Remote Qubes User Testing (Running Qubes in the Browser) revisions

Go back to topic: Remote Qubes User Testing (Running Qubes in the Browser)

  1. v11 anchor; v11 full version
  2. v10 anchor; v10 full version
  3. v9 anchor; v9 full version
  4. v8 anchor; v8 full version
  5. v7 anchor; v7 full version
  6. v6 anchor; v6 full version
  7. v5 anchor; v5 full version
  8. v4 anchor; v4 full version
  9. v3 anchor; v3 full version
  10. v2 anchor; v2 full version

Revision #11

Edited on
2023-09-07
Edited by user
deeplow

Revision #10

Edited on
2022-10-04
Edited by user
deeplow
sudo apt install -y tomcat9 tomcat-admin tomcat9-common tomcat9-user sudo apt install -y tomcat9 tomcat9-admin tomcat9-common tomcat9-user

Revision #9

Edited on
2022-10-03
Edited by user
deeplow
| **Template** | debian-10 | | **Template** | debian-11 (:warning: debian 10 won't work) |

Revision #8

Edited on
2022-10-01
Edited by user
deeplow
Because an extra qube is running it could interfere with a user's experience (e.g. they will see it in the qube domains widget). To hide it, you can delete `sys-whonix` or `sys-usb` and rename `remote-admin` to either one. An unsuspecting users won't see any difference. Because an extra qube is running it could interfere with a user's experience (e.g. they will see it in the qube domains widget). To hide it, you can delete `sys-whonix` or `sys-usb` and rename `remote-admin` to either one. An unsuspecting users won't see any difference. ### Making this faster See this [related discussions](https://forum.qubes-os.org/t/the-qubes-os-project-is-now-accepting-donations-on-ethereum/13941).

Revision #7

Edited on
2022-09-30
Edited by user
deeplow
sudo apt install -y guacd libguac-client-vnc sudo apt install -y guacd libguac-client-vnc0

Revision #6

Edited on
2022-09-29
Edited by user
deeplow
echo "qubes.ConnectTCP +5900 remote-admin @default allow target=dom0" | sudo tee /etc/qubes/policy.d/30-remote-admin.policy echo "qubes.ConnectTCP +5900 remote-admin @default allow target=dom0" | sudo tee /etc/qubes/policy.d/30-remote-admin.policy

Revision #5

Edited on
2022-09-29
Edited by user
deeplow
echo "qubes.ConnectTCP +5901 remote-admin @default allow target=dom0" | sudo tee - /etc/qubes/policy.d/30-remote-admin.policy echo "qubes.ConnectTCP +5900 remote-admin @default allow target=dom0" | sudo tee /etc/qubes/policy.d/30-remote-admin.policy
1. :arrows_counterclockwise: open a terminal and run `qvm-connect-tcp 5901:@default:5901` 1. :arrows_counterclockwise: open a terminal and run `qvm-connect-tcp 5900:@default:5900`

Revision #4

Edited on
2022-09-29
Edited by user
deeplow
vncpassword vncpasswd

Revision #3

Edited on
2022-09-22
Edited by user
deeplow
> * **2-4 seconds input delay** - can be improved if you use DNS instead of onion services > * **2-20 seconds input delay** - can be improved if you use DNS instead of onion services. It really depends on your Tor circuit. I have been able to use with 2-4 seconds.

Revision #2

Edited on
2022-09-22
Edited by user
deeplow
* Inspiration from this [guide](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/screen-share.md) and [this discussion](https://github.com/QubesOS/qubes-issues/issues/6426).* Inspiration from this [guide](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/screen-share.md) and [this discussion](https://github.com/QubesOS/qubes-issues/issues/6426). * byzanz developers, which made a tool that can be installed in dom0 through the repos and allows for creating gifs from dom0.