Qubes-Community-Content/docs/common-tasks/setup-trezor-cryptocurrency-hardware-wallet.md

30 lines
1.2 KiB
Markdown
Raw Normal View History

2021-08-27 11:52:31 +00:00
## Setting up a Trezor cryptocurrency hardware wallet in Qubes
using a Fedora-based sys-usb VM and a Whonix WS-based application VM:
2021-08-27 12:04:10 +00:00
- navigate to the [Trezor instructions](https://wiki.trezor.io/Qubes_OS) page and read them. They are more frequently updated than this document.
2021-08-27 11:52:31 +00:00
- in dom0:
`sudo vim /etc/qubes-rpc/policy/trezord-service`
add this line:
`$anyvm $anyvm allow,user=trezord,target=sys-usb`
replace `sys-usb` with `disp-sys-usb` if you are using a disposable sys-usb
- in the sys-usb VM, or for disp-sys-usb, the VM on which it is based
(in both cases, assumed to use a fedora-3x template):
`sudo mkdir /usr/local/etc/qubes-rpc`
`sudo vim /usr/local/etc/qubes-rpc/trezord-service`
and add this line to trezord-service:
`socat - TCP:localhost:21325`
- in the whonix-based application VM:
`pip3 install --user trezor`
`sudo vim /rw/config/rc.local`
add this line (note the "&" at the end):
`socat TCP-LISTEN:21325,fork EXEC:"qrexec-client-vm sys-usb trezord-service" &`
- in the fedora-3x template:
`sudo dnf install trezor-common`
- download the bridge RPM from
https://wallet.trezor.io/#/bridge
and remember to verify it!
- copy to fedora-3x
- in fedora-3x
`sudo rpm -i /path/to/trezor.rpm`