[qubes-users] Re: Anonymous as possible

2019-08-26 Thread rec wins
On 8/26/19 9:19 AM, 'awokd' via qubes-users wrote:
> GT500Shlby:
> 
>> then using a vpn with bitcoin
> 
> Be aware of the money trail.
> 
>> However, my concern is, I'm having trouble finding the latest release date. 
>> the listed release schedule makes it look like the current stable release 
>> is over a year old. What is the TL;DR of the state of development of Qubes?
> 
> TL;DR check file date on 4.0.1-x86_64 ISO in
> https://mirrors.edge.kernel.org/qubes/iso/ . Longer info is 4.0.2 is in
> active development. The point releases don't really matter though,
> because if you patch 4.0 to current level you have 4.0.1. Same when
> 4.0.2 ships. Multiple people are constantly updating Qubes; check the
> Qubes Github repos for another idea of activity level.
> 

sound like a good candidate for  whonix-dvms   maybe with the apparmour
thingy


https://www.whonix.org/wiki/DoNot
https://www.whonix.org/wiki/Documentation

https://forums.whonix.org/c/general-tor-and-anonymity-talk

don't trust "qubes" either  verify your .iso , maybe evil-maid with a
TPM if it's that badgoodluck

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8ae26d02-2c06-b901-70fc-8d9315c53102%40riseup.net.


Re: [qubes-users] Anonymous as possible

2019-08-26 Thread 'awokd' via qubes-users
GT500Shlby:

> then using a vpn with bitcoin

Be aware of the money trail.

> However, my concern is, I'm having trouble finding the latest release date. 
> the listed release schedule makes it look like the current stable release 
> is over a year old. What is the TL;DR of the state of development of Qubes?

TL;DR check file date on 4.0.1-x86_64 ISO in
https://mirrors.edge.kernel.org/qubes/iso/ . Longer info is 4.0.2 is in
active development. The point releases don't really matter though,
because if you patch 4.0 to current level you have 4.0.1. Same when
4.0.2 ships. Multiple people are constantly updating Qubes; check the
Qubes Github repos for another idea of activity level.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f3d93e1d-50ad-3151-ec8b-5f21b37a44a8%40danwin1210.me.


[qubes-users] Re: nmcli loosing connectivity

2019-08-26 Thread 'awokd' via qubes-users
panina:

> What usually happends is that the system looses connectivity from time
> to time. Sys-net reports the wifi as connected, but cannot ping my
> gateway. The solution is to use nmcli to bring the connection down, and
> up again. This will most of the time bring up the connectivity again.
> Restarting the NetworkManager service does not help.

Try swapping your sys-net template from Fedora to Debian or vice-versa.
Sometimes one distro will handle a wifi card better than another.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4a397a63-65fa-2a1e-5f09-b45da30c2b74%40danwin1210.me.


[qubes-users] Num Lock LED syncs with Hard Drvie LED

2019-08-26 Thread cmschube
Has anyone seen their Num lock LED on an external keyboard turn into a HD 
LED? I can't quite yet put my finger on when it starts. If I reboot it'll 
go away and then I'll look down later and it will have started again.. 

Running 4.0.1, Dell Latitude E7470 through docking station. I haven't ruled 
out the docking station yet. 

TIA

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/58b42322-a36b-4232-ab6f-9ab3ab4acc61%40googlegroups.com.


Re: [qubes-users] slightly off-topic: self-resetting OS idea

2019-08-26 Thread 799
Hello

David Hobach  schrieb am Mo., 26. Aug. 2019, 11:22:

> On 8/26/19 10:24 AM, panina wrote:
> > Hi!
> >
> > This is not strictly Qubes-OS related, rather inspired by Qubes.
> >
> > I've been struggling with some parts of Qubes usage. Most of the time,
> > it is overkill for me, and putting some strain on my computer. The
> > bugginess is also quite annoying, whenever I just need to do some
> > everyday work.
> > I've been thinking I'd like some form of dual-boot solution, or possibly
> > a Live USB that could be used.
> > Most of the time I work with ssh and webapps, so the only persistent
> > data I need to work will fit on a smartcard.
> >
> > My thought is to have an installation that mounts most of the root
> > partition as readonly, and uses ramdisks wherever the system wants to
> > write (e.g /var/log). I'm also thinking it should be possible to get a
> > fingerprint or somesuch of the root partition, and use my TPM2 to check
> > this.
> >
> > The system should also have a possibility to update itself, that I can
> > choose to do in environments that I feel is safe.
> >
> > I am wondering if anyone knows of an OS that works like this? Or if
> > anyone knows of tools that might accomplish parts of this?
>
> Ehm... You're describing Qubes OS with disposable VMs there? The
> fingerprinting is essentially AEM?
>
> If you need to keep your data on an external disk (SDCard), you can use
> either a manual approach with qvm-copy, permanently attach the disk to a
> single disposable VM with a fixed name or use an automated solution such
> as [1]. You might also want to look into qvm-pool.
>
> [1] https://github.com/3hhh/qcrypt


I don't know why people are complaining about the "bugginess" and that it
needs more performance.

If you buy the right hardware you'll not run into lots of bugs and get
enough performance to run qubes. You can buy a Lenovo T530/430, W530, X230
for not much money, add a SSD some RAM and you'll not run into performance
problems (normal use).

As David mentioned Qubes will do exactly what you need if you're using
disposable VMs.
Regarding the fingerprinting, you can use AEM (Anti Evil Maid) or write
your own script.
I tried something which will fingerprint all files in /boot and gpg sign
the signature which is then stored in the LUKS encrypted root partition.

You can then free booting into Qubes check the current boot Partition
against the fingerprints.
https://github.com/one7two99/my-qubes/tree/master/docs/boot-protect

Not sure if this is really secure, would be nice to have this checked by
someone who knows more about security.

[799]

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ3yz2vkPZAv4pTQzTn9_W%2Bp_yC5_ZtOz3rmdvi59on60u88Qw%40mail.gmail.com.


[qubes-users] Anonymous as possible

2019-08-26 Thread GT500Shlby
Recently I went looking for as high as humanly possible anonymity but 
quickly deployed. 

For a purely hypothetical example, say I have evidence on a prominent 
person. Think got mistress prego, mistress no want abortion, mistress gets 
bookend to skull, murder cover-up gone awry. So obviously me having said 
info, puts me in severe risk of being killed myself. Like full on 
conspiracy theory novel/adventure story. The idea is to be as realistic to 
the cyber security preparations as possible.

So I pick out an older laptop from recycle, flash the bios and remove any 
serial numbers and assets tags, pop in a newer SSD from a different 
recycled system (0 purchae records), reflash its firmware to remove serial 
number. Source an external wireless adapter with changeable MAC address and 
again, make sure no digital serial number. Now I need an OS. TAILS is a 
good option, but I saw Qubes used a while back and thought of it.

The idea is to go to a public place with lots of stores/cafes that have 
free wifi, but sitting outside those establishments in a non-cctv area but 
jacking their wifi, probably using a sharklasers email to get registered 
then using a vpn with bitcoin and another sharklasers email and then using 
tor above that to then create a throwaway reddit account to browse on 
r/gonewild err I mean drop the docs on the bad dude.

However, my concern is, I'm having trouble finding the latest release date. 
the listed release schedule makes it look like the current stable release 
is over a year old. What is the TL;DR of the state of development of Qubes?

>From other privacy focused people, are their any holes in my privacy scheme?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8ef85c75-b81d-497e-880a-d51a73ea1e6d%40googlegroups.com.


Re: [qubes-users] No wifi in debian10

2019-08-26 Thread unman
On Mon, Aug 26, 2019 at 02:50:28PM +0200, evo wrote:
> Hey!
> 
> I have installed the debian 10 template and set the sys-net on deb10.
> But there i have no wifi. iwconfig shows "no wireless extensions".
> So there is no firmware for the wifi-card as it seems.
> 
> I have Thinkpad W530.
> 
> Best regards
> evo
> 

You could find the answer by searching for this problem with Debian -
it isn't Qubes specific.
Once you know what package you need to provide the firmware for your
wi-fi card, make sure that you install it *in the template* NOT in
sys-net. journalctl -b will probably show you an error in sys-net,
telling you what firmware is lacking.
Some people like to clone the template before installing new drivers in
to the new template.
That's up to you.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190826140719.GA28824%40thirdeyesecurity.org.


[qubes-users] No wifi in debian10

2019-08-26 Thread evo
Hey!

I have installed the debian 10 template and set the sys-net on deb10.
But there i have no wifi. iwconfig shows "no wireless extensions".
So there is no firmware for the wifi-card as it seems.

I have Thinkpad W530.

Best regards
evo

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/efbc73e7-c5b5-4d97-1c62-e84260ce979d%40aliaks.de.


Re: [qubes-users] slightly off-topic: self-resetting OS idea

2019-08-26 Thread David Hobach

On 8/26/19 10:24 AM, panina wrote:

Hi!

This is not strictly Qubes-OS related, rather inspired by Qubes.

I've been struggling with some parts of Qubes usage. Most of the time,
it is overkill for me, and putting some strain on my computer. The
bugginess is also quite annoying, whenever I just need to do some
everyday work.
I've been thinking I'd like some form of dual-boot solution, or possibly
a Live USB that could be used.
Most of the time I work with ssh and webapps, so the only persistent
data I need to work will fit on a smartcard.

My thought is to have an installation that mounts most of the root
partition as readonly, and uses ramdisks wherever the system wants to
write (e.g /var/log). I'm also thinking it should be possible to get a
fingerprint or somesuch of the root partition, and use my TPM2 to check
this.

The system should also have a possibility to update itself, that I can
choose to do in environments that I feel is safe.

I am wondering if anyone knows of an OS that works like this? Or if
anyone knows of tools that might accomplish parts of this?


Ehm... You're describing Qubes OS with disposable VMs there? The 
fingerprinting is essentially AEM?


If you need to keep your data on an external disk (SDCard), you can use 
either a manual approach with qvm-copy, permanently attach the disk to a 
single disposable VM with a fixed name or use an automated solution such 
as [1]. You might also want to look into qvm-pool.


[1] https://github.com/3hhh/qcrypt

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ffaf90c5-ee87-5982-b1a3-22028583e6f9%40hackingthe.net.


smime.p7s
Description: S/MIME Cryptographic Signature


[qubes-users] nmcli loosing connectivity

2019-08-26 Thread panina
Hello

I've been using Qubes as my everyday OS for a month or so.
During the whole time I've had a lot of wifi issues. I'm guessing it
might be some problem with the passthrough, but am not sure.

What usually happends is that the system looses connectivity from time
to time. Sys-net reports the wifi as connected, but cannot ping my
gateway. The solution is to use nmcli to bring the connection down, and
up again. This will most of the time bring up the connectivity again.
Restarting the NetworkManager service does not help.

Does anyone recognize this issue, and does anyone have ideas on how to
find the bug?

My system is an AMD Lenovo Thinkpad A485, and my WiFi card is an Realtek
RTL8822BE.
The WiFi works fine under basic Fedora.

Grateful for any ideas, and just ask for more info (eg logs) if needed

<3
/panina

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9500f313-3c07-49c5-5c06-15bae8ca592e%40nonbinary.me.


signature.asc
Description: OpenPGP digital signature


[qubes-users] slightly off-topic: self-resetting OS idea

2019-08-26 Thread panina
Hi!

This is not strictly Qubes-OS related, rather inspired by Qubes.

I've been struggling with some parts of Qubes usage. Most of the time,
it is overkill for me, and putting some strain on my computer. The
bugginess is also quite annoying, whenever I just need to do some
everyday work.
I've been thinking I'd like some form of dual-boot solution, or possibly
a Live USB that could be used.
Most of the time I work with ssh and webapps, so the only persistent
data I need to work will fit on a smartcard.

My thought is to have an installation that mounts most of the root
partition as readonly, and uses ramdisks wherever the system wants to
write (e.g /var/log). I'm also thinking it should be possible to get a
fingerprint or somesuch of the root partition, and use my TPM2 to check
this.

The system should also have a possibility to update itself, that I can
choose to do in environments that I feel is safe.

I am wondering if anyone knows of an OS that works like this? Or if
anyone knows of tools that might accomplish parts of this?

<3
/panina

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/38cd264c-51ba-a468-b514-438896b377cb%40nonbinary.me.


signature.asc
Description: OpenPGP digital signature