[qubes-users] Re: Anonymous as possible
On 8/26/19 9:19 AM, 'awokd' via qubes-users wrote: > GT500Shlby: > >> then using a vpn with bitcoin > > Be aware of the money trail. > >> However, my concern is, I'm having trouble finding the latest release date. >> the listed release schedule makes it look like the current stable release >> is over a year old. What is the TL;DR of the state of development of Qubes? > > TL;DR check file date on 4.0.1-x86_64 ISO in > https://mirrors.edge.kernel.org/qubes/iso/ . Longer info is 4.0.2 is in > active development. The point releases don't really matter though, > because if you patch 4.0 to current level you have 4.0.1. Same when > 4.0.2 ships. Multiple people are constantly updating Qubes; check the > Qubes Github repos for another idea of activity level. > sound like a good candidate for whonix-dvms maybe with the apparmour thingy https://www.whonix.org/wiki/DoNot https://www.whonix.org/wiki/Documentation https://forums.whonix.org/c/general-tor-and-anonymity-talk don't trust "qubes" either verify your .iso , maybe evil-maid with a TPM if it's that badgoodluck -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8ae26d02-2c06-b901-70fc-8d9315c53102%40riseup.net.
Re: [qubes-users] Anonymous as possible
GT500Shlby: > then using a vpn with bitcoin Be aware of the money trail. > However, my concern is, I'm having trouble finding the latest release date. > the listed release schedule makes it look like the current stable release > is over a year old. What is the TL;DR of the state of development of Qubes? TL;DR check file date on 4.0.1-x86_64 ISO in https://mirrors.edge.kernel.org/qubes/iso/ . Longer info is 4.0.2 is in active development. The point releases don't really matter though, because if you patch 4.0 to current level you have 4.0.1. Same when 4.0.2 ships. Multiple people are constantly updating Qubes; check the Qubes Github repos for another idea of activity level. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f3d93e1d-50ad-3151-ec8b-5f21b37a44a8%40danwin1210.me.
[qubes-users] Re: nmcli loosing connectivity
panina: > What usually happends is that the system looses connectivity from time > to time. Sys-net reports the wifi as connected, but cannot ping my > gateway. The solution is to use nmcli to bring the connection down, and > up again. This will most of the time bring up the connectivity again. > Restarting the NetworkManager service does not help. Try swapping your sys-net template from Fedora to Debian or vice-versa. Sometimes one distro will handle a wifi card better than another. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/4a397a63-65fa-2a1e-5f09-b45da30c2b74%40danwin1210.me.
[qubes-users] Num Lock LED syncs with Hard Drvie LED
Has anyone seen their Num lock LED on an external keyboard turn into a HD LED? I can't quite yet put my finger on when it starts. If I reboot it'll go away and then I'll look down later and it will have started again.. Running 4.0.1, Dell Latitude E7470 through docking station. I haven't ruled out the docking station yet. TIA -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/58b42322-a36b-4232-ab6f-9ab3ab4acc61%40googlegroups.com.
Re: [qubes-users] slightly off-topic: self-resetting OS idea
Hello David Hobach schrieb am Mo., 26. Aug. 2019, 11:22: > On 8/26/19 10:24 AM, panina wrote: > > Hi! > > > > This is not strictly Qubes-OS related, rather inspired by Qubes. > > > > I've been struggling with some parts of Qubes usage. Most of the time, > > it is overkill for me, and putting some strain on my computer. The > > bugginess is also quite annoying, whenever I just need to do some > > everyday work. > > I've been thinking I'd like some form of dual-boot solution, or possibly > > a Live USB that could be used. > > Most of the time I work with ssh and webapps, so the only persistent > > data I need to work will fit on a smartcard. > > > > My thought is to have an installation that mounts most of the root > > partition as readonly, and uses ramdisks wherever the system wants to > > write (e.g /var/log). I'm also thinking it should be possible to get a > > fingerprint or somesuch of the root partition, and use my TPM2 to check > > this. > > > > The system should also have a possibility to update itself, that I can > > choose to do in environments that I feel is safe. > > > > I am wondering if anyone knows of an OS that works like this? Or if > > anyone knows of tools that might accomplish parts of this? > > Ehm... You're describing Qubes OS with disposable VMs there? The > fingerprinting is essentially AEM? > > If you need to keep your data on an external disk (SDCard), you can use > either a manual approach with qvm-copy, permanently attach the disk to a > single disposable VM with a fixed name or use an automated solution such > as [1]. You might also want to look into qvm-pool. > > [1] https://github.com/3hhh/qcrypt I don't know why people are complaining about the "bugginess" and that it needs more performance. If you buy the right hardware you'll not run into lots of bugs and get enough performance to run qubes. You can buy a Lenovo T530/430, W530, X230 for not much money, add a SSD some RAM and you'll not run into performance problems (normal use). As David mentioned Qubes will do exactly what you need if you're using disposable VMs. Regarding the fingerprinting, you can use AEM (Anti Evil Maid) or write your own script. I tried something which will fingerprint all files in /boot and gpg sign the signature which is then stored in the LUKS encrypted root partition. You can then free booting into Qubes check the current boot Partition against the fingerprints. https://github.com/one7two99/my-qubes/tree/master/docs/boot-protect Not sure if this is really secure, would be nice to have this checked by someone who knows more about security. [799] -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAJ3yz2vkPZAv4pTQzTn9_W%2Bp_yC5_ZtOz3rmdvi59on60u88Qw%40mail.gmail.com.
[qubes-users] Anonymous as possible
Recently I went looking for as high as humanly possible anonymity but quickly deployed. For a purely hypothetical example, say I have evidence on a prominent person. Think got mistress prego, mistress no want abortion, mistress gets bookend to skull, murder cover-up gone awry. So obviously me having said info, puts me in severe risk of being killed myself. Like full on conspiracy theory novel/adventure story. The idea is to be as realistic to the cyber security preparations as possible. So I pick out an older laptop from recycle, flash the bios and remove any serial numbers and assets tags, pop in a newer SSD from a different recycled system (0 purchae records), reflash its firmware to remove serial number. Source an external wireless adapter with changeable MAC address and again, make sure no digital serial number. Now I need an OS. TAILS is a good option, but I saw Qubes used a while back and thought of it. The idea is to go to a public place with lots of stores/cafes that have free wifi, but sitting outside those establishments in a non-cctv area but jacking their wifi, probably using a sharklasers email to get registered then using a vpn with bitcoin and another sharklasers email and then using tor above that to then create a throwaway reddit account to browse on r/gonewild err I mean drop the docs on the bad dude. However, my concern is, I'm having trouble finding the latest release date. the listed release schedule makes it look like the current stable release is over a year old. What is the TL;DR of the state of development of Qubes? >From other privacy focused people, are their any holes in my privacy scheme? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8ef85c75-b81d-497e-880a-d51a73ea1e6d%40googlegroups.com.
Re: [qubes-users] No wifi in debian10
On Mon, Aug 26, 2019 at 02:50:28PM +0200, evo wrote: > Hey! > > I have installed the debian 10 template and set the sys-net on deb10. > But there i have no wifi. iwconfig shows "no wireless extensions". > So there is no firmware for the wifi-card as it seems. > > I have Thinkpad W530. > > Best regards > evo > You could find the answer by searching for this problem with Debian - it isn't Qubes specific. Once you know what package you need to provide the firmware for your wi-fi card, make sure that you install it *in the template* NOT in sys-net. journalctl -b will probably show you an error in sys-net, telling you what firmware is lacking. Some people like to clone the template before installing new drivers in to the new template. That's up to you. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20190826140719.GA28824%40thirdeyesecurity.org.
[qubes-users] No wifi in debian10
Hey! I have installed the debian 10 template and set the sys-net on deb10. But there i have no wifi. iwconfig shows "no wireless extensions". So there is no firmware for the wifi-card as it seems. I have Thinkpad W530. Best regards evo -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/efbc73e7-c5b5-4d97-1c62-e84260ce979d%40aliaks.de.
Re: [qubes-users] slightly off-topic: self-resetting OS idea
On 8/26/19 10:24 AM, panina wrote: Hi! This is not strictly Qubes-OS related, rather inspired by Qubes. I've been struggling with some parts of Qubes usage. Most of the time, it is overkill for me, and putting some strain on my computer. The bugginess is also quite annoying, whenever I just need to do some everyday work. I've been thinking I'd like some form of dual-boot solution, or possibly a Live USB that could be used. Most of the time I work with ssh and webapps, so the only persistent data I need to work will fit on a smartcard. My thought is to have an installation that mounts most of the root partition as readonly, and uses ramdisks wherever the system wants to write (e.g /var/log). I'm also thinking it should be possible to get a fingerprint or somesuch of the root partition, and use my TPM2 to check this. The system should also have a possibility to update itself, that I can choose to do in environments that I feel is safe. I am wondering if anyone knows of an OS that works like this? Or if anyone knows of tools that might accomplish parts of this? Ehm... You're describing Qubes OS with disposable VMs there? The fingerprinting is essentially AEM? If you need to keep your data on an external disk (SDCard), you can use either a manual approach with qvm-copy, permanently attach the disk to a single disposable VM with a fixed name or use an automated solution such as [1]. You might also want to look into qvm-pool. [1] https://github.com/3hhh/qcrypt -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ffaf90c5-ee87-5982-b1a3-22028583e6f9%40hackingthe.net. smime.p7s Description: S/MIME Cryptographic Signature
[qubes-users] nmcli loosing connectivity
Hello I've been using Qubes as my everyday OS for a month or so. During the whole time I've had a lot of wifi issues. I'm guessing it might be some problem with the passthrough, but am not sure. What usually happends is that the system looses connectivity from time to time. Sys-net reports the wifi as connected, but cannot ping my gateway. The solution is to use nmcli to bring the connection down, and up again. This will most of the time bring up the connectivity again. Restarting the NetworkManager service does not help. Does anyone recognize this issue, and does anyone have ideas on how to find the bug? My system is an AMD Lenovo Thinkpad A485, and my WiFi card is an Realtek RTL8822BE. The WiFi works fine under basic Fedora. Grateful for any ideas, and just ask for more info (eg logs) if needed <3 /panina -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9500f313-3c07-49c5-5c06-15bae8ca592e%40nonbinary.me. signature.asc Description: OpenPGP digital signature
[qubes-users] slightly off-topic: self-resetting OS idea
Hi! This is not strictly Qubes-OS related, rather inspired by Qubes. I've been struggling with some parts of Qubes usage. Most of the time, it is overkill for me, and putting some strain on my computer. The bugginess is also quite annoying, whenever I just need to do some everyday work. I've been thinking I'd like some form of dual-boot solution, or possibly a Live USB that could be used. Most of the time I work with ssh and webapps, so the only persistent data I need to work will fit on a smartcard. My thought is to have an installation that mounts most of the root partition as readonly, and uses ramdisks wherever the system wants to write (e.g /var/log). I'm also thinking it should be possible to get a fingerprint or somesuch of the root partition, and use my TPM2 to check this. The system should also have a possibility to update itself, that I can choose to do in environments that I feel is safe. I am wondering if anyone knows of an OS that works like this? Or if anyone knows of tools that might accomplish parts of this? <3 /panina -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/38cd264c-51ba-a468-b514-438896b377cb%40nonbinary.me. signature.asc Description: OpenPGP digital signature