[qubes-users] Cannot use bluetooth headset with Fedora-30 + Bluez

2020-01-15 Thread Claudio Chinicz
Hi All,

I've installed Bluez and Pulse Audio on a Fedora-30 based VM. When I attach 
my Bluetooth USB dongle to the VM I see the Bluetooth icon in the upper 
right corner.

If I click on the icon it opens Bluetooth Manager and I can scan and find 
my headset. Then I "trust" it and successfully pair it.

To my surprise, when I open the browser and play any sound it comes out of 
the embedded speakers in my computer (Dell Latitude 5590 Core i5 8th gen).

When I open  Pulse Audio Control to configure the audio I see only "Qubes 
vChan Output/Input" and not the Bluez device.

Any ideas?

Thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7f1ffdd8-9911-496b-9a54-b409f06aedd2%40googlegroups.com.


Re: [qubes-users] I am experiencing various problems with my OS

2020-01-15 Thread Abel Luck
'Rock Francis' via qubes-users:
> I've always had trouble with any Linux Beast OS from my original PC to my 
> original laptop.
> 
> But the biggest problem that I'm facing right now is unlocking my ability to 
> connect through my ethernet cable, I keep running into the problem know as 
> "libexlight" or something.
> 


This is not near enough information to enable someone on this list to
help troubleshoot your issue.

Please provide the following, and perhaps someone will be able to respond:


* details of the hardware you're running
* details of the OS you're running
* specific error message
* context of the error message (what you're doing when it appears)

~abel

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a2e14866-48eb-8f00-21be-35f16c7cbe2b%40guardianproject.info.


[qubes-users] Re: qvm-create-windows-qube 2.0

2020-01-15 Thread max via qubes-users


mandag den 13. januar 2020 kl. 10.49.12 UTC+1 skrev Elliot Killick:
>
> -BEGIN PGP SIGNED MESSAGE- 
> Hash: SHA256 
>
> Hello, all! 
>
> Not too long ago I released qvm-create-windows-qube but quit pushing 
> changes for a while because I realized there was still a of work to be 
> done and I wanted to get it out of the dev/beta phase before releasing a 
> new version.


This looks promising. Looking forward to testing it, thank you.
 

> Well, it's over 200 commits later and I would say it's well out of 
> beta now. 
>

I actually believe that the general adoption of Qubes in the world would be 
larger if the windows guest support was better, you might actaully be able 
to get funding for your efforts 
(https://opencollective.com/qubes-os/expenses/). You might ask a QubesOS 
representative for that possibility(Andrew, maybe?) 

That might push the adoption to be broader and the sponsors to be more and 
helping Qubes to be even more widespread than it is now.

Sincerely
Max
 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e0e8dea5-ddac-47da-8421-834417a7b3e1%40googlegroups.com.


[qubes-users] Re: Qubes Kali / Parrot vm guide

2020-01-15 Thread max via qubes-users


torsdag den 16. januar 2020 kl. 00.15.29 UTC+1 skrev Rafael Reis:
>
> Sources: 
>
> https://www.qubes-os.org/doc/pentesting/kali/#qubes-40
>
> https://docs.parrotlinux.org/getting-started/install-qubes/
>
>
> Hey guys. 
>
> I'm following the instructions above to install Kali / Parrot  to Qubes.
>
> Both guides require a debian dist-upgrade to the testing release. Both 
> guides mention the following:
>
>
> *Note:* During execution of a dist-upgrade command read carefully list of 
>> packages to be removed. If it contains qubes-* packages, terminate 
>> operation and try to resolve qubes-* packages missing dependencies first.
>>
>
> This is exactly what happened. I have:
>
> qubes-core-agent-dom0-updates qubes-core-agent-passwordless-root
>   qubes-gpg-split qubes-img-converter qubes-input-proxy-sender
>   qubes-mgmt-salt-vm-connector qubes-pdf-converter qubes-thunderbird
>   qubes-usb-proxy 
>
>
> for removal.
>
> I'm not advanced enough to know what to do to "resolve qubes-* packages 
> missing dependencies first."
>
> Could anybody help?
>
 

I had success with entering a command like this just before doing the 
dist-upgrade(don't remember all the packages):


sudo apt install qubes-core-agent-dom0-updates qubes-core-agent-passwordless
-qubes-gpg-split qubes-img-converter qubes-input-proxy-sender qubes-mgmt-
salt-vm-connector qubes-pdf-converter qubes-thunderbird qubes-usb-proxy


That, I seem to recall, removed the need for package removal and made my 
first easily installed kali based on debian-10.


Sincerely

Max



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b4adb67a-1ec0-4d6c-9f19-3cfbae1b6c70%40googlegroups.com.


Re: [qubes-users] Xen doesn't recognize that a VM has finished starting

2020-01-15 Thread tetrahedra via qubes-users

On Wed, Jan 15, 2020 at 11:22:12PM +, Claudia wrote:

When I try to start another VM which has been set to use the new-sys-net VM as 
its NetVM, the
startup times out and I get the error "libxenlight has
failed to create new domain NEWVM"...

/var/log/xen/console/guest-NEWSYSNET-dm.log doesn't show anything obviously 
wrong, apart from some
call traces of unclear origin.


Not sure, but it sounds like maybe the guest's qrexec isn't connecting to the host. 
Make sure it's installed and running properly in the guest. Check `systemctl status 
qubes-qrexec-agent.service` in the guest, and /var/log/qubes/qrexec..log on 
dom0.


That's very possible. The guest is OpenBSD so no systemctl :)

Here is the other discussion about this, I have not yet gotten a chance
to try the suggested fix, but I anticipate that it will work:
https://github.com/QubesOS/qubes-issues/issues/5294#issuecomment-574225742

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200116022739.GA1043%40danwin1210.me.


[qubes-users] I am experiencing various problems with my OS

2020-01-15 Thread 'Rock Francis' via qubes-users
I've always had trouble with any Linux Beast OS from my original PC to my 
original laptop.

But the biggest problem that I'm facing right now is unlocking my ability to 
connect through my ethernet cable, I keep running into the problem know as 
"libexlight" or something.

Regards, Rock Francis

Sent from ProtonMail mobile

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0WkJhyNTGXSQ5oi92ZeyRY5ZQhu4-FC5PDcJqQtaeuhWQvyf1sLid9tzDMBpjF8iaaYeq0A-2rx6aVbuQgWPw5d0MSL5VBUEdZK_fCRjEF0%3D%40protonmail.ch.


Re: [qubes-users] Xen doesn't recognize that a VM has finished starting

2020-01-15 Thread Claudia
January 14, 2020 12:29 PM, "tetrahedra via qubes-users" 
 wrote:

> I have a HVM VM that I'm trying to set up as a new sys-net.
> 
> However, when I boot it, Xen / Qubes doesn't seem to recognize that the 
> domain has finished
> starting.
> 
> The Qubes menu at the top right shows the red circling progress logo, even 
> though the domain has
> booted already.
> 
> When I try to start another VM which has been set to use the new-sys-net VM 
> as its NetVM, the
> startup times out and I get the error "libxenlight has
> failed to create new domain NEWVM"...
> 
> /var/log/xen/console/guest-NEWSYSNET-dm.log doesn't show anything obviously 
> wrong, apart from some
> call traces of unclear origin.

Not sure, but it sounds like maybe the guest's qrexec isn't connecting to the 
host. Make sure it's installed and running properly in the guest. Check 
`systemctl status qubes-qrexec-agent.service` in the guest, and 
/var/log/qubes/qrexec..log on dom0.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/57ab4930a68179b8a74859b7c59df401%40disroot.org.


[qubes-users] Qubes Kali / Parrot vm guide

2020-01-15 Thread Rafael Reis
Sources: 

https://www.qubes-os.org/doc/pentesting/kali/#qubes-40

https://docs.parrotlinux.org/getting-started/install-qubes/


Hey guys. 

I'm following the instructions above to install Kali / Parrot  to Qubes.

Both guides require a debian dist-upgrade to the testing release. Both 
guides mention the following:


*Note:* During execution of a dist-upgrade command read carefully list of 
> packages to be removed. If it contains qubes-* packages, terminate 
> operation and try to resolve qubes-* packages missing dependencies first.
>

This is exactly what happened. I have:

qubes-core-agent-dom0-updates qubes-core-agent-passwordless-root
  qubes-gpg-split qubes-img-converter qubes-input-proxy-sender
  qubes-mgmt-salt-vm-connector qubes-pdf-converter qubes-thunderbird
  qubes-usb-proxy 


for removal.

I'm not advanced enough to know what to do to "resolve qubes-* packages 
missing dependencies first."

Could anybody help?

Thanks!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/82b8dd63-ec19-479e-8407-ffbe5e8acc9b%40googlegroups.com.


[qubes-users] Qubes OS Network installation - Possible to Mirror dom0 iso contents?

2020-01-15 Thread ryankuba
I was trying to put together a network installer for QubesOS for 
netboot.xyz. 

You are already leveraging Dracut with the full network stack and livenet 
hooks so booting something like this example below in IPXE loads the 
installer interface: (if you rip isolinux/initrd.img isolinux/vmlinuz, 
and LiveOS/squashfs.img out of a Live CD)

:CUSTOM
imgfree
set url http://192.168.10.13:8080/
kernel ${url}vmlinuz root=live:${url}squashfs.img 
repo=https://ftp.qubes-os.org/repo/yum/r4.0/current/dom0/fc25/ 
ro rd.live.image rd.lvm=0 rd.luks=0 rd.md=0 rd.dm=0 initrd=initrd
initrd ${url}initrd
boot

The problem is that the hosted repo does not contain the base packages in 
the ISO repo (bash among others). 

Would it be possible to mirror the ISO repo contents to 
"/repo/yum/r4.0/current/dom0/fc25/" to support network based installs 
without a local repo? 

Let me know if you need anymore information. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ee3ec477-aa3f-4384-9c45-b1e6d588fad2%40googlegroups.com.


Re: [qubes-users] PCI passthrough issues

2020-01-15 Thread Ana Z
Hi awokd,

I tried both combinations beforehand, neither of them helped.

I'm not really sure whether I've added xen-pciback.hide to the right place, 
but I added it to the */etc/default/grub under *GRUB_CMDLINE_XEN_DEFAULT 
and commit the change. If that's the thing I should've done, sadly, it 
still doesn't work.

Dana srijeda, 15. siječnja 2020. u 19:36:28 UTC, korisnik awokd napisao je:
>
> Ana Z: 
> > Hi, 
> > 
> > I tried to passthrough my old PCI USB controller (chipset NEC 
> 0720100AGM) 
> > to Windows 7 HVM but I ran into some problems. 
>
> > dom0:01_05.0  USB controller: NEC Corporation OHCI USB 
> > Controller 
> > win7-z (permissive=true, no-strict-reset=true) 
> > dom0:01_05.1  USB controller: NEC Corporation OHCI USB 
> > Controller 
> > win7-z (permissive=true, no-strict-reset=true) 
> > dom0:01_05.2  USB controller: NEC Corporation uPD72010x USB 2.0 
> > Controller win7-z 
> > (permissive=true, no-strict-reset=true) 
>
> If you haven't, try attaching these with one or both options set to 
> false. If it still doesn't help, see if 
> xen-pciback.hide=(01:05.0)(01:05.1)(01:05.2) in xen.cfg helps. 
>
> -- 
> - don't top post 
> Mailing list etiquette: 
> - trim quoted reply to only relevant portions 
> - when possible, copy and paste text instead of screenshots 
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/291f5e41-0b03-4a6a-bfec-92a461796991%40googlegroups.com.


Re: [qubes-users] PCI passthrough issues

2020-01-15 Thread 'awokd' via qubes-users
Ana Z:
> Hi,
> 
> I tried to passthrough my old PCI USB controller (chipset NEC 0720100AGM) 
> to Windows 7 HVM but I ran into some problems. 

> dom0:01_05.0  USB controller: NEC Corporation OHCI USB 
> Controller 
> win7-z (permissive=true, no-strict-reset=true)
> dom0:01_05.1  USB controller: NEC Corporation OHCI USB 
> Controller 
> win7-z (permissive=true, no-strict-reset=true)
> dom0:01_05.2  USB controller: NEC Corporation uPD72010x USB 2.0 
> Controller win7-z 
> (permissive=true, no-strict-reset=true)

If you haven't, try attaching these with one or both options set to
false. If it still doesn't help, see if
xen-pciback.hide=(01:05.0)(01:05.1)(01:05.2) in xen.cfg helps.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0203b550-3966-52f2-9286-1fcc480a2ae2%40danwin1210.me.


[qubes-users] PCI passthrough issues

2020-01-15 Thread Ana Z
Hi,

I tried to passthrough my old PCI USB controller (chipset NEC 0720100AGM) 
to Windows 7 HVM but I ran into some problems. 

I first found the controller in dom0 with *qvm-pci*:

dom0:01_05.0  USB controller: NEC Corporation OHCI USB 
Controller 
dom0:01_05.1  USB controller: NEC Corporation OHCI USB 
Controller 
dom0:01_05.2  USB controller: NEC Corporation uPD72010x USB 2.0 Controller

I then attached those three with *qvm-pci attach --persistent --option 
permissive=true --option no-strict-reset=true   *and 
I got:

dom0:01_05.0  USB controller: NEC Corporation OHCI USB 
Controller 
win7-z (permissive=true, no-strict-reset=true)
dom0:01_05.1  USB controller: NEC Corporation OHCI USB 
Controller 
win7-z (permissive=true, no-strict-reset=true)
dom0:01_05.2  USB controller: NEC Corporation uPD72010x USB 2.0 
Controller win7-z 
(permissive=true, no-strict-reset=true)

I tried running the Windows 7 HVM and the PCI USB controller was 
recognized, alongside USB Root Hubs, but whenever I physically attach an 
USB device (3 different sticks and 1 WLAN stick) I always get "USB Device 
Not Recognized" and "Unknown USB Device" in one of the used ports.

Before I attached the controller to Windows HVM, dom0 recognized any device 
attached to the controller, and I tried booting up my spare disk with the 
same Windows 7 installation I used for HVM and the PCI controller works 
there, with recognized USB devices when attached.

My question is, what is the next step I should make in troubleshooting the 
problem?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7587670e-d33a-4d30-a7cb-0709091de4c1%40googlegroups.com.


[qubes-users] Qubes OS 4.0.3-rc1 has been released!

2020-01-15 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Qubes Community,

Shortly after the announcement of 4.0.2 [1], a bug [2] was discovered in
the dom0 kernel included in that release. Since the bug would have
presented installation problems for the majority of users. That bug has
now been fixed, along with a few installer fixes, resulting in
4.0.3-rc1.

In keeping with standard semantic versioning [3], we've incremented the
patch version number to reflect this latest fix, so 4.0.2 has become
4.0.3. This is the first release candidate (rc1) for 4.0.3, because we'd
like to give the community an opportunity to test it before declaring it
to be the stable release. However, the changes from 4.0.2 are minimal,
and 4.0.2 itself was preceded by three release candidates, so we plan to
keep the 4.0.3-rc1 testing period brief.

As with 4.0.2, 4.0.3-rc1 includes many updates over the initial 4.0
release, in particular:

 - All 4.0 dom0 updates to date
 - Fedora 30 TemplateVM
 - Debian 10 TemplateVM
 - Whonix 15 Gateway and Workstation TemplateVMs
 - Linux kernel 4.19 by default

Qubes 4.0.3-rc1 is available on the Downloads page:

https://www.qubes-os.org/downloads/


What is a point release?


A point release does not designate a separate, new version of Qubes OS.
Rather, it designates its respective major or minor release (in this
case, 4.0) inclusive of all updates up to a certain point. Installing
Qubes 4.0 and fully updating it results in the same system as installing
Qubes 4.0.3.


What should I do?
=

If you installed Qubes 4.0, 4.0.1, or 4.0.2 and have fully updated [4],
then your system is already equivalent to a Qubes 4.0.3 installation. No
further action is required.

Regardless of your current OS, if you wish to install (or reinstall)
Qubes 4.0 for any reason, then the 4.0.3 ISO makes this more convenient
and secure, since it bundles all Qubes 4.0 updates to date.

*Note:* The Qubes 4.0.3 ISO will not fit on a single-layer DVD (for the
technical details underlying this, please see issue #5367 [5]). Instead,
we recommend copying the ISO onto a sufficiently large USB drive. [6]
However, if you would prefer to use optical media, we suggest selecting
a dual-layer DVD or Blu-ray disc.


Release candidate planning
==

If no major issues are discovered in 4.0.3-rc1, we expect the stable
release of 4.0.3 to follow sometime next week. As usual, you can help by
reporting any bugs you encounter. [7]


[1] https://www.qubes-os.org/news/2020/01/02/qubes-4-0-2/
[2] https://github.com/QubesOS/qubes-issues/issues/5553
[3] https://semver.org
[4] https://www.qubes-os.org/doc/updating-qubes-os/
[5] https://github.com/QubesOS/qubes-issues/issues/5367
[6] 
https://www.qubes-os.org/doc/installation-guide/#copying-the-iso-onto-the-installation-medium
[7] https://www.qubes-os.org/doc/reporting-bugs/


This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2020/01/15/qubes-4-0-3-rc1/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=fh9z
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/289adab2-a0b9-1d27-b861-0aeab285e801%40qubes-os.org.


[qubes-users] Qubes Canary #22

2020-01-15 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Qubes Community,

We have published Qubes Canary #22. The text of this canary is
reproduced below. This canary and its accompanying signatures will
always be available in the Qubes Security Pack (qubes-secpack).

View Qubes Canary #22 in the qubes-secpack:

https://github.com/QubesOS/qubes-secpack/blob/master/canaries/canary-022-2020.txt

Learn about the qubes-secpack, including how to obtain, verify, and read
it:

https://www.qubes-os.org/security/pack/

View all past canaries:

https://www.qubes-os.org/security/canaries/

```


---===[ Qubes Canary #22 ]===---


Statements
- ---

The Qubes core developers who have digitally signed this file [1]
state the following:

1. The date of issue of this canary is January 13, 2020.

2. There have been 56 Qubes Security Bulletins published so far.

3. The Qubes Master Signing Key fingerprint is:

427F 11FD 0FAA 4B08 0123  F01C DDFA 1A3E 3687 9494

4. No warrants have ever been served to us with regard to the Qubes OS
Project (e.g. to hand out the private signing keys or to introduce
backdoors).

5. We plan to publish the next of these canary statements in the first
two weeks of April 2020. Special note should be taken if no new canary
is published by that time or if the list of statements changes without
plausible explanation.

Special announcements
- --

None.

Disclaimers and notes
- --

We would like to remind you that Qubes OS has been designed under the
assumption that all relevant infrastructure is permanently
compromised.  This means that we assume NO trust in any of the servers
or services which host or provide any Qubes-related data, in
particular, software updates, source code repositories, and Qubes ISO
downloads.

This canary scheme is not infallible. Although signing the declaration
makes it very difficult for a third party to produce arbitrary
declarations, it does not prevent them from using force or other
means, like blackmail or compromising the signers' laptops, to coerce
us to produce false declarations.

The news feeds quoted below (Proof of freshness) serves to demonstrate
that this canary could not have been created prior to the date stated.
It shows that a series of canaries was not created in advance.

This declaration is merely a best effort and is provided without any
guarantee or warranty. It is not legally binding in any way to
anybody. None of the signers should be ever held legally responsible
for any of the statements made here.

Proof of freshness
- ---

Mon, 13 Jan 2020 11:12:28 +

Source: DER SPIEGEL - International 
(https://www.spiegel.de/international/index.rss)
The U.S. Versus Iran: A Dangerous New Era in the Middle East
Germany Plans to Repatriate Ebola Patients
Can Nuclear Power Offer a Way Out of the Climate Crisis?
Killing of Iran General Soleimani Akin to War Declaration
Dissendent Describes 'Cultural Genocide' Against Uighurs

Source: NYT > World News 
(https://rss.nytimes.com/services/xml/rss/nyt/World.xml)
Seven Days in January: How Trump Pushed U.S. and Iran to the Brink of War
Desperate Residents Ignore Dangers of Philippine Volcano and Return Home
A New Home for French Socialists, on Paris’s Periphery
A Growing U.S. Base Made This Afghan Town. Now It’s Dying.
Iran Cracks Down as Protests Over Downing of Airliner Grow

Source: BBC News - World (https://feeds.bbci.co.uk/news/world/rss.xml)
Taal volcano: Lava spews as 'hazardous eruption' feared
Iran plane downing: Canadian PM promises 'justice' at memorial
Hevrin Khalaf: Death of a peacemaker
Retired Pope Benedict warns Francis against relaxing priestly celibacy rules
Egypt-Ethiopia row: The trouble over a giant Nile dam

Source: Reuters: World News (http://feeds.reuters.com/reuters/worldnews)
'Oust Uncle': Thailand's jog for dissent signals new breed of activists
Britain's royal showdown: queen hosts Meghan-Harry crisis talks
Iran protesters take to the streets in third day of demos over plane
Australian prime minister's approval rating goes up in flames
Thai elephants march in silence for Australian bushfires

Source: Blockchain.info
000444803ca23cffb65ea59fb0afef4065b2ea897a03e120


Footnotes
- --

[1] This file should be signed in two ways: (1) via detached PGP
signatures by each of the signers, distributed together with this
canary in the qubes-secpack.git repo, and (2) via digital signatures
on the corresponding qubes-secpack.git repo tags. [2]

[2] Don't just trust the contents of this file blindly! Verify the
digital signatures!
```

This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2020/01/15/canary-22/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl4e9QYACgkQ203TvDlQ
MDAG7hAAgbHQ9xMSJUiv/lrc0G4o+5guA1AYHP9vpOVDSIZna9l0YS26Ahv1rjgn
go8DdIjkgB