Hello,
I use Qubes 3.2 (recent, default installation) with anti-evil-maid on HP
ProBook 6470b.
Anti-evil-maid is installed to HD /boot per instructions, TPM is
protected by a password, and I use a "secret" image instead of text.
So far everything seemed to work.
However this morning I had a
in our test, it was still pretty easy to see at 5 and 7 oclock, probably
because were both really skinny. a couple more strips in front on the sides
fixes that.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and
W dniu środa, 30 listopada 2016 04:26:19 UTC+1 użytkownik stevemic...@gmail.com
napisał:
> On Tuesday, November 29, 2016 at 9:07:08 PM UTC-6, Jean-Philippe Ouellet
> wrote:
> > It may make more sense to use qvm-block than qvm-usb here. Should in
> > theory have a smaller attack surface and
just lined the sides of the lid of my laptop with velcro, and stapled the other
end to cloth to fold over the keyboard while the lid is lowered. this allows
for safer typing in public places. seems to work really well, but waiting on a
friend to come over for a real test. see pic (remember to
On Tuesday, November 29, 2016 at 9:07:08 PM UTC-6, Jean-Philippe Ouellet wrote:
> It may make more sense to use qvm-block than qvm-usb here. Should in
> theory have a smaller attack surface and expose better-tested code
> paths.
I must be missing something really basic that, as a noob, I don't
It may make more sense to use qvm-block than qvm-usb here. Should in
theory have a smaller attack surface and expose better-tested code
paths.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving
W dniu wtorek, 29 listopada 2016 19:28:02 UTC+1 użytkownik
stevemic...@gmail.com napisał:
> On Tuesday, November 29, 2016 at 11:41:59 AM UTC-6, Grzesiek Chodzicki wrote:
> > W dniu wtorek, 29 listopada 2016 17:17:03 UTC+1 użytkownik
> > stevemic...@gmail.com napisał:
> > > I'm a total newbie.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Nov 29, 2016 at 11:14:23AM -0500, 'Vincent Adultman' via qubes-users
wrote:
> It looks like template uploaded to 3.1 repository was built for Qubes
> 3.2, so this is why it's incompatible. I've just removed this faulty
> template, building
On Mon, Nov 28, 2016 at 06:09:36PM -0800, aesir.mag...@gmail.com wrote:
> > I have a new i3 Skylake NUC (NUC6i3SYK) and am trying to install
> > Qubes OS 3.1 on it. Unfortunately, it's not working.
>
> 3.2 is working great on my NUC6i3SYK. Have you tried it yet? I'm typing
> this message from it
On Tue, Nov 29, 2016 at 7:15 AM, Joshua van den Hoven
wrote:
> Hello guys,
>
> I am having a few isses with installing Qubes on my Dell Latitude e6330. I
> have checked and i do have the correct chipset and a TPM available but still
> get two errors the first is
On Tuesday, November 29, 2016 at 11:41:59 AM UTC-6, Grzesiek Chodzicki wrote:
> W dniu wtorek, 29 listopada 2016 17:17:03 UTC+1 użytkownik
> stevemic...@gmail.com napisał:
> > I'm a total newbie. I've been searching for a howto to boot the Win7 domain
> > from a USB stick so that Windows
Are Intel Clear Containers technology a viable alternative to VMs currently
used by Qubes? According to Intel, the Clear Containers are supposed to be
regular containers (similar to Docker) but with isolation enforced by VT-x
W dniu wtorek, 29 listopada 2016 17:17:03 UTC+1 użytkownik
stevemic...@gmail.com napisał:
> I'm a total newbie. I've been searching for a howto to boot the Win7 domain
> from a USB stick so that Windows installs from the USB stick. I went thru the
> process to attach the PCI channel using
> >> Qubes 3.2 on a new Dell Precision 5510 ... seems to be working fine
>
> Yes, I have the NVMe drive, and it seems to be working fine.
Great! Thanks for the info. I'll go ahead with my own order from Dell now.
> > How has the battery life been for you with the Dell Precision 5510?
>
> No
I'm a total newbie. I've been searching for a howto to boot the Win7 domain
from a USB stick so that Windows installs from the USB stick. I went thru the
process to attach the PCI channel using qvm-pci -a command in Dom0. When I
checked the Win7 Devices in VM Manager I see 00:14.0 USB
It looks like template uploaded to 3.1 repository was built for Qubes
3.2, so this is why it's incompatible. I've just removed this faulty
template, building new one - will be ready in few hours.
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Nov 29, 2016 at 10:56:55AM -0500, 'Vincent Adultman' via qubes-users
wrote:
> Hi all
>
> Qubes 3.1
>
> Have downloaded the new qubes-template- fedora-24-minimal however on starting
> it the following message is received
>
> "Dom0 GUI
Hi all
Qubes 3.1
Have downloaded the new qubes-template- fedora-24-minimal however on starting
it the following message is received
"Dom0 GUI daemon do not support protocol version 1:1 requested by VM. To update
Dom0..." etc
Does the template require a version of gui currently only in
Dne 11/29/2016 v 06:10 AM Brian Skinner napsal(a):
On Saturday, November 26, 2016 at 1:03:23 PM UTC-8, Tomas Vondra wrote:
Qubes 3.2 on a new Dell Precision 5510 ... seems to be working fine
Hi Tomas,
Thank you for posting your HCL report. I'm planning to buy a Dell 5510 laptop
soon and
On Wednesday, March 9, 2016 at 10:35:09 PM UTC-5, mwi...@mattwilson.org wrote:
> I have a new i3 Skylake NUC (NUC6i3SYK) and am trying to install Qubes OS 3.1
> on it. Unfortunately, it's not working.
3.2 is working great on my NUC6i3SYK. Have you tried it yet? I'm typing this
message from it
20 matches
Mail list logo