Qubes-VM-hardening/debian/control

19 lines
657 B
Plaintext
Raw Normal View History

2019-09-02 08:50:18 -04:00
Source: Qubes-VM-hardening
Section: admin
Priority: optional
Maintainer: Christopher Laprise <tasket@protonmail.com>
Build-Depends: debhelper (>= 10)
Standards-Version: 4.1.2
Homepage: https://www.qubes-os.org
Package: qubes-vm-hardening
Architecture: all
Depends: ${misc:Depends} qubes-core-agent
Description: Prevent malware persistence in Qubes virtual machines.
Reconfigures Qubes VM templates to block casual sudo access,
protects user startup scripts, and includes a service that can
quarantine, whitelist and check file hashes at startup before
the /rw volume comes online.
See https://www.github.com/tasket/Qubes-VM-hardening for more info.