>> Several packages were recently pushed to testing repos (see
>> qubes-buider-github comments on the issue). Have you had a chance to try
>> those?
>
> Cool, I will grab the latest qubes-gui-vm from current-testing and see if
> that helps.
Sorry, that was phrased wrong, and I hate to add any conf
johnyju...@sigaint.org:
>> This problem persists in 3.2rc2.
>>
>> (And I get 0 errors on the same USB drive under Tails. When I can find
>> the SATA power connector around here somewhere, I'll try moving the drive
>> direct onto the SATA bus.)
>
> I think the problem *may* be that systemd has a d
On 2016-08-17 16:08, Chris Laprise wrote:
On 08/17/2016 11:35 AM, johnyju...@sigaint.org wrote:
On the Signal matter, just some personal paranoia Re: Signal and
Google
Play Services:
I've been the subject of some rather intense and ongoing hacking
(iPhone,
iPad, Android phone/tablet, PC, MacB
> On 2016-08-19 05:11, johnyju...@sigaint.org wrote:
>> When I try to run qvm-run from within an AppVM, I get "Request refused."
>>
>> Is this by design, for security reasons? If so, I guess that's
>> perfectly
>> reasonable. I just don't see that fact documented anywhere.
>>
>
> Yes, but it's co
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-19 11:58, kev27 wrote:
>> Secure Encrypted Virtualization (SEV) integrates main memory encryption
>> capabilities with the existing AMD-V virtualization architecture to
>> support encrypted virtual machines. Encrypting virtual machines c
On Fri, Aug 19, 2016 at 3:15 PM, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-08-19 09:00, Joe Thielen wrote:
> > I have a minor GUI usability issue.
> >
> > I'm using a smaller monitor, and my CentOS 7 HVMs seem to always want to
> > take up the entire
47c%40webprd-m102.mail.aol.com.
For more options, visit https://groups.google.com/d/optout.
Qubes-HCL-Hewlett_Packard-HP_ENVY_14_Notebook_PC-20160819-114832.yml
Description: Binary data
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-19 09:35, 'digitaldijjn' via qubes-users wrote:
> On Friday, August 19, 2016 at 12:07:23 PM UTC-4, York Keyser wrote:
>> Hi List,
>>
>> I think I have a problem with the sound on my Qubes-OS 3.2rc2. Sound
>> works fine with the speaker,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-19 09:00, Joe Thielen wrote:
> I have a minor GUI usability issue.
>
> I'm using a smaller monitor, and my CentOS 7 HVMs seem to always want to
> take up the entire height of the screen. The problem is the HVM window
> title bar will s
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-19 06:18, johnyju...@sigaint.org wrote:
>>> This problem persists in 3.2rc2.
>>>
>>> (And I get 0 errors on the same USB drive under Tails. When I can
>>> find the SATA power connector around here somewhere, I'll try moving
>>> the drive
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-19 04:32, johnyju...@sigaint.org wrote:
> If I shut down each Appvm manually before finally doing the reboot, the
> work left to do on shutdown lets the unmount occur with in 90 seconds, so
> the drive shuts down cleanly.
>
Hm, I wonde
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
[Moving to qubes-users.]
On 2016-08-19 05:53, kernel[consulting] Sebastian Hültenschmidt wrote:
> Hi all, I just recently downloaded the 3.2RC2 and verified the signature
> ok. When i tried to use it, it fails the checksum test after ~4.8% It
> rech
> Secure Encrypted Virtualization (SEV) integrates main memory encryption
> capabilities with the existing AMD-V virtualization architecture to support
> encrypted virtual machines. Encrypting virtual machines can help protect them
> not only from physical threats but also from other virtual mac
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-19 05:11, johnyju...@sigaint.org wrote:
> When I try to run qvm-run from within an AppVM, I get "Request refused."
>
> Is this by design, for security reasons? If so, I guess that's perfectly
> reasonable. I just don't see that fact do
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-18 15:20, admix...@gmail.com wrote:
> Hi, What do you think about using memory balancing between several VMs. Is
> it security risk? If someone exploited two VM (for example with tor and
> without), he can fill all accessible memory on on
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-18 10:19, Foppe de Haan wrote:
> I've been slowly figuring out how qubes works, and configuring it the way
> I want, while getting used to linux at the same time (which means I'm not
> very good at things other than diagnosing and prodding
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-18 05:22, johnyju...@sigaint.org wrote:
> The Qubes security team has written:
>
>> Consequently, we have decided to move to hardware memory virtualization
>> for the upcoming Qubes 4.0 release [4].
>
> And Joanna has written:
>
>> For
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-18 04:44, johnyju...@sigaint.org wrote:
> This problem persists in 3.2rc2.
>
> JJ
>
Several packages were recently pushed to testing repos (see
qubes-buider-github comments on the issue). Have you had a chance to try those?
P.S. - Plea
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-17 15:06, Desobediente wrote:
> The bumblebee docs tell you to use yum/dnf without gpg.
>
> I haven't found their keys also. Normally it sits on a
> keyserver.example.com or keys.example.com
>
> Giving the circumstances, I'd guess there
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-16 12:39, salmander wrote:
> In many distributions it's possible to select a mirror server.
>
> How can i do it in fedora template vm?
>
> I notice slow network updates. Maybe because of location.
>
I'm not sure, but my guess is that i
Hi everyone (Sorry if this is a double post, my post from a few hours ago
didn't seem to go through)
Would-be new user of Qubes here, but a longtime Linux user. I'm trying to
install Qubes-R3.1-x86_64 on a Lenovo Thinkpad T420. I encountered the
"hangs on penguins" problem described here:
https:/
Hi everyone,
Would-be new user of Qubes here, but a longtime Linux user. I'm trying to
install Qubes-R3.1-x86_64 on a Lenovo Thinkpad T420. I encountered the
"hangs on penguins" problem described here:
https://www.qubes-os.org/doc/uefi-troubleshooting/
I followed the steps there and they all wor
> Is F-Droid's Silence any better than Signal given it can run without
> Google Play Store?
I use CyanogenMod Android minus most of the Google malware (ie. no
Google play). In that configuration Signal refuses to work because it
(at least) depends on Google Play for notifications. Silence however
also forgot to mention, even after I unplugged the headphones I'm having the
same issue
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@
On Friday, August 19, 2016 at 12:07:23 PM UTC-4, York Keyser wrote:
> Hi List,
>
> I think I have a problem with the sound on my Qubes-OS 3.2rc2. Sound
> works fine with the speaker, but as soon I plug in headphones I can't
> hear anything. I can see the that the sound is playing in the Volumen
I have a minor GUI usability issue.
I'm using a smaller monitor, and my CentOS 7 HVMs seem to always want to
take up the entire height of the screen. The problem is the HVM window
title bar will show at the top cutting off a little at the bottom of the
window. When using text-mode/CLI, this mean
Hi List,
I think I have a problem with the sound on my Qubes-OS 3.2rc2. Sound
works fine with the speaker, but as soon I plug in headphones I can't
hear anything. I can see the that the sound is playing in the Volumen
Control but I can't hear anything. Also, it the Volumen Control shows
that
Hi, i did install a fresh copy of 3.2RC2 on a HP DL360 G6. when sys-net start,
i can see icon on the top (dom0) saying Connection established, but there is no
network access.
my dhcp server provide ip address to Qubes, i can see it with ifconfig on
sys-net, but i can't ping other device on the
>> This problem persists in 3.2rc2.
>>
>> (And I get 0 errors on the same USB drive under Tails. When I can find
>> the SATA power connector around here somewhere, I'll try moving the
>> drive
>> direct onto the SATA bus.)
>
> I think the problem *may* be that systemd has a default 90 second timeo
>
> You don't need to rebuild anything, just add boot_delay=10 to kernel
> command line. In grub you can press "e" to edit the entry, add the
> option to the line with "vmlinuz", then press ctrl+x to boot it.
>
It looks as though this thread went nowhere. I'm having the same problem as the
orig
Is there any qvm-* command, or other method, to programmatically copy to
the qubes clipboard?
(Similar to my last question, a perfectly reasonable answer might be "of
course not, are you crazy?" due to security concerns. Requiring explicit
dom0/GUI user interaction for clipboard manipulation seem
When I try to run qvm-run from within an AppVM, I get "Request refused."
Is this by design, for security reasons? If so, I guess that's perfectly
reasonable. I just don't see that fact documented anywhere.
(The demonstration of one of the Xen exploits executes a qvm-run of xcalc
in dom0 from an
> This problem persists in 3.2rc2.
>
> (And I get 0 errors on the same USB drive under Tails. When I can find
> the SATA power connector around here somewhere, I'll try moving the drive
> direct onto the SATA bus.)
I think the problem *may* be that systemd has a default 90 second timeout
on jobs,
However, under Qubes, I experience random screen corruption.
See: https://i.imgur.com/ovEFgYO.png
> This problem persists in 3.2rc2.
>
> JJ
Actually, just FYI, the behavior seems to be a lot better under 3.2rc2.
I've only seen it a couple of times, versus seeing it consistently un
34 matches
Mail list logo