jacoblor...@gmail.com:
in Qubes VM Manager select View > NetVM if it is not selected. Then you
can easily see the networking status of all your qubes. Change them as
you desire (right-click, VM Settings > NetVM).
Then in Qubes VM Manager go to System > Global Settings and change the
system defaults to whatever you want -- specifically for UpdateVM,
default netVM.
The installation option does not lead Qubes to "use tor for everything",
it just makes your default netvm sys-whonix for newly created
qubes/AppVMs and makes sys-whonix the netvm of templates. Whenever you
create a new qube / AppVM you can still select what you want the
networking to be.
If you selected Qubes to create default qubes like personal, banking,
untrusted, vault, these all come with non-torified networking
(sys-firewall x 3, and none respectively).
The language/description in the installer could be improved, the
relevant issue is here:
https://github.com/QubesOS/qubes-issues/issues/2604#issuecomment-275567972
--
Michael Carbone
Qubes OS |
https://www.qubes-os.org
@QubesOS <
https://www.twitter.com/QubesOS>
PGP fingerprint: D3D8 BEBF ECE8 91AC 46A7 30DE 63FC 4D26 84A7 33B4