2 Jan 2024 |
ka1i-sto | In reply to @paco5:matrix.org How to install freetube in whonix. I don't think if this is a good idea to bring Youtube (even via Freetube) to Whonix (Workstation). This OS is not meant to have this kind of software on it. Try to use and isolated browser on your main machine under VPN or so, or install it on a OS on VirtualBox (os similar). Take a look at this in case: www.whonix.org/wiki/install_Software | 16:28:21 |
ka1i-sto | In reply to @paco5:matrix.org How to install freetube in whonix. * I don't think if this is a good idea to bring Youtube (even via Freetube) to Whonix (Workstation). This OS is not meant to have this kind of software on it. Try to use an isolated browser on your main machine under VPN or so, or install it on a OS on VirtualBox (os similar). Take a look at this in case: www.whonix.org/wiki/install_Software | 16:29:51 |
nitrogen | whats the min space needed to KVM qcow image?. I only have 100GB space and it ran out. | 20:22:25 |
nitrogen | when I unzipped the downloaded via tar instructions from webpage | 20:23:09 |
6 Jan 2024 |
| pier2572 joined the room. | 18:08:41 |
9 Jan 2024 |
type-iix | paco: better to use an Inidivious onion node in Tor Browser as an intermediate security option since it is highly impracticable to use Whonix regularly and isolate every last vector of deanonymisation | 20:59:34 |
type-iix | * paco: better to use an Invidious onion node in Tor Browser as an intermediate security option since it is highly impracticable to use Whonix regularly and isolate every last vector of deanonymisation | 21:00:12 |
type-iix | paco: Qubes & Qubes-Whonix is Most Secure | 21:00:33 |
type-iix | In reply to @nitrogen:nitro.chat whats the min space needed to KVM qcow image?. I only have 100GB space and it ran out. adrelanos would 100% reply to you that this is related to third-party software and not related to Whonix | 21:01:33 |
type-iix | nitrogen: I'd be happy to answer if I knew what it was | 21:02:14 |
12 Jan 2024 |
| nighthawk changed their display name from [Lord] Shin to shin. | 16:07:23 |
13 Jan 2024 |
| 839ty9 joined the room. | 18:03:47 |
15 Jan 2024 |
839ty9 | Redacted or Malformed Event | 22:32:54 |
839ty9 | * has anyone mentioned or started working on a "whonix-like" os or project but using and os with quicker updates. Like arch family, fedora "family" - not many derivative distros, or even just debian sid - which could probably be released under the whonix brand or project as community image or even official one if that's desired. | 22:33:22 |
16 Jan 2024 |
| 839ty9 changed their display name from 839ty9 to eightthree. | 19:30:02 |
| 839ty9 changed their display name from eightthree to 839ty9. | 19:41:56 |
17 Jan 2024 |
| @dko1905:mozilla.org set a profile picture. | 01:11:19 |
| @rick50:matrix.org joined the room. | 21:30:38 |
| @rick50:matrix.org left the room. | 21:53:57 |
18 Jan 2024 |
| @dreamer222:matrix.org joined the room. | 15:02:44 |
19 Jan 2024 |
| @bung9:matrix.org left the room. | 12:56:50 |
21 Jan 2024 |
839ty9 | hi, strange question (sorry if not enough ontopic, but I figured people here would be amongs the most likely to know) but is there a way to remotely attest that a user in a chatroom is using i.e. linux/bsd in the host, not just in the xen/qemu/virtualbox/libvirt? Even harder, to detect something like android or chromiumos/chromeos running on host? How do you know someone you talk with using e2ee and whonix/qubes isn't using a spying os? I guess it's even harder to detect a compromised linux/bsd os, that is phoning home/sending telemetry to "insert bad actor here." Or even hw or firmware (intel ME/PSP/UEFI) doing the same... | 04:11:14 |
Lunar | Not without being extremely intrusive | 20:19:13 |
22 Jan 2024 |
839ty9 | thx, i guess it's not implemented then as far as you know, in any room you know, even in likely privacy-wary rooms like this one...
| 11:20:33 |
| @thorodinson:nitro.chat left the room. | 20:42:06 |
25 Jan 2024 |
| rick joined the room. | 06:39:47 |
| @anonymous:digitale-gesellschaft.ch joined the room. | 19:30:12 |
@anonymous:digitale-gesellschaft.ch | Did someone experience problems with the last Kicksecure update regarding dracut/grub-live? The live mode disappeared. On HVs and VMs.
"It has been detected that this system is using dracut but the file /usr/lib/dracut/modules.d/90overlay-root/overlay-mount.sh is not executable. This means that no live mode boot menu entry will be added."
It removed any live mode configuration. Reinstalling grub-live doesnt fix it. The update removed the file. Placing the file back and reinstalling grub-live fixes it. I need the live mode. Someone experienced the same problem? Installing the main meta package for the HVs does not solve it, too. | 19:35:37 |
26 Jan 2024 |
@anonymous:digitale-gesellschaft.ch | Found the solution in the forum. | 09:55:48 |
@anonymous:digitale-gesellschaft.ch | https://forums.kicksecure.com/t/updating-kicksecure-to-17-1-1-5-breaks-grub-live/358 | 09:56:45 |