-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 07/20/2017 07:27 PM, Andrew David Wong wrote:
> Dear Qubes Community,
>
> We're looking for well-known, trustworthy volunteers from the
> community who would like to be moderators in the unofficial Qubes
> IRC channels on Freenode and OFTC
On May 7, 2017 10:39:22 AM CDT, Andrew David Wong wrote:
>-BEGIN PGP SIGNED MESSAGE-
>Hash: SHA512
>
>On 2017-05-07 10:32, nickl...@kulinacs.com wrote:
>> On May 7, 2017 10:23:54 AM CDT, Andrew David Wong
>> wrote: On 2017-05-07 10:10,
>>
On May 7, 2017 10:23:54 AM CDT, Andrew David Wong wrote:
>-BEGIN PGP SIGNED MESSAGE-
>Hash: SHA512
>
>On 2017-05-07 10:10, nickl...@kulinacs.com wrote:
>> What benefit does this have over simply ysing
>> qubes-split-gpg-client-wrapper, like done here:
>>
What benefit does this have over simply ysing qubes-split-gpg-client-wrapper,
like done here:
https://github.com/kulinacs/pass-qubes
It seems like a lot of overhead for not a lot of gain.
On May 7, 2017 9:50:26 AM CDT, "Manuel Amador (Rudd-O)"
wrote:
>Building on the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 01/10/2017 03:01 PM, Caleb Thompson wrote:
> So how important is it that I don't have an IOMMU or TPM? What
> things can I not do? Sorry for the newbie question.
>
>
> On Mon, Jan 9, 2017 at 8:35 PM, Nicklaus McClendon
> <
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 01/09/2017 08:12 PM, Caleb Thompson wrote:
> Update: I'm trying to figure out why the report says I have no
> IOMMU when my BIOS says I'm set to VT-x. Are they different things?
> Is an IOMMU something I can take my computer to a computer store
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
I've been looking into solutions for password managers utilizing
Qubes' isolation as well as possible while not compromising
functionality. Password based options are suboptimal, as regular
backups and syncing can be challenging, as the "Vault" qube
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Trammell Hudson spoke a couple of days ago about a custom bootloader
designed to minimally load the OS in a secure manner, and mentioned he
got it compatible with Qubes. Does anyone here have any experience
with this?
Talk:
>the problem is (as you wrote) 'supposed to be verified out-of-band'.
>for some less technical people, even verifying the signature is a huge
>step.
>i am a fan of providing easy accessible security and using already
>existing infrastructure. (in case of the dom0 repo, an ultimately
>trusted
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 12/23/2016 07:09 PM, Jean-Philippe Ouellet wrote:
>> If you can't access dom0, qrexec is default allowed,
>
> Uhh What? Can you elaborate?
qrexec usage is normally defined by an RPC. This RPC has a policy,
either allow, deny, or ask. My
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 12/23/2016 05:18 PM, Jean-Philippe Ouellet wrote:
> ... except with decent dom0 disaggregation working out of the box,
> and I'm personally making good use of qrexec in a server context
> as well.
>
> Securely accessing dom0 remotely is left as
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 12/18/2016 03:17 PM, taii...@gmx.com wrote:
> Some laptops such as dell latitudes/precisions have a "master
> recovery password" that is generated from the current serial number
> of the laptop (so do thinkpads) "Cannot be bypassed" - well you
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 12/18/2016 01:26 PM, Grzesiek Chodzicki wrote:
> W dniu niedziela, 18 grudnia 2016 17:15:59 UTC+1 użytkownik
> '0194358'019438'0194328'01943 napisał:
>> Hello,
>>
>> does a BIOS password (against BIOS changes), gives a higher
>> system
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 09/16/2016 01:18 PM, Robert wrote:
> Hi!
>
> I wonder if there is a command-line way to get the name (or any
> other id) of appVM's colour, used for window borders and such, from
> within the same appVM (not dom0)? It could be useful for
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 08/23/2016 11:07 AM, darren...@redskiesgroup.com wrote:
> How does Qubes perform as the host OS in a virtualised server
> environment?
>
> I'm thinking of a configuration where the host OS is Qubes with
> VM's running for things like a
On 08/14/2016 06:33 PM, Unman wrote:
> On Fri, Aug 12, 2016 at 02:58:26PM +, Manuel Amador (Rudd-O) wrote:
>> On 08/12/2016 01:39 PM, neilhard...@gmail.com wrote:
>>> I would like to be able to do something like:
>>>
>>> 1. Use Whonix/Tor as a disposable VM
>>>
>>> 2. Record browsing history
On 08/14/2016 05:22 PM, IX4 Svs wrote:
> Just spent a few minutes to figure this out so I thought I'd share.
>
> If you're a Signal user on Android, you can now have Signal inside
> Qubes. Here's how I did it:
>
> 1. Install the Chromium browser in your appvm template - skip if you
> were
On 08/12/2016 01:27 PM, johnroberts19...@gmail.com wrote:
> On Thursday, August 11, 2016 at 8:50:53 PM UTC+2, Andrew David Wong wrote:
> On 2016-08-11 05:08, amad...@riseup.net wrote:
My understanding is that by default Qubes Dom0 is protected from USB
attacks by disallowing access to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 08/11/2016 11:32 AM, 'digitaldijjn' via qubes-users wrote:
> I'm a programming noob going in my first year of a computer science
> program. I spend most of my free time getting better with python3,
> though I am familiar with java as well. In
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 08/10/2016 04:57 PM, angelo "angico" costa wrote:
> Hi, guys.
>
> Since I've read Kyle Rankin's articles on Qubes in the 5 last
> issues of Linux Journal, I decided to give Qubes a try, and I
> downloaded and installed Qubes-os 3.1 on an old
I do believe only Windows 7 is supported as an AppVM.
https://www.qubes-os.org/doc/windows-appvms/
On July 18, 2016 7:54:30 AM CDT, rick.jeffr...@gmail.com wrote:
>That was it precisely. The retail USB contains both the 32- and 64-bit
>versions. The ISO for just my architecture worked perfectly.
21 matches
Mail list logo