mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-05-03 15:25:03 -04:00
Update disposablevm-customization.md
This commit is contained in:
parent
7102d0817d
commit
d048740d01
1 changed files with 9 additions and 0 deletions
|
@ -246,6 +246,15 @@ Using DisposableVMs in this manner is ideal for untrusted qubes which require pe
|
|||
[user@dom0 ~]$ qvm-prefs disp-sys-usb autostart true
|
||||
|
||||
7. Users should now follow instructions on [How to hide USB controllers from dom0](/doc/usb/#how-to-hide-all-usb-controllers-from-dom0)
|
||||
8. At this point your mouse may not work. In which case you should follow this qubes guide https://www.qubes-os.org/doc/usb/
|
||||
|
||||
Edit the qubes.InputMouse policy file in dom0, which is located here:
|
||||
|
||||
/etc/qubes-rpc/policy/qubes.InputMouse
|
||||
|
||||
Add a line like this to the top of the file:
|
||||
|
||||
disp-sys-usb dom0 allow,user=root
|
||||
|
||||
|
||||
#### Starting the DisposableVMs ####
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue