On Wednesday, May 27, 2020 at 9:02:34 PM UTC-5, Mad Man with a Blue Box
wrote:
>
> I would attach the HCL file but I cannot for the life of me figure out a
> way to get it off the laptop or to get the laptop online.
>
> Anytime I try installing Qubes on this device it says errors and must be
>
I would attach the HCL file but I cannot for the life of me figure out a way to
get it off the laptop or to get the laptop online.Anytime I try installing
Qubes on this device it says errors and must be an expert/developer to keep
going.When eventually in the main desktop type area none of the V
On Wed, May 27, 2020 at 12:21:00PM -0700, Robert Spigler wrote:
> qubes-gpg-client-wrapper -r robertspig...@protonmail.ch --trusted-key
> -e
> '/home/user/Documents/Test_Encryption.txt' -o /home/user/Documents/Final.gpg
>
> Still results in:
>
> bash: C2C60E279E86F10D5697782535CE0FE6C2141823:
qubes-gpg-client-wrapper -r robertspig...@protonmail.ch --trusted-key
-e
'/home/user/Documents/Test_Encryption.txt' -o /home/user/Documents/Final.gpg
Still results in:
bash: C2C60E279E86F10D5697782535CE0FE6C2141823: No such file or directory
What is the wrapper? This also does not open the qu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Wed, May 27, 2020 at 01:57:52PM -0500, Sven Semmler wrote:
> On Wed, May 27, 2020 at 08:43:48PM +0200, Frédéric Pierret wrote:
> > Those corresponds to freshly merged PR of components and notably
> > qubes-pdf-converter. The problem is that we don
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Wed, May 27, 2020 at 08:43:48PM +0200, Frédéric Pierret wrote:
> Those corresponds to freshly merged PR of components and notably
> qubes-pdf-converter. The problem is that we don't have tracking build
> for Ubuntu. I suggest you to checkout previ
On 2020-05-27 19:47, Sven Semmler wrote:
> On Wed, May 27, 2020 at 12:26:28PM -0500, Sven Semmler wrote:
>> echo "pythonver:Depends=python" >> debian/qubes.pdf-converter.substvars
>> dh_gencontrol
>> dpkg-gencontrol: warning: Depends field of package qubes-pdf-converter:
>> unknown substitution
qvm-check checks if for existence by default.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on
Thank you so much for your work, I have saved so much time and memory because
of your amazing firewall!
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-use
Congratulations!
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit
https://group
> I notice that Tor has a means for "Bridges." A Bridge being an IP Address
> that allow one to make a first hop to an IP Address that the ISP, or local
> server is not expecting, or blocking.
>
> My problem being that if one was in a place like China, then the government
> is surely trying
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Wed, May 27, 2020 at 12:26:28PM -0500, Sven Semmler wrote:
> echo "pythonver:Depends=python" >> debian/qubes.pdf-converter.substvars
> dh_gencontrol
> dpkg-gencontrol: warning: Depends field of package qubes-pdf-converter:
> unknown substitution
On 5/27/20 5:25 PM, Camille wrote:
Hi,
Just short info about official *Qubes OS and 3mdeb minisummit 2020*, where
qubes and coreboot core developers will discuss status fwupd/LVFS support for
Qubes,
SRTM and DTRM for Qubes, Anti Evil Maid for Intel coreboot-based platform,
Anti-Evil-Maid for
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
I was about to file a qubes-issue when I realized that the issue might
not be with the qubes-builder but my Fedora install. I tried going back
several commits until the beginning of May and the issue persisted.
Since I do a 'git pull' and build daily
Is there a way to hide block devices from qubes Device Manager?
I've configured passthrough of RAID controller to a VM. The problem is that
as soon as VM boots Device Manager shows all drives as available to attach
to other VMs.
--
You received this message because you are subscribed to the Goo
On Tuesday, May 26, 2020 at 8:39:27 AM UTC-5, Catacombs wrote:
Not sure if Qubes Users is the best place to bring this up.
As I look at the various means to get on the Internet, in risky
situations:
Public WiFi.
Hotels.
A country which is involved in spying on its citizens.
On 2020-05-27 17:24, Sven Semmler wrote:
> On Wed, May 27, 2020 at 07:30:29AM -0700, Dave wrote:
>> The upgrade process for Standalone Fedora-31-work-test worked up until the
>> end when it complained about disk space.
>> If necessary, I can add disk space and rerun it, but does this prove your
Hi,
Just short info about official *Qubes OS and 3mdeb minisummit 2020*, where
qubes and coreboot core developers will discuss status fwupd/LVFS support for
Qubes,
SRTM and DTRM for Qubes, Anti Evil Maid for Intel coreboot-based platform,
Anti-Evil-Maid for AMD and details about building and
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Wed, May 27, 2020 at 07:30:29AM -0700, Dave wrote:
> The upgrade process for Standalone Fedora-31-work-test worked up until the
> end when it complained about disk space.
> If necessary, I can add disk space and rerun it, but does this prove your
Hi,
Just short info about official Qubes OS and 3mdeb minisummit 2020, where qubes
and coreboot core developers will discuss status fwupd/LVFS support for Qubes,
SRTM and DTRM for Qubes, Anti Evil Maid for Intel coreboot-based platform and
details about building and testing operating system o
On Wed, May 27, 2020 at 07:30:29AM -0700, Dave wrote:
> The upgrade process for Standalone Fedora-31-work-test worked up until the
> end when it complained about disk space.
> *dnf --releasever= distro-sync --best* --allowerasing
uh, since you do not seem to follow the fedora upgrade guide regar
On 5/26/20 9:39 AM, Catacombs wrote:
> Not sure if Qubes Users is the best place to bring this up.
>
> As I look at the various means to get on the Internet, in risky situations:
> Public WiFi.
> Hotels.
> A country which is involved in spying on its citizens.
>
> I notice that Tor has a means
Hey, I experience trouble while trying to install docker accordingly to
https://docs.docker.com/engine/install/debian/ on debian-10. It apprears
that aufs.ko (whatever that is) makes trouble
Building initial module for 4.19.120-1.pvops.qubes.x86_64
Error! Bad return status for module build on ker
- - when you just check for updates in your fedora-30-work template ...
> what happens? does it work normally?
>
Yes; Qubes Manager Updater manages all my templates normally; Fedora
templates get updated nearly once a day - sometimes more
> - - please compare 'qvm-features fedora-30-work
Hey, I experience trouble while trying to install docker accordingly to
https://docs.docker.com/engine/install/debian/ on debian-10. It apprears
that aufs.ko (whatever that is) makes trouble
Building initial module for 4.19.120-1.pvops.qubes.x86_64
Error! Bad return status for module build on ker
On 2020-05-26 00:03, Dave wrote:
> platform: Qubes 4.0.3 / Intel 64
>
> attempting to upgrade cloned Fedora-30 templates with user applications to
> Fedora-31
> in accordance with instructions at
> https://www.qubes-os.org/doc/template/fedora/upgrade/
> completed steps 1, 2, & 3 - shutdown, cl
26 matches
Mail list logo