On 22 February 2018 at 15:52, Jean-Philippe Ouellet wrote:
> > One possible solution would be to add a new type of Qubes RPC rule:
> present
> > the user with the most recently opened DispVM to use as a default (that
> they
> > can change before clicking OK). It might look
On Sun, Feb 4, 2018 at 5:16 AM, Andrew Clausen
wrote:
> On 3 February 2018 at 17:09, Raffaele Florio
>> 4) This option adds a lot of complexity and "DispVM" automatically become
>> a sort of "SessionVM". Furthermore this option increase,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi Andrew,
I'm implementing these features. I'll release the v2.1.1 soon.
The extension itself could be automatically updated. However I'll not enable
this feature because:
1. There isn't any way to verify updated extension in Chrome/Chromium.
Hi Raffaele,
On 5 February 2018 at 08:10, Raffaele Florio
wrote:
> > Yes, a lower number would be better. I used 20 for dramatic effect,
> because this is enough to crash a computer.
> Maybe 10 is enough. I think to add this value as parameter in the settings.
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi Andrew,
> It introduces an extra point of failure. I could owned by a corrupted "git
> clone" operation. I could also get cloned by a corrupted wget operation.
> It's one extra thing to audit (if I want to be careful).
Yeah, as I wrote the
Hi Raffaele,
On 4 February 2018 at 17:25, Raffaele Florio
wrote:
> > The "make firefox" rule uses wget to get a few files. Is this because
> you don't want to distribute signatures on Github? Ideally, it would use
> local files only.
> I was referring to the
Hi Raffaele,
On 3 February 2018 at 17:09, Raffaele Florio
wrote:
> 1) I partially agree. Can you explain better please?
>
The "make firefox" rule uses wget to get a few files. Is this because you
don't want to distribute signatures on Github? Ideally, it would
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi Andrew,
Thanks for the comments!
1) I partially agree. Can you explain better please?
2) I don't consider this case an issue. This extension is designed to block and
redirect non whitelisted URLs, that is opened through the browser (e.g. with
Hi Raffaele,
I just tried it. A few comments:
(1) I'm not thrilled about using wget to install things. (I don't trust
https very much.) What's wrong with using the locally distributed copies
of files from git?
(2) It wreaks havoc! When I restarted Firefox, and did "restore old tabs",
it
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi all :),
I've just released the qubes-url-redirector extension. The GitHub repo is at
[0] and the issue on QubesOS's repo is at [2].
The extension is based on the gsoc idea [1]. Soon I'll work on the Thunderbird
one :).
Here a brief
10 matches
Mail list logo