabled.
> 
> With boot mode = UEFI I briefly see 8 or 9 lines of text and then am dumped 
> into grub prompt which erases that info. If I boot the USB DVD I get the 4 
> Qubes lines which chainload to xen.efi with various options. I have read the 
> troubleshooting guide and appened efi=attr=uc and one other variation 
> (nobootexit I believe) which has no visible effect.
> 
> Not sure why grub runs when booting off DVD when BIOS allows ONLY UEFI. That 
> looks like a legacy boot response to me. Silly to boot a UEFI grub which 
> chainloads to an EFI, so perhaps BIOS is not doing ONLY a UEFI boot as the 
> setting indicates.
> 
> Not sure what to try next. I did stumble onto a PDF file from Linux.org IIRC 
> about how Open OS devs CAN boot using Secure Boot by checking if the UEFI 
> BIOS is in "setup mode" and if so the OS can then install it's own keys. The 
> PDF described the process in considerable detail. I don't know why Qubes 
> doesn't use that method, unless they discovered there are too many bugs in 
> UEFI implementations or UEFI versions capable of that process are too new and 
> not widespread enough to rely on.
> 
> Anyway, looking for any help or alternative to get Qubes installed you can 
> offer. I have an old rEFInd CD I could try to boot, maybe it could be booted 
> and from that it could load Qubes from the USB key. Other than that I am not 
> sure what to do next.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/19763276-94ca-4451-8e15-86397826fa86%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Terminalcomman Lockscreen

2017-06-16 Thread Unman
On Fri, Jun 09, 2017 at 08:16:21AM -0700, Finsh wrote:
> Hello,
> i want to create a shortcut with the windows-key to lock my screen, but 
> therefore i guess i would have to know the terminal-command to lock the 
> screen, which i dont know? is there a "library" ore something like that to 
> search for the commands?
> 
> 
> greetings
> 

Try 'xscreensaver-command -lock'?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170616223441.GC21693%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] accessing nfts secondary harddrive in qube

2017-06-16 Thread Unman
On Fri, Jun 16, 2017 at 10:02:27AM -0700, carr...@gmail.com wrote:
> I mounted a secondary hard drive to my qube using the "qvm-block" cmd and it 
> shows up in the file explorer. When I double click it, nothing happens and 
> don't have permissions to access it via the terminal. What else do I need to 
> do to access my drive?
> 

This really isn't a Qubes problem, and is solvable with a quick search.
You most likely need to install ntfs-3g and associated packages - for
Debian look at wiki.debian.org/NTFS

The only Qubes specific thing here is that you will want to install the
drivers in the template on which your qube is based.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170616222453.GB21693%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: tools for "burning" bootable USB to install qubes

2017-06-16 Thread Ray Rizzuto Jr
I was hoping to hear what is known to work, aside from Rufus.  I'll
probably reinstall when the next version comes out and try a few other
options.  I like etcher - used that on a Raspberry Pi project, so that will
be my first test.

On Fri, Jun 16, 2017 at 4:40 PM motech man  wrote:

> On Wednesday, June 14, 2017 at 10:56:03 AM UTC-5, Raymond Rizzuto wrote:
> > Are their any other Windows tools aside from Rufus that can be used to
> successfully create a bootable USB drive for installing Qubes?  I.e.
> Etcher, Unetbootin, YUMI, etc.
> >
> > The install manual mentions that "Be sure to select “DD image” mode (you
> need to do that after selecting the Qubes ISO)" when using Rufus.  Is there
> an equivalent step if using other tools?
>
> You might try https://www.rmprepusb.com/ or https://unetbootin.github.io/
>
> --
> You received this message because you are subscribed to a topic in the
> Google Groups "qubes-users" group.
> To unsubscribe from this topic, visit
> https://groups.google.com/d/topic/qubes-users/LXR8p9UFgQQ/unsubscribe.
> To unsubscribe from this group and all its topics, send an email to
> qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/44733768-f8a4-4508-a7de-2c2f030838f6%40googlegroups.com
> .
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAA5JeVTnUJdrht_Nt%2BVg3mwimMYAgKLtdS3i_Bd%3DaAZ3o%2BtZqw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Question(s) regarding Qubes minimal templates

2017-06-16 Thread Unman
On Thu, Jun 15, 2017 at 11:00:31AM +0200, Noor Christensen wrote:
> On Wed, Jun 14, 2017 at 10:50:10PM +, Qubed One wrote:
> > 'Tomei Ningen' via qubes-users:
> > >> I'm a strong advocate of using minimal (or smaller) templates,
> > >> customised for specific use cases. Some people HATE this approach.
> > >> 
> > >> unman
> > > 
> > > Really? Coming from the sort of people with the patience for an OS
> > > like Qubes? I'd think anyone who's involved enough to have an opinion
> > > would be in favor of that -- that's kind of the idea here, isn't it?
> > > One thing I wish I could change would be the visual clutter it
> > > produces; anybody know of a means to flag these VMs as internal so I
> > > can hide the ones I'm not interested in seeing regularly?
> > 
> > In dom0, type this from the command line:
> > 
> >  qvm-prefs -s  internal True
> 
> Does the internal flag affect the VM in any other way than how it is
> displayed in the GUI manager? Like, are they automatically started at
> boot or similar?

No, nothing like that - setting that flag does also affect the display
in Menus, as I said in another thread.Otherwise, I dont think there is
any change.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170616220624.GA21693%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: tools for "burning" bootable USB to install qubes

2017-06-16 Thread motech man
On Wednesday, June 14, 2017 at 10:56:03 AM UTC-5, Raymond Rizzuto wrote:
> Are their any other Windows tools aside from Rufus that can be used to 
> successfully create a bootable USB drive for installing Qubes?  I.e. Etcher, 
> Unetbootin, YUMI, etc.
> 
> The install manual mentions that "Be sure to select “DD image” mode (you need 
> to do that after selecting the Qubes ISO)" when using Rufus.  Is there an 
> equivalent step if using other tools?

You might try https://www.rmprepusb.com/ or https://unetbootin.github.io/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/44733768-f8a4-4508-a7de-2c2f030838f6%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Great difficulty installing Qubes OS 3.2 (current release) on MSI Intel i7 7th gen, HD 630 graphics

2017-06-16 Thread motech man
I've been trying to install Qubes for several days now with no luck at all. I'm 
not a linux newb, and I recognize Qubes is quite different. Problem is that the 
errors and info about booting are displayed and gone to rapidly to read.

This system doesn't have removable media, except thru USB. I have a USB DVD and 
I've copied the ISO onto USB key as well. On DVD I see a grub menu with all 
entries just chainload to xen.efi. I verfied the ISO with sha512 hash, and 
verified the DVD when it was burnt. Used dd to copy ISO to USB, but as I write 
this I realize the USB has 2  partitions so I will dd it again after 
reformatting to a single partition using gparted. Not sure that will matter but 
it just occurred to me.

When I boot usb key no grub and different errors

This mobo uses an MSI "Click BIOS". I have zeroed out all keys. I have disabled 
all secure boot options. It's kindof odd where the key management lives, but I 
disabled all options under the "Advanced/Windows OS Configuration" menu.

There are 3 areas that relate to booting:
1) Advanced/Windows OS Configuration menu
2) Boot menu
3) Under Save / Exit - boot overrides

I can access an EFI shell under #3, but don't know what the cmd line to invoke 
is. Help not useful for listing devices. When booting off the DVD I can list 
the devices by typing ls . There is an SSD + HDD + whatever usb devices I 
plug in.

Under the Boot menu is a Boot mode, which has 2 settings: UEFI or UEFI+Legacy. 
In UEFI only mode (the main one I've focused on) there are 7 options for boot 
order. I set 2 and disable all the rest. 1=UEFI USB Key, 2=UEFI USB CD/DVD.

Under Windows OS Configuration there are 4 settings:
1) Windows 8.2/Windows 10 WHQL
2) Windows 7
3) MSI FAST Boot (no scan for boot devices, use only configured)
4) FAST Boot

I have all 4 options set to disabled, which implicitly disables Secure Boot I 
believe. BTW - the MSI mobo manual is no help for BIOS setup.

If I enable option 1 I can see additional Secure Boot options, including key 
management. I have backed up then cleared all keys, then disabled secure boot 
by switching option #1 back to disabled.

With boot mode = UEFI I briefly see 8 or 9 lines of text and then am dumped 
into grub prompt which erases that info. If I boot the USB DVD I get the 4 
Qubes lines which chainload to xen.efi with various options. I have read the 
troubleshooting guide and appened efi=attr=uc and one other variation 
(nobootexit I believe) which has no visible effect.

Not sure why grub runs when booting off DVD when BIOS allows ONLY UEFI. That 
looks like a legacy boot response to me. Silly to boot a UEFI grub which 
chainloads to an EFI, so perhaps BIOS is not doing ONLY a UEFI boot as the 
setting indicates.

Not sure what to try next. I did stumble onto a PDF file from Linux.org IIRC 
about how Open OS devs CAN boot using Secure Boot by checking if the UEFI BIOS 
is in "setup mode" and if so the OS can then install it's own keys. The PDF 
described the process in considerable detail. I don't know why Qubes doesn't 
use that method, unless they discovered there are too many bugs in UEFI 
implementations or UEFI versions capable of that process are too new and not 
widespread enough to rely on.

Anyway, looking for any help or alternative to get Qubes installed you can 
offer. I have an old rEFInd CD I could try to boot, maybe it could be booted 
and from that it could load Qubes from the USB key. Other than that I am not 
sure what to do next.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cbad62e6-0a35-42d0-b889-d828d01c5545%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Ubdate Electrum offline-wallet

2017-06-16 Thread Finsh
update: I restored the same seed on an other computer.and everything works, 
the btc are there, everything fine.I really dont get it.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a00cfdea-d23e-485b-bcbd-f6880506da9c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Ubdate Electrum offline-wallet

2017-06-16 Thread Finsh
Im sorry, im a bit nervous(i need to pay my VPN untill tomorrow)

i only run the new version in the template with /.electrum(because its not 
installed) the installed version however from debain is 2.7.9, which has a bug 
so i cant use it as an offlinewallet.
I experimented a little in the meantime.i uninstalled the btc client, 
reinstalled it in a regulär debian-8 template, and made a appwm for the wallet 
whit sys-whonix as netvm.
i restored the old wallet(the offline seed) but the btc are gone? i could see 
them on the online/whatching olny wallet.
does this mean the btc are gone?!

i

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e5e17ee4-0f8b-4440-b8e5-672359bf5d95%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] accessing nfts secondary harddrive in qube

2017-06-16 Thread carre89
I mounted a secondary hard drive to my qube using the "qvm-block" cmd and it 
shows up in the file explorer. When I double click it, nothing happens and 
don't have permissions to access it via the terminal. What else do I need to do 
to access my drive?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9697b1fd-12fa-4b2e-9f7e-f90883eab892%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Request for feedback: 4.9 Kernel

2017-06-16 Thread Vít Šesták
Not using i915 driver on new CPU is my experience with i7-7500U (Intel HD 
graphics 620). But Haswell is not so new and I believe even Skylakes should be 
covered by i915.preliminary_hw_support=1.

Regards,
Vít Šesták 'v6ak'

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8de2e809-6965-4605-9b4e-50eb36ca58c0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Ubdate Electrum offline-wallet

2017-06-16 Thread Andrew Morgan
On 06/16/2017 06:45 AM, Finsh wrote:
> Hello? Anyone? i Really need help now, Electrum doesnt boot at al in Qubes, 
> regardles from the app-vm, templatevm ore whatever.How is this even possible?!
> 

Woah slow down. We need some details if we're going to help you.

If you spawn a new terminal in your AppVM containing electrum, and run
`electrum` in the terminal, is there any output? If so, and it's still
not launching, can you paste it here?

Since you stated you're running `./electrum` in an earlier post, it
sounds like you're trying to run a copy of electrum that's not from the
package manager. If you reinstall electrum as normal (sudo apt-get
install electrum) do it run then?

If a program is uninstalled without Qubes knowing shortcuts that don't
work can be left over in the dom0 menu. To remedy this first run
`qvm-sync-appmenus ` in dom0, then navigate to the 'Add
more shortcuts...' menu for your desired VM and try to remove and re-add
electrum. If there binary is valid it should now launch.

Let us know how you get on.

Andrew Morgan

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/oi0rjs%245i1%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


[qubes-users] AEM: Should we drop .png support?

2017-06-16 Thread Rusty Bird
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi everyone,

What do you think about getting rid [1] of .png image secret support in
the next major version of Anti Evil Maid? This would offset some of the
increase in complexity incurred by the upcoming TOTP/keyfile support, in
addition to other benefits:

- - Considering that AEM is a security oriented feature, it's kind of bad
  to implicitly encourage the user to copy a complex image format from
  some VM to dom0 - where it will be parsed during boot. (It would be
  possible to build something [2] secure using the qubes.GetImageRGBA
  RPC service, but I don't know if anyone's particularly interested in
  working on that.)

- - .png support is hacky and weird: We show text secrets in the current
  dialog, but images appear in the *next* dialog. And text secrets are
  cleared from the screen as soon as possible, whereas image secrets
  stay visible until Plymouth finishes.

For users who prefer the more visual approach, we could tweak the
Plymouth theme to use a monospace font for text secrets. That should
make ASCII art a viable replacement for conventional images.

Rusty


1. 
https://github.com/rustybird/qubes-antievilmaid/commit/4e45af289d0e651a380f3182cb07901a3002905f

2. Similar to the WIP dom0 wallpaper service:
   https://github.com/QubesOS/qubes-issues/issues/215
-BEGIN PGP SIGNATURE-
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=em7I
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170616134725.GA31534%40mutt.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Ubdate Electrum offline-wallet

2017-06-16 Thread Finsh
Hello? Anyone? i Really need help now, Electrum doesnt boot at al in Qubes, 
regardles from the app-vm, templatevm ore whatever.How is this even possible?!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a5ad5db8-a0b5-45a6-b953-ca0e42ea5169%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes and USB Ethernet adapter

2017-06-16 Thread bbrr3332
On Friday, June 16, 2017 at 7:28:53 AM UTC+1, Swâmi Petaramesh wrote:
> Hi,
> 
> I have a new Asus laptop which comes with no integrated Ethernet, but an
> USB Gigabit Ethernet adapter.
> 
> I wonder if this will be compatible with Qubes' Net VM, or if I will
> need to allocate the complete USB controller to the net VM - which would
> be extremely annoying to me...
> 
> Any clue appreciated.
> 
> Kind regards.
> 
> -- 
> Swâmi Petaramesh  PGP 9076E32E

I've tried using an ASUS USB Ethernet adapter (with a Dell laptop in my case, 
but probably not relevant) without luck. I found that an USB Wifi Dongle worked 
better.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dfe4f76f-980c-4ab6-8f28-56715cf0797b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.