Re: [qubes-users] Seeking moderators for unofficial Qubes IRC channels on Freenode and OFTC

2017-07-31 Thread Nicklaus McClendon
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 07/20/2017 07:27 PM, Andrew David Wong wrote: > Dear Qubes Community, > > We're looking for well-known, trustworthy volunteers from the > community who would like to be moderators in the unofficial Qubes > IRC channels on Freenode and OFTC

Re: [qubes-users] ANN: qubes-pass — an inter-VM password manager and store for Qubes OS

2017-05-07 Thread nicklaus
On May 7, 2017 10:39:22 AM CDT, Andrew David Wong wrote: >-BEGIN PGP SIGNED MESSAGE- >Hash: SHA512 > >On 2017-05-07 10:32, nickl...@kulinacs.com wrote: >> On May 7, 2017 10:23:54 AM CDT, Andrew David Wong >> wrote: On 2017-05-07 10:10, >>

Re: [qubes-users] ANN: qubes-pass — an inter-VM password manager and store for Qubes OS

2017-05-07 Thread nicklaus
On May 7, 2017 10:23:54 AM CDT, Andrew David Wong wrote: >-BEGIN PGP SIGNED MESSAGE- >Hash: SHA512 > >On 2017-05-07 10:10, nickl...@kulinacs.com wrote: >> What benefit does this have over simply ysing >> qubes-split-gpg-client-wrapper, like done here: >>

Re: [qubes-users] ANN: qubes-pass — an inter-VM password manager and store for Qubes OS

2017-05-07 Thread nicklaus
What benefit does this have over simply ysing qubes-split-gpg-client-wrapper, like done here: https://github.com/kulinacs/pass-qubes It seems like a lot of overhead for not a lot of gain. On May 7, 2017 9:50:26 AM CDT, "Manuel Amador (Rudd-O)" wrote: >Building on the

Re: [qubes-users] Re: HCL - Toshiba Satellite C55A

2017-01-10 Thread Nicklaus McClendon
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 01/10/2017 03:01 PM, Caleb Thompson wrote: > So how important is it that I don't have an IOMMU or TPM? What > things can I not do? Sorry for the newbie question. > > > On Mon, Jan 9, 2017 at 8:35 PM, Nicklaus McClendon > <

Re: [qubes-users] Re: HCL - Toshiba Satellite C55A

2017-01-09 Thread Nicklaus McClendon
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 01/09/2017 08:12 PM, Caleb Thompson wrote: > Update: I'm trying to figure out why the report says I have no > IOMMU when my BIOS says I'm set to VT-x. Are they different things? > Is an IOMMU something I can take my computer to a computer store

[qubes-users] Using pass with split GPG

2017-01-06 Thread Nicklaus McClendon
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 I've been looking into solutions for password managers utilizing Qubes' isolation as well as possible while not compromising functionality. Password based options are suboptimal, as regular backups and syncing can be challenging, as the "Vault" qube

[qubes-users] Heads Bootloader

2016-12-28 Thread Nicklaus McClendon
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Trammell Hudson spoke a couple of days ago about a custom bootloader designed to minimally load the OS in a secure manner, and mentioned he got it compatible with Qubes. Does anyone here have any experience with this? Talk:

Re: [qubes-users] RFC: adding qubes images to the (qubes) repo

2016-12-28 Thread nicklaus
>the problem is (as you wrote) 'supposed to be verified out-of-band'. >for some less technical people, even verifying the signature is a huge >step. >i am a fan of providing easy accessible security and using already >existing infrastructure. (in case of the dom0 repo, an ultimately >trusted

Re: [qubes-users] Qubes as Server OS?

2016-12-23 Thread Nicklaus McClendon
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 12/23/2016 07:09 PM, Jean-Philippe Ouellet wrote: >> If you can't access dom0, qrexec is default allowed, > > Uhh What? Can you elaborate? qrexec usage is normally defined by an RPC. This RPC has a policy, either allow, deny, or ask. My

Re: [qubes-users] Qubes as Server OS?

2016-12-23 Thread Nicklaus McClendon
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 12/23/2016 05:18 PM, Jean-Philippe Ouellet wrote: > ... except with decent dom0 disaggregation working out of the box, > and I'm personally making good use of qrexec in a server context > as well. > > Securely accessing dom0 remotely is left as

Re: [qubes-users] Re: BIOS Security Settings?

2016-12-18 Thread Nicklaus McClendon
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 12/18/2016 03:17 PM, taii...@gmx.com wrote: > Some laptops such as dell latitudes/precisions have a "master > recovery password" that is generated from the current serial number > of the laptop (so do thinkpads) "Cannot be bypassed" - well you >

Re: [qubes-users] Re: BIOS Security Settings?

2016-12-18 Thread Nicklaus McClendon
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 12/18/2016 01:26 PM, Grzesiek Chodzicki wrote: > W dniu niedziela, 18 grudnia 2016 17:15:59 UTC+1 użytkownik > '0194358'019438'0194328'01943 napisał: >> Hello, >> >> does a BIOS password (against BIOS changes), gives a higher >> system

Re: [qubes-users] how to get appVM colour for customizing bash prompt's colours

2016-09-16 Thread Nicklaus McClendon
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 09/16/2016 01:18 PM, Robert wrote: > Hi! > > I wonder if there is a command-line way to get the name (or any > other id) of appVM's colour, used for window borders and such, from > within the same appVM (not dom0)? It could be useful for >

Re: [qubes-users] Qubes for running virtual servers

2016-08-23 Thread Nicklaus McClendon
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 08/23/2016 11:07 AM, darren...@redskiesgroup.com wrote: > How does Qubes perform as the host OS in a virtualised server > environment? > > I'm thinking of a configuration where the host OS is Qubes with > VM's running for things like a

Re: [qubes-users] Tool to record Whonix / Tor browsing history..?

2016-08-14 Thread Nicklaus McClendon
On 08/14/2016 06:33 PM, Unman wrote: > On Fri, Aug 12, 2016 at 02:58:26PM +, Manuel Amador (Rudd-O) wrote: >> On 08/12/2016 01:39 PM, neilhard...@gmail.com wrote: >>> I would like to be able to do something like: >>> >>> 1. Use Whonix/Tor as a disposable VM >>> >>> 2. Record browsing history

Re: [qubes-users] installing Signal on Qubes mini-HOWTO

2016-08-14 Thread Nicklaus McClendon
On 08/14/2016 05:22 PM, IX4 Svs wrote: > Just spent a few minutes to figure this out so I thought I'd share. > > If you're a Signal user on Android, you can now have Signal inside > Qubes. Here's how I did it: > > 1. Install the Chromium browser in your appvm template - skip if you > were

Re: [qubes-users] Qubes 3.2(R2) USB Connecting to DOM0 by Default

2016-08-12 Thread Nicklaus McClendon
On 08/12/2016 01:27 PM, johnroberts19...@gmail.com wrote: > On Thursday, August 11, 2016 at 8:50:53 PM UTC+2, Andrew David Wong wrote: > On 2016-08-11 05:08, amad...@riseup.net wrote: My understanding is that by default Qubes Dom0 is protected from USB attacks by disallowing access to

Re: [qubes-users] what practices, modules, and toolsets should I be familiar with to effectively contribute to qubes?

2016-08-11 Thread Nicklaus McClendon
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 08/11/2016 11:32 AM, 'digitaldijjn' via qubes-users wrote: > I'm a programming noob going in my first year of a computer science > program. I spend most of my free time getting better with python3, > though I am familiar with java as well. In

Re: [qubes-users] Memory resources

2016-08-10 Thread Nicklaus McClendon
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 08/10/2016 04:57 PM, angelo "angico" costa wrote: > Hi, guys. > > Since I've read Kyle Rankin's articles on Qubes in the 5 last > issues of Linux Journal, I decided to give Qubes a try, and I > downloaded and installed Qubes-os 3.1 on an old

Re: [qubes-users] Can't Boot From Win10 Retail USB

2016-07-18 Thread nicklaus
I do believe only Windows 7 is supported as an AppVM. https://www.qubes-os.org/doc/windows-appvms/ On July 18, 2016 7:54:30 AM CDT, rick.jeffr...@gmail.com wrote: >That was it precisely. The retail USB contains both the 32- and 64-bit >versions. The ISO for just my architecture worked perfectly.