Re: 'invisible' blobs are blobs too (Re: [qubes-users] HCL - Purism Librem 13 v2)

2018-11-12 Thread Jonathan Seefelder
there was so much purism bashing in this thread. :-D >> >> >> -- >> cheers, >> Holger, who is happy that his keyboard, memory and battery works > Try, but 22rip didnt have that as a criteria in his choices. Also, the > x230 keyboard,memory and battery al

Re: [qubes-users] Installation, no AMD-vi, interrupt mapping, etc.

2018-10-01 Thread Jonathan Seefelder
ported, but no other errors. The dmesg > output is a little different though, so perhaps I missed something. > > Any suggestions on what to do next? > > [1] https://superuser.com/questions/1052023/ioapic0-not-in-ivrs-table > -- Kind Regards Jonathan Seefelder CryptoGS IT-Security

Re: [qubes-users] Qubes can't FDE?

2018-09-18 Thread Jonathan Seefelder
ель Jonathan Seefelder > написал: >> yes its possible, do you want to encrypt /boot and /root separately so >> you will need a different password for each partition, or do you want to >> encrypt it all together with 2fa etc? >> >> The first one is relatively easy,

Re: [qubes-users] Qubes can't FDE?

2018-09-18 Thread Jonathan Seefelder
f Qubes with full disk encryption (including /boot). Is it >> possible? Can anyone help me ?:) > I've seen others on this list report it as successful, but haven't done > it myself. I think they had to use the Seabios payload for the initial > install, then switch to coreboo

Re: [qubes-users] Qubes 4.0 SSD Encryption

2018-08-23 Thread Jonathan Seefelder
If you keep wear-leveling in mind, and encrypt the ssd before you fill it with sensitive data, id suggest an ssd. Ideally, you should encrypt /boot also. cheers On 08/23/18 16:15, jonbrownmaste...@gmail.com wrote: > I know the most secure way of using Qubes 4.0 is using full disk encryption >