So, what do you all think?
The goal should be that a lot more of the available attention and energy can flow towards
the actual content, rather than maintaining "the system".
RTD vs. Wiki
Wiki's are ubiquitous and very easy to edit. But that could end up being a
problem, as Konstantin
On 5/18/21 9:53 AM, unman wrote:
Should this be a generic GUI or one for each package?
Ideally there would be both.
1) "Configuration Wizard"
- main view shows a list of available actions (from installed packages)
- [add/remove actions] dialog that shows a list of available packages
and
On 5/16/21 7:13 AM, unman wrote:
Remove the effect of the state as best we can?
That sounds messy to impossible as you already point out with "as best
we can".
I don't think a (non-technical) user would anticipate this to happen or
be able to accurately predict the consequences.
/Sven
On 3/19/21 6:35 PM, Marek Marczykowski-Górecki wrote:
Ah, you probably have Debian-based updatevm, which doesn't support this
option. Then, use --clean.
I do & did. Thank you!
/Sven
--
public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E
On 3/19/21 4:44 PM, Demi M. Obenour wrote:
‘qubes-dom0-update --clean’ should work.
It did. Thank you!
/Sven
--
public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6
--
You received this message because you are subscribed to
On 3/19/21 2:03 PM, Marek Marczykowski-Górecki wrote:
Are you sure you don't have security-testing or current-testing
enabled? Those packages are currently only there.
I had it enabled once to see which packages would update, but did not
say yes ... so they might have been cached in the
This is on a install from the 4.0.3 ISO running for several months. I
always only do sudo qubes-dom0-update (no security or other testing).
Today I see this:
Package Arch Version
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi Andrew et al,
the PR is here: https://github.com/QubesOS/qubes-hcl/pull/32
I monitor the qubes-user list pretty much daily and will add new HCLs
as they appear.
Future-plans:
* automate cleanup
* validate format / fields (e.g. 'type')
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 11/25/20 6:05 AM, Andrew David Wong wrote:
> If you'd like to volunteer for this role, please let us know by
> replying to this thread or directly to me. Thank you!
Started working on it:
https://github.com/SvenSemmler/qubes-hcl/commits/master
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 7/28/20 2:39 PM, ludwig...@gmail.com wrote:
> So having a security internet nerd operating system, why you
> suggest a http based forum that loads tons of javascript shit to a
> browser in order to simulate a news group?!
Qubes OS is not (only)
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
I am sorry ... just realize this went to qubes-devel. It is obviously
off topic here. Mea culpa!
/Sven
- --
public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6
-BEGIN PGP
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 6/20/20 5:21 PM, catacombs wrote:
> Which makes me wonder how some view backups with Qubes.
Obviously backups are essential, especially if you are still learning
and like me sometimes do something that results in rather catastrophic
states.
On Thu, Mar 19, 2020 at 06:11:05PM -0400, Konstantin Ryabitsev wrote:
> That doesn't need to be any different from minisign. There are still
> fingerprints people can post in their slides and in email signatures. :)
> Or even the whole key, since it fits well within 80 columns.
Got it.
> with
On Wed, Mar 18, 2020 at 02:24:48PM -0400, Konstantin Ryabitsev wrote:
> I'm not at all saying we should abandon PGP -- I'm just suggesting that
> Qubes releases can offer .minisign signature *in addition* to PGP. I
> believe this has a benefit of making one-off verification a more
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
This thread might be better located in qubes-users.
On 2/13/19 9:49 AM, Teqleez Motley wrote:
> a) Where exactly does qubes save this password/backup settings
> (file+folder, please)
/etc/qubes/backup/qubes-manager-backup.conf
> b) It seems to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi Teqleez,
you wrote:
> a) the GUI / semi-automation / flow tools (or lack thereof),
Can you name some example tools / use cases? Why would that be Qubes
specific as opposed to be template specific (reusing tools from e.g.
Manjaro)?
> b) USB
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 11/20/18 1:30 PM, Doesnt Work wrote:
> I want to know weather enduring the steep learning curve of a new
> OS, or waiting for a more UX-focused version 4.1?
I asked myself the same question, but then just couldn't wait to use R4.
Now I am glad
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 9/14/18 7:14 PM, unman wrote:
> You dont say this, but if you use a minimal template for the
> document vm, then you minimise the risk of inadvertently opening a
> file there by mistake.
That's in fact what I am doing - thank you for pointing
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 9/14/18 2:16 PM, Matteo wrote:
> there is a docx in the "documents vm" but you open it in a special
> vm that allows you to edit it safely (kind of dispvm), all this
> with just double click.
You can already do this. All you have to do is set
On 05/02/2018 09:22 AM, Ivan Mitev wrote:
> I'm trying to implement "semi-persistent" dispVMs (in 4.0) that could
> be used for more than one time, until the service call ends (eg. the
> browser is closed by the user).
I understand what you are looking for and would like something like that
too.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 02/02/2018 03:34 PM, Sven Semmler wrote:
> I am struggling to see your perspective. Maybe I am an old fart,
> but Thunderbird and Firefox are very much essential to me. I am
> not looking for a big debate, which would be off topic he
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 09/20/2017 01:25 PM, yuraei...@gmail.com wrote:
> Qubes comes across as being a bit too modest, or too silent for
> that matter. Essentially at times leaning over towards the other
> opposite extreme.
I don't speak for anybody other than myself.
22 matches
Mail list logo