Hello Unman,
>> It's perfectly possible that the installer (not principally written by
>> Qubes) could mistakenly include a passphrase string.
As far as I have understand, the problem is not that the password is shown, but
that the report with this error mistake and the password could get transf
I’ve tried most of the solutions on
https://github.com/QubesOS/qubes-issues/issues/3125, but they don’t seem to
work. Or I probably am doing something wrong.
Would changing the drivers actually work? I don’t want to keep trying to fix
libvirt.
--
You received this message because you are subs
I do not know how to help you. I have taken a picture without removing the
geotag (authentic picture /w geotag in my own living room. the picture
(one of many) is in my iphone but my own finger is hiding MY OWN
PASSPHRASE... I could see it 20/20.. I still have everything I used (my
own laptop),
On Tue, Nov 28, 2017 at 07:48:49PM -0500, '[799]' via qubes-users wrote:
> Hello,
>
> Original-Nachricht
> An 29. Nov. 2017, 00:48, schrieb:
> Sorry but I almost fainted ! (I even took a picture ! I could not believe
> this MEGA-HUGE security flaw right in front of my eyes )
> (
On Mon, Nov 27, 2017 at 09:27:16PM +0100, CF wrote:
> Dear Users,
>
> A few (simple) questions as I was reading about DNS servers:
>
> 1 - Any feedback on using your own DNS server directly on your Qubes
> machine (using unbound for instance)? Is it straightforward to have your
> DNS cache persis
Hello,
Original-Nachricht
An 29. Nov. 2017, 00:48, schrieb:
Sorry but I almost fainted ! (I even took a picture ! I could not believe this
MEGA-HUGE security flaw right in front of my eyes )
(...)
Sorry, you are supposed to be good and security expert but you are asking me
(THE
Could you send me one, for privacy concerns, literature, and art things, and
staying as much as possible gosthy? Thanks in advance, this would be great from
you.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group an
On Tue, Nov 28, 2017 at 09:26:04AM -0800, vel...@tutamail.com wrote:
> I am using Qubes 3.2, I have a dedicated Debian Template for my more trusted
> VMs and a separate dedicated Debian Template for my DVMs with printer drivers
> installed.
>
> This is tricky but I will try to explain:
>
> I ma
Sorry but I almost fainted ! (I even took a picture ! I could not believe this
MEGA-HUGE security flaw right in front of my eyes )
An installation error prompt this screen :
An unknown error has occurred
This program has encountered an unknown error. You may report the bug below or
quit the p
Hello David,
Original-Nachricht
An 27. Nov. 2017, 21:32, David Hobach schrieb:
>> Search for the related doc bug @qubes-issues.
>> It gives you the command, but I don't have it
>> at hand right now.
as Qubes 4rc3 has been released I've reinstalled RC3 and got rid of the problem
On Tuesday, November 28, 2017 at 10:28:38 AM UTC-8,
bm-2ctrx1tl5lg8cfa...@bitmessage.ch wrote:
> When I tried create new VM based on Fedora I saw something strange because
> it don't want run even if I created VM based on Debian. And when I open
> terminal and for test run this commands I see this
On Tuesday, November 28, 2017 at 6:41:02 PM UTC+1, Frédéric Pierret (fepitre)
wrote:
> Le mardi 28 novembre 2017 18:33:38 UTC+1, Foppe de Haan a écrit :
> > guest-wd.log from a (fedora) VM that won't boot with kernel-qubes-vm-4.14.2:
>
> I confirm your log and the behavior. Few days ago, I tried
On Tuesday, November 28, 2017 at 6:41:02 PM UTC+1, Frédéric Pierret (fepitre)
wrote:
> Le mardi 28 novembre 2017 18:33:38 UTC+1, Foppe de Haan a écrit :
> > guest-wd.log from a (fedora) VM that won't boot with kernel-qubes-vm-4.14.2:
>
> I confirm your log and the behavior. Few days ago, I tried
On Tuesday, 28 November 2017 18:33:37 CET Foppe de Haan wrote:
> Bottom line IMO these days security can't be done by a layman,
Security as a concept is not that black / white, there is no 100% security
and likewise I fail to see how "laymen" can't increase their security.
As a quick example, in
Le mardi 28 novembre 2017 18:33:38 UTC+1, Foppe de Haan a écrit :
> guest-wd.log from a (fedora) VM that won't boot with kernel-qubes-vm-4.14.2:
I confirm your log and the behavior. Few days ago, I tried to look on the xen
and kernel list to see if there were something bug we need to dig into the
guest-wd.log from a (fedora) VM that won't boot with kernel-qubes-vm-4.14.2:
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups
I am using Qubes 3.2, I have a dedicated Debian Template for my more trusted
VMs and a separate dedicated Debian Template for my DVMs with printer drivers
installed.
This is tricky but I will try to explain:
I managed to get my printer set up using a Debian Template(printed Test Page
fine from
On 11/28/2017 11:30 AM, 'Tom Zander' via qubes-users wrote:
On Tuesday, 28 November 2017 03:38:02 CET Andrew David Wong wrote:
Our position is that reasonable security
via compartmentalization (of which Qubes is an implementation) requires
the user to make informed decisions about how to compar
On Tuesday, 28 November 2017 03:38:02 CET Andrew David Wong wrote:
> Our position is that reasonable security
> via compartmentalization (of which Qubes is an implementation) requires
> the user to make informed decisions about how to compartmentalize
> various parts of their digital life into sepa
On Tuesday, 28 November 2017 14:18:44 CET cooloutac wrote:
> Of course many feel Qubes is for more advanced users, and apparently that
> will become a self fulfilling prophecy in version 4.
Looking at the (lack of) UI tools at this time, you can be excused thinking
this. I personally think its a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Dear Qubes Community,
We have just published Qubes Security Bulletin (QSB) #36:
Xen hypervisor issue in populate-on-demand code (XSA-247).
The text of this QSB is reproduced below. This QSB and its accompanying
signatures will always be available in
I'd want something with more ram for Qubes. I'd say 8 is minimum, 32gb
recommended. I had 8 on a desktop and was hitting limit sometimes so I added
another 8. A laptop would probably use more.
And most importantly to know if iommu protections work on it. You would
either have to look at th
On Thursday, November 23, 2017 at 7:55:21 AM UTC-5, Leo Gaspard wrote:
> On 11/23/2017 03:35 AM, taii...@gmx.com wrote:
> > On 11/22/2017 07:25 PM, xeph...@gmail.com wrote:
> >> This is quite late, but now that UEFI is supported...is secure boot?
> >> Wasn't quite sure what key or signature to imp
>
> > This is quite late, but now that UEFI is supported...is secure boot?
> > Wasn't quite sure what key or signature to import.
> Why are all the newbies here so obsessed with a microsoft technology?
>
> Just shut it off, it provides no benefit to you. If their code is so
> great and benefic
On Wednesday, November 22, 2017 at 10:44:58 AM UTC-5, haaber wrote:
> This is the first line while booting. So I checked systemctl status
> systemd-modules-load.service that says the below. I see no errors .. all
> OK then??
>
> Thank you, Bernhard
>
> [me @dom0 ]
>
> systemd-modules-load.ser
On Monday, November 27, 2017 at 2:09:12 PM UTC-5, David Hobach wrote:
> On 11/27/2017 07:57 PM, David Hobach wrote:
> > On 11/27/2017 07:47 AM, Wael Nasreddine wrote:
> >> I'm running 4.0-RC2 on Asrock Z170 pro4/i7-6700k and I got two hard
> >> reboots in the last few hours, often around the time
On Tuesday, 28 November 2017 03:07:02 CET Andrew David Wong wrote:
> On 2017-11-27 16:03, 'Tom Zander' via qubes-users wrote:
> > I have a ‘work’ VM which holds a significant amount of user-data
> > and as such I want my homedir to be hosted on my spinning-disk
> > drive.
[snip]
> This option works
On Sun, Nov 26, 2017 at 05:50:17PM +, Unman wrote:
> > > It's a bug Holger.
> > > Scoot on over to GitHub and raise an issue
> > is it really? I cannot believe it's broken (in 3.2) and noone has raised
> > an issue yet…
> Well someone has to be first :-)
>
> truth , I dont think that many peop
> Current users of Qubes 4.0-rc2 can upgrade in-place by downloading the
> latest updates from the testing repositories in both
> [dom0][dom0-testing] and [TemplateVMs][domU-testing]. Further details,
> including full installation instructions, are available in the [Qubes
> 4.0 release notes][rele
29 matches
Mail list logo