Re: [qubes-users] Re: Qubes Update does not work for Whonix 16 templates ...

2021-11-20 Thread Insurgo Technologies Libres / Open Technologies



On November 20, 2021 8:46:58 PM UTC, 'awokd' via qubes-users 
 wrote:
>Viktor Ransmayr:
>>  System clock synchronized: no
>>NTP service: inactive
>
>Any idea why this isn't running? If your hardware clock is close enough to the 
>right time, it might not matter, but can't be helping things. It's showing as 
>synchronized & active on my sys-net. I'm running 4.1, but pretty sure it 
>showed the same on 4.0.
>

Dom0 (timedatctl) doesn't know dom0 has time synchronization, since its 
provided per sys-net by default which is provided as a qubesos service.

You can force time sync once sys-net is network connected by doing the 
following from dom0 Terminal Emulator:
sudo qvm-sync-clock 

Now, sys-net and dom0 are time synced.
Time to restart all qubes:
qvm-shutdown --all --wait

Then all new qubes launched will have dom0 new synced time.

Hope that helps.

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7355104B-B880-4952-82B3-7EE3CA20B0AD%40gmail.com.


Re: [qubes-users] Qubes 4.1 - ready to go on Nitropad X230 without much tweaks?

2021-10-13 Thread Insurgo Technologies Libres / Open Technologies



On October 13, 2021 3:16:13 PM UTC, 'taran1s' via qubes-users 
 wrote:
>
>
>unman:
>> On Wed, Oct 13, 2021 at 10:24:46AM +, 'taran1s' via qubes-users wrote:
>>> I am thinking about upgrading my Nitropad X230 Qubes to 4.1, but I am
>>> curious if the version 4.1 has some serious issues that would make the
>>> experience worse than the current 4.0 or would need many tweaks to make the
>>> beast run well.
>>> 
>>> I know that the 4.1 is an rc1 with all its pros and cons, which can be but
>>> different on each hardware. My question is if the Nitropad X230 has some
>>> functionality issues running the 4.1-rc1 now.
>>> 
>>> For sys-net and sys-firewall I use the fedora-33-minimal, I use
>>> qubes-gpg-split and a kind of split monero with qrexec, as described here: 
>>> http://monerotoruzizulg5ttgat2emf4d6fbmiea25detrmmy7erypseyteyd.onion/resources/user-guides/cli_wallet_daemon_isolation_qubes_whonix.html,
>>> sys-usb is based on debian-10. The rest is a normal usage with not so many
>>> changes in the dom0 or templates from the default state.
>>> 
>>> Would you recommend to go on with the upgrade/reinstall of my 4.0 Qubes to
>>> 4.1 on Nitropad X230 now?
>>> 
>>> Thank you.
>>> 
>>> -- 
>>> Kind regards
>>> taran1s
>> 
>> 4.1rc1 works fine on a corebooted x230 (that's what the nitropad is).
>> No functionality issues for me, and I cant see any issues with your set
>> up.
>> You'll have to reseal HEADS of course, but I assume you know that.
>> 
>
>This is very good news, thank you. I will most probably clean-reinstall the 
>beast to get advantage of the LUKS2. But not sure if it is worthy to do or the 
>upgrade is enough to get advantage of the new 4.1.
>
>Is the LUKS1 vs LUKS2 the only difference in between the clean-reinstall and 
>upgrade, or are there other factors to take into consideration when deciding 
>between the clean reinstall vs upgrade to 4.1?
>

Heads will need to be reflashed with a ROM supporting cryptsetup2 to reinstall. 
Heada will also need to be based on coreboot 4.13+ as per pending Heads pull 
request 1015.

Consider this as a beta testing ROM.

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/F82CA9C0-5708-4A0F-8AB1-03B295CB78A6%40gmail.com.


Re: [qubes-users] Qubes better dove tailed for Journalists, and Human Rights Workers.

2020-05-08 Thread Insurgo Technologies Libres / Open Technologies
There is a ticket opened on qubes for personas.  Time to poke and make Freedom 
Of Press foundation into this. And tailor salt recipes to be deployed for those 
personas.

My 2 cents

On May 9, 2020 2:55:57 AM UTC, Logan  wrote:
>Hi Catacombs,
>
>This is an important topic. It actually is my intention to come up with 
>a list of tweaks that a less tech-savvy journalist could benefit from.
>
>I am not versed in customizing or automating Linux installs via scripts, 
>but a motivated designer could engineer such a tool for a more visually 
>appealing turn-key installation that is closer to "just works" than the 
>"hack it to perfection" experience most of us have had with Qubes.
>
>The matter exists that Qubes is a completely different way of computing, 
>though. A structured training program may be beneficial to these groups.
>
>If an organization or group were created to promote the use of Qubes and 
>provide custom tools and training to journalists this could be quite a 
>benefit to the community as a whole.
>
>What would it take to get a working group together for this? I'm 
>definitely interested in working on something like it.
>
>Logan
>
>On 5/9/20 12:47 AM, Sven Semmler wrote:
>> On Fri, May 08, 2020 at 04:12:57PM -0700, Catacombs wrote:
>>> It is not my intention to provide a list of things to put in the basic OS
>>> for an Investigator who is not what I would term, a techno geek, nor who
>>> does not want to be.  It is to find out what has been discussed in the past
>>> about this subject, and for some of you, who are more experienced with
>>> QUBE's, and investigators, to put that list together, and perhaps build
>>> that list into the basic Install of QUBE's.
>> Hi Catacombs,
>>
>> your points are valid. One thing I am aware of is the the Freedom of the
>> Press Foundation is using Qubes and that there is at least one UX
>> designer thinking about usability and contributing actively to Qubes.
>> You will see these improvement over time.
>>
>> Another thing all of us "techno geeks" can do in the meantime is to
>> monitor this mailing list and maybe even the IRC channel and help as
>> many users as possible.
>>
>> I think the standard Fedora template has a pretty solid list of default
>> apps installed. But for sure there could be more tutorial style videos,
>> better documentation, maybe even tailored templates. I don't know what a
>> Journalist needs - do you?
>>
>> To some degree I think the core Qubes team wants to stay out of the
>> 'what should be included in the default template' discussion as there
>> are as many opinions as discussion participants. There is even an FAQ
>> entry about it: 
>> https://www.qubes-os.org/faq/#could-you-please-make-my-preference-the-default
>>
>> I understand this is not exactly what you asked for and a GUI text
>> editor and a video player are pretty standard things. I am surprised
>> they weren't there.
>>
>> /Sven
>>
>> --
>>   public key: https://www.svensemmler.org/0x8F541FB6.asc
>> fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6
>
>
>-- 
>You received this message because you are subscribed to the Google Groups 
>"qubes-users" group.
>To unsubscribe from this group and stop receiving emails from it, send an 
>email to qubes-users+unsubscr...@googlegroups.com.
>To view this discussion on the web visit 
>https://groups.google.com/d/msgid/qubes-users/66b09d50-223f-9c73-dac5-e9a12032c6b2%40threatmodel.io.

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/58EF99F2-B73B-4B9E-AC1D-5713C842249B%40gmail.com.


Re: [qubes-users] Qubes Certified Desktop

2020-05-01 Thread Insurgo Technologies Libres / Open Technologies



On May 1, 2020 8:40:57 AM UTC, Anil  wrote:
>> Nope I can't.  You would have to search around for parts following
>this doc, do some soldering to adapt spi chip, buy it, reprogram it
>with firmware built from source, buy compatible RAM and fastest CPU,
>case, power supply and ssd. Information is scattered around. When I
>said adventurous, I meant adventurous.
>
>OK. That means I will have to first spend some time learning more
>about this. I can do the soldering, if I know exactly (or find out)
>what has to be soldered to what.
>
>>
>> Port and upstreamed doc
>> https://www.raptorengineering.com/coreboot/kgpe-d16-status.php
>>
>> https://libreboot.org/docs/hardware/kgpe-d16.html
>>
>> Build instructions are valid:
>> http://osresearch.net/Building
>>
>> Status report on heads. No TPM support as of now. But rom can be
>remotely attested by libremkey if really really adventurous without a
>TPM. Less secure since no internal root of trust. TPM is desired.
>> https://github.com/osresearch/heads/issues/134
>
>This will certainly help. Thanks.
>
>>
>> It needs adventurous developers or funding to get mainstreamed. Since
>the board got dropped by coreboot, I lost a bit of interest pushing for
>that last blob free platform in this lonely path. There is developers
>ready to do the needed work to bring it back. But funders refused the
>grant application. Skilled developers are willing to do required work
>to bring it back but I hesitate to completely self fund the whole
>project right now since priorities changed, but would be willing for
>joint partnership.
>>
>> Anyone interested in bringing back that beast to life contact me at
>insurgo at riseup dot net. This is last RYF x86 platform ever for sure.
>
>I strongly hope some people do that. People working on
>laptops/desktops and phones, but not seemingly on servers. It may not
>be for a data centre, but at least some personal website.
>
>> >Or even just as a desktop, will the setup be nearly as secure as
>> >PrivacyBeast?
>>
>> TPM support lacking under coreboot 4.8.1, present under 4.11. Would
>love to see that beast fully supported and would even sell it myself
>under insurgo umbrella. But I wont do it all alone this time. Partners
>welcome.
>
>If I am able to get the hardware and set it up, I can do some routine
>part of the work that is not too technical in the sense of knowing the
>internal details of TPM or OS kernel etc., with some help, if that can
>reduce the effort required.
>
>> Have funds?
>
>Not really. At most I can buy one.
What is weird is that needed work would be the cost of buying 4 already made 
servers if not less. Could reach out to technoethical and Vikings one last 
time, which profited of work that was paid by Leah Rowe originally to sell 
their d16 branded stuff. 

Maybe they would be willing to give back to the community? If you do not have 
funds but some time to spend,  showing your interest to them of this kind of 
partnership would mean the world me, pointing here, and have a total different 
impact then if I was the one contacting them. Potential customers have a lot 
more impact then they think they have. Show that you want something and rust 
thing will exist. Wait for it to happen or do it on your own and it might go 
instinct just like it did and never get revived.

 The actual reason why that board was dropped by coreboot was because not 
enough people showed they cared.for it to be maintained. Maintainership is a 
hard problem.

I'll take this public space since I don't do it enough. Watch my presentation, 
but most importantly, read the slides 45+ attached to the talk: 
https://fosdem.org/2020/schedule/speaker/thierry_laurion/



The more time between a board being dropped upstream under coreboot and the 
time it is put back under compliance the more expensive it will be. Now.would 
be a good time for collaboration. 

If this community showed interest in having a RYF certified server/desktop 
under Heads, it would happen in a snap.

Chicken and egg problems everywhere.
But if everybody showed their interest for it, it.would happen.  See?
>
>Regards,
>
>अनिल एकलव्य
>(Anil Eklavya)

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/D504D4DD-7E04-446A-83D3-CF704A5C551F%40gmail.com.


Re: [qubes-users] Qubes Certified Desktop

2020-05-01 Thread Insurgo Technologies Libres / Open Technologies



On May 1, 2020 7:07:24 AM UTC, Anil  wrote:
>> Kgpe-d16 is supported under heads, is blobless and supported by
>coreboot 4.11 and heads under coreboot 4.8.1 as of right now with plans
>of
>
>Can you give an approximate price (right now no one is shipping, so
>they are not showing the price either)? Any particular processor that
>is more suitable? The Asus page says it works with Opteron 6000 series
>processors. Also the price of the processor.
Nope I can't.  You would have to search around for parts following this doc, do 
some soldering to adapt spi chip, buy it, reprogram it with firmware built from 
source, buy compatible RAM and fastest CPU, case, power supply and ssd. 
Information is scattered around. When I said adventurous, I meant adventurous.

Port and upstreamed doc
https://www.raptorengineering.com/coreboot/kgpe-d16-status.php

https://libreboot.org/docs/hardware/kgpe-d16.html

Build instructions are valid:
http://osresearch.net/Building

Status report on heads. No TPM support as of now. But rom can be remotely 
attested by libremkey if really really adventurous without a TPM. Less secure 
since no internal root of trust. TPM is desired.
https://github.com/osresearch/heads/issues/134

It needs adventurous developers or funding to get mainstreamed. Since the board 
got dropped by coreboot, I lost a bit of interest pushing for that last blob 
free platform in this lonely path. There is developers ready to do the needed 
work to bring it back. But funders refused the grant application. Skilled 
developers are willing to do required work to bring it back but I hesitate to 
completely self fund the whole project right now since priorities changed, but 
would be willing for joint partnership.

Anyone interested in bringing back that beast to life contact me at insurgo at 
riseup dot net. This is last RYF x86 platform ever for sure. 

You can try to get to those people selling it through d16 tag here, already 
assembled https://www.fsf.org/resources/hw/systems

It.would require of you to buy a CH341a reprogrammer and clip to flash built 
head, and flash built BMC internally from heads as documented on github per 
status report.

But that wont come with TPM support nor heads added security, but it will all 
be open source.


>
>> Using it as a server personally. With a qubesos supported video card
>and jumper set to deactivate onboard integrated graphic (which offers
>really poor graphics) that could be an awesome project, but
>adventurous.
>
>Someone wrote that Qubes OS is meant to be used as a laptop/desktop
>OS. How much effort is required to set it up as a server? As I
>understand, the compartmentalization provided by Qubes OS can be
>useful in some contexts.
Absolutely. With openbmc and command line as if you were behind Dom0 remotely,  
this is a beast.

https://raptorengineering.com/coreboot/kgpe-d16-bmc-port-status.php

With qubes-network-server, you can offer DMZ servers from appvms.

https://github.com/Rudd-O/qubes-network-server




>
>Or even just as a desktop, will the setup be nearly as secure as
>PrivacyBeast?

TPM support lacking under coreboot 4.8.1, present under 4.11. Would love to see 
that beast fully supported and would even sell it myself under insurgo 
umbrella. But I wont do it all alone this time. Partners welcome.

As you can see, this is not easy task. But if there is will there is hope. 

Have funds?
Insurgo
>
>Regards,
>
>अनिल एकलव्य
>(Anil Eklavya)

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4F9099C7-4A70-4BA3-ADF6-8AAF5497C373%40gmail.com.


Re: [qubes-users] Re: Fedora 30 approaching EOL, Fedora 31 TemplateVM available, Fedora 32 TemplateVM in testing

2020-04-30 Thread Insurgo Technologies Libres / Open Technologies
You can update the templatevm while dependant vm is running. Appvms are using a 
read only version of last updated templatevm, which is why you see recycling 
arrows on appvms in qubesos vms tray icon after applying template upgrades.

As long as your sys-usb stays alive you will keep alive your keyboard and 
mouse. Follow instructions for upgrade, launch another appvm depending on 
template for safeguard testing, and reboot yiur machine and you should be good 
to go!

On May 1, 2020 4:39:53 AM UTC, seshu  wrote:
>One question that just occured to me about upgrading the template VM's.
>
>Many of the comments and posts in this forum are assuming Qubes is 
>installed on a laptop. I have it installed on a desktop, and my
>keyboard / 
>mouse uses sys-usb. I need to have this appVM running to use the
>peripheral 
>obviously. But, since the appVM is running, I can't update the
>templateVM?
>
>Is their any workaround, or do I need to go get a ps/2 keyboard and
>then 
>turn off sys-usb, update the template and then restart it? Is that the
>only 
>option I have? IT seems like there could be a better way?
>
>Thanks!
>
>On Thursday, April 30, 2020 at 2:01:16 PM UTC, Andrew David Wong wrote:
>>
>> Dear Qubes Community, 
>>
>> This announcement includes several updates regarding Fedora
>TemplateVMs. 
>>
>> Fedora 30 approaching EOL 
>> = 
>>
>> With the release of Fedora 32 on April 28, Fedora 30 is expected to 
>> reach EOL (end-of-life) [1] on May 26, 2020. 
>>
>>
>> Fedora 31 TemplateVM available 
>> == 
>>
>> A new Fedora 31 TemplateVM is now available for both Qubes 4.0 and
>4.1. 
>> Instructions are available for upgrading Fedora TemplateVMs. [2]  We 
>> also provide a fresh Fedora 31 TemplateVM package through the
>official 
>> Qubes repositories, which you can get with the following commands (in
>
>> dom0). 
>>
>> Standard [3] Fedora 31 TemplateVM: 
>>
>> $ sudo qubes-dom0-update qubes-template-fedora-31 
>>
>> Minimal [4] Fedora 31 TemplateVM: 
>>
>> $ sudo qubes-dom0-update qubes-template-fedora-31-minimal 
>>
>> After upgrading to a Fedora 31 TemplateVM, please remember to switch
>all 
>> qubes that were using the old template to use the new one. [5] 
>>
>>
>> Fedora 32 TemplateVM in testing 
>> === 
>>
>> For advanced users, a new Fedora 32 TemplateVM is currently available
>in 
>> the `qubes-templates-itl-testing` repository for both Qubes 4.0 and
>4.1. 
>> We would greatly appreciate testing and feedback [6] from the
>community 
>> regarding this template. 
>>
>>
>> [1] https://fedoraproject.org/wiki/End_of_life 
>> [2] https://www.qubes-os.org/doc/template/fedora/upgrade/ 
>> [3] https://www.qubes-os.org/doc/templates/fedora/ 
>> [4] https://www.qubes-os.org/doc/templates/minimal/ 
>> [5] https://www.qubes-os.org/doc/templates/#switching 
>> [6] https://www.qubes-os.org/doc/testing/#providing-feedback 
>>
>> This announcement is also available on the Qubes website: 
>>
>https://www.qubes-os.org/news/2020/04/30/fedora-31-template-available/ 
>>
>> -- 
>> Andrew David Wong (Axon) 
>> Community Manager, Qubes OS 
>> https://www.qubes-os.org 
>>
>>
>
>-- 
>You received this message because you are subscribed to the Google
>Groups "qubes-users" group.
>To unsubscribe from this group and stop receiving emails from it, send
>an email to qubes-users+unsubscr...@googlegroups.com.
>To view this discussion on the web visit
>https://groups.google.com/d/msgid/qubes-users/69349c46-081f-4349-9534-586fd23f6491%40googlegroups.com.

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7A8DB54C-7B85-46E4-AD2F-722C6824C3A4%40gmail.com.


Re: [qubes-users] fastboot in qubes

2020-04-30 Thread Insurgo Technologies Libres / Open Technologies
>From sys-usb with required tools installed in associated templatevm.

On April 30, 2020 3:27:33 PM UTC, taran1s  wrote:
>Does anyone have an experience with flashing the android phone with new
>OS, like GrapheneOS on Pixel 3 XL for example with QubesOS? If you do,
>how did you do that?
>
>-- 
>Kind regards
>taran1s
>
>gpg: 12DDA1FE5FB39C110F3D1FD5A664B90BD3BE59B3
>
>-- 
>You received this message because you are subscribed to the Google
>Groups "qubes-users" group.
>To unsubscribe from this group and stop receiving emails from it, send
>an email to qubes-users+unsubscr...@googlegroups.com.
>To view this discussion on the web visit
>https://groups.google.com/d/msgid/qubes-users/55f88632-9a80-1999-065f-c6b7e6c063d3%40mailbox.org.

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3ABE9EAA-2E52-4DA0-9F12-8D5230702613%40gmail.com.


Re: [qubes-users] Qubes Certified Desktop

2020-04-30 Thread Insurgo Technologies Libres / Open Technologies
Kgpe-d16 is supported under heads, is blobless and supported by coreboot 4.11 
and heads under coreboot 4.8.1 as of right now with plans of upgrading to 
latest version supporting it before support got dropped since not enough 
attention nor love was given to it to justify upstream maintainership.

This is an adventurous path though, since noone took the venture of making that 
refurb hardware ready for consumers as of right now.

Using it as a server personally. With a qubesos supported video card and jumper 
set to deactivate onboard integrated graphic (which offers really poor 
graphics) that could be an awesome project, but adventurous.

Insurgo

On May 1, 2020 5:49:45 AM UTC, Anil  wrote:
>I know there is at least one Qubes Certified Laptop.
>
>Is there an analogous setup for Desktop? Or at least some desktop
>hardware
>that can be setup in the same way as ThinkPad x230, with ME neutered
>etc.
>and which is considered as suitable as x230? It could be an assembled
>system perhaps? Or better, some older version of NUC or other mini PC?
>
>I know Purism is selling a mini PC, but other than that.
>
>Regards,
>
>Anil Eklavya
>-- 
>अनिल एकलव्य
>(Anil Eklavya)
>
>-- 
>You received this message because you are subscribed to the Google
>Groups "qubes-users" group.
>To unsubscribe from this group and stop receiving emails from it, send
>an email to qubes-users+unsubscr...@googlegroups.com.
>To view this discussion on the web visit
>https://groups.google.com/d/msgid/qubes-users/CAAPfsu9BizQzXh53yf0%2BjJDF9HM_sA0cLJ6YH_M9T-qABokbaQ%40mail.gmail.com.

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ACB437AD-7D46-468E-8F65-71F2C0C5F650%40gmail.com.


Re: [qubes-users] Creating snapshot

2020-02-18 Thread Thierry Laurion - Insurgo Technologies Libres / Open Technologies
I'm talking on top of my head but snapshots are supposed to be taken 
automatically, with 2 reverts possible, by default.

qvm-volume
qvm-volume revert windows:root
qvm-volume revert windows:private

On February 18, 2020 9:26:30 PM UTC, brendan.h...@gmail.com wrote:
>Assuming a standard qubes 4.0.x install, just clone the VM each time
>you are making risky changes...before each change of course.*
>
>The use of lvm thin pool makes clones essentially use zero storage
>other that the bits where they diverge from the original VM, where copy
>on write preserves the differences.
>
>Brendan
>
>* ok, technically...make the clone anytime *before* shutting down the
>vm after the risky change...but purposely cutting it that close has
>risks.
>
>-- 
>You received this message because you are subscribed to the Google
>Groups "qubes-users" group.
>To unsubscribe from this group and stop receiving emails from it, send
>an email to qubes-users+unsubscr...@googlegroups.com.
>To view this discussion on the web visit
>https://groups.google.com/d/msgid/qubes-users/8f1c91d3-c6ae-4822-9e0c-5daa55d5c29d%40googlegroups.com.

-- Sent from /e/ Mail

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9344D6D8-0EAE-4B22-B105-3FDFAB57C836%40gmail.com.


Re: [qubes-users] How to setup Win10 HVM ?

2020-02-15 Thread Thierry Laurion - Insurgo Technologies Libres / Open Technologies



On February 15, 2020 2:18:33 PM UTC, A E  wrote:
>fre. 14. feb. 2020 kl. 12.56 skrev unman :
>
>> On Fri, Feb 14, 2020 at 08:19:13AM +0100, A E wrote:
>> > Okay, I read your message again.
>> >
>> > It shall just turn up in the file list of dom0.
>> >
>> > I???ll look later.
>> >
>> >
>> > fre. 14. feb. 2020 kl. 08.14 skrev A E :
>> >
>> > > Okay, thanks.
>> > >
>> > > How can I see if the "install.sh" file has been created in dom0 ?
>> > >
>> > >
>>
>> The convention here is not to top-post.
>> Please scroll to the bottom of the message before you start typing.
>Or
>> reply inline.
>> It only takes you seconds, makes it much easier to follow threads,
>and
>> cumulatively saves your fellow users hours.
>> Thanks.
>> unman
>>
>> --
>> You received this message because you are subscribed to a topic in
>the
>> Google Groups "qubes-users" group.
>> To unsubscribe from this topic, visit
>>
>https://groups.google.com/d/topic/qubes-users/78DgmWxZf80/unsubscribe.
>> To unsubscribe from this group and all its topics, send an email to
>> qubes-users+unsubscr...@googlegroups.com.
>> To view this discussion on the web visit
>>
>https://groups.google.com/d/msgid/qubes-users/20200214115648.GA688%40thirdeyesecurity.org
>> .
>>
>
>
>Yes, install.sh was copied to dom0. I just thought the terminal would
>say
>so after it did this.
>
>The pc is downloading now.
>
>I wonder why Windows 7 has to be installed before Windows 10...
>especially
>as Microsoft has stopped supporting it and it takes about 2 hours to
>download it and I don’t have any product code for it. So maybe I can’t
>even
>use it.

Has someone tried to active with a windows 7 license?

>
>Besides that, I appreciate and thanks Elliot Killick for the easy to
>use
>installation script.

-- Sent from /e/ Mail

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7B09E9CA-3B10-4EB6-9B13-9FCAB1D992E4%40gmail.com.