Dear all,
Qubes OS has always provided the basic tools to accomplish encrypted
storage devices, namely qvm-block [1] and cryptsetup [2].
However the combination is neither self-explanatory nor convenient for
users who come from Operating Systems which provide "plug & play" for
most devices.
Frozentime345:
> Does restoring automatically verify integrity? Or are we suppose to run
> an integrity check before restoring?
>
Yes, restore uses the password you enter as both an encryption and
integrity check.
--
You received this message because you are subscribed to the Google Groups
"qub
Mike Keehan:
> I don't use whonix, but I've just started it up to see how it behaves.
> And yes, it is using 150% cpu in the tor browser (using top in a
> terminal window in whonix-user VM), and about 170% cpu in xentop.
> (and my fans have come on!).
>
> All I can suggest is to close the tor bro
On Wed, 19 Jun 2019 18:57:52 +
Jon deps wrote:
> On 6/18/19 11:39 AM, Mike Keehan wrote:
> > On Tue, 18 Jun 2019 04:44:04 +
> > omerta-3q9s2cxqgw4kltdg6p0...@public.gmane.org wrote:
> >
> >> Hey all,
> >>
> >> Over the last week I've noticed my laptops CPU keeps peaking @
> >> 80-85 ev
On 6/18/19 11:39 AM, Mike Keehan wrote:
On Tue, 18 Jun 2019 04:44:04 +
omerta-3q9s2cxqgw4kltdg6p0...@public.gmane.org wrote:
Hey all,
Over the last week I've noticed my laptops CPU keeps peaking @ 80-85
every now and then, even when I'm not doing any resource intensive
tasks.
I run 11-12
Stefan Schlott:
On 6/18/19 12:39 PM, cycle via qubes-users wrote:
recently I logged in into dropbox with a browser from my qubes box and
had to confirm my login. Afterwards I got a mail saying that there was
an login attempt from:
*Desktop-Client Linux 4.14.116-1.pvops.qubes.x86_64
*How can I
On Wed, Jun 19, 2019 at 12:24:07PM +, 'qubeslover' via qubes-users wrote:
>
> Hi!
> I see that the alt-svc header is active on the Qubes website. If I look at
> the Network Web Console in Tor Browser I can see the following header:
>
> h2="cflareusni3s7vwhq2f7gc4opsik7aa4t2ajedhzr42ez6uajayw
Hi!
I see that the alt-svc header is active on the Qubes website. If I look at the
Network Web Console in Tor Browser I can see the following header:
h2="cflareusni3s7vwhq2f7gc4opsik7aa4t2ajedhzr42ez6uajaywh3qd.onion:443";
ma=86400; persist=1
This is just excellent, thanks.
However, I am won
In the past I've successfully built mirage-firewall on several
occasions. However following a recent reinstall of qubesos I've been
unable to successfully build the firewall.
In summary I've tried building using fedora-29, fedora-30 and debian-10.
The errors associated with fedora 29 & 30 are simi