Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upTails on Qubes live-usb #1969
Comments
andrewdavidwong
added
enhancement
C: doc
C: website
privacy
C: live-usb
labels
May 6, 2016
andrewdavidwong
added this to the
Documentation/website milestone
May 6, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
mfc
May 6, 2016
Member
this seems like a duplicate of #1343. it would be great to loop the author into that thread.
also, they are basically hacking together Whonix in Qubes Live USB using Tails. it would be really, really nice if the folks trying to do this collaborated with the Whonix folks in order to create an agreed upon torified-workstation-in-Qubes strategy (whether live or not), and then Whonix folks can focus on not-live and Tails folks can focus on live.
They could help by releasing a new version or by providing instructions how to create a Qubes live cd.
we definitely should provide documentation on how to create Qubes live cd, so that interested folks (this person, Tails folks) can continue to hack on this issue and maybe even manage it at some point.
|
this seems like a duplicate of #1343. it would be great to loop the author into that thread. also, they are basically hacking together Whonix in Qubes Live USB using Tails. it would be really, really nice if the folks trying to do this collaborated with the Whonix folks in order to create an agreed upon torified-workstation-in-Qubes strategy (whether live or not), and then Whonix folks can focus on not-live and Tails folks can focus on live.
we definitely should provide documentation on how to create Qubes live cd, so that interested folks (this person, Tails folks) can continue to hack on this issue and maybe even manage it at some point. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
mfc
May 6, 2016
Member
you're right, I guess it is more entirely dependent on #1343, rather than a dupe.
it is not clear to me that is worthwhile, vs trying to get Tails better integrated into Qubes (through Whonix) and then having all the "Tails-like" functionality in the Qubes Live USB to begin with.
I will create an email thread with the creator of the post and we can discuss more.
|
you're right, I guess it is more entirely dependent on #1343, rather than a dupe. it is not clear to me that is worthwhile, vs trying to get Tails better integrated into Qubes (through Whonix) and then having all the "Tails-like" functionality in the Qubes Live USB to begin with. I will create an email thread with the creator of the post and we can discuss more. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
unman
May 10, 2016
Member
I'm amazed #1343 is still open: it was only ever a display problem, for which I gave solution. It's not an issue now.
Running tails in qubes is straightforward whether in Live or installed: all the folk here are doing is documenting precise steps.
|
I'm amazed #1343 is still open: it was only ever a display problem, for which I gave solution. It's not an issue now. Running tails in qubes is straightforward whether in Live or installed: all the folk here are doing is documenting precise steps. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
SparkyMcSpark
May 16, 2016
I can also confirm that this is working since the tails jessie release (2.0 I think). See also this thread on the tails-dev mail list: https://mailman.boum.org/pipermail/tails-dev/2015-December/009913.html
I still have some mouse problems (sometimes while scrolling down on a page suddenly it starts scrolling up, mouse pointer lag, small and fixed window size of the vm). However, I don't know if I'm the only one experiencing this and if this is a qubes or tails issue. I guess it is the missing gui agent in tails (or in debian in general).
SparkyMcSpark
commented
May 16, 2016
|
I can also confirm that this is working since the tails jessie release (2.0 I think). See also this thread on the tails-dev mail list: https://mailman.boum.org/pipermail/tails-dev/2015-December/009913.html |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
mfc
May 20, 2016
Member
so just to be clear I think this is thread should be deprioritized vs sharing documentation on running Tails on an installed Qubes system #1343, since Qubes Live USB is out-of-date / not recommended.
|
so just to be clear I think this is thread should be deprioritized vs sharing documentation on running Tails on an installed Qubes system #1343, since Qubes Live USB is out-of-date / not recommended. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
mfc
May 31, 2016
Member
and to be more clear, I think this documentation/guide is misdirected because as soon as we have an updated Qubes live image then we'd have whonix in it, which accomplishes all of this much more simply for the user. and all Tails-specific benefits (anti-forensics like RAM wiping on shutdown, etc) are not implemented in this method since they'd need to be implemented in Qubes on Tails workstation (see #2024 for attempted run-down of these functionalities).
So I recommend closing this ticket and moving conversation towards #2024 re: Tails-like functionality in Qubes.
|
and to be more clear, I think this documentation/guide is misdirected because as soon as we have an updated Qubes live image then we'd have whonix in it, which accomplishes all of this much more simply for the user. and all Tails-specific benefits (anti-forensics like RAM wiping on shutdown, etc) are not implemented in this method since they'd need to be implemented in Qubes on Tails workstation (see #2024 for attempted run-down of these functionalities). So I recommend closing this ticket and moving conversation towards #2024 re: Tails-like functionality in Qubes. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
May 31, 2016
Member
all Tails-specific benefits (anti-forensics like RAM wiping on shutdown, etc) are not implemented in this method since they'd need to be implemented in Qubes on Tails workstation (see #2024 for attempted run-down of these functionalities).
These can only be implemented at the dom0 / xen level. Impossible to implement at the VM level.
These can only be implemented at the dom0 / xen level. Impossible to implement at the VM level. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
yep agreed, I'm going to close this for #2024. |
andrewdavidwong commentedMay 6, 2016
"How to Run Tails from a Qubes Live CD":
https://garlicgambit.wordpress.com/2016/04/22/how-to-run-tails-from-a-qubes-live-cd
At least one user (in addition to the author) has reported that this works:
Related: #1343
CC: @adrelanos, @bnvk, @mfc