mirror of
https://github.com/ben-grande/qusal.git
synced 2024-12-25 23:49:39 -05:00
422b01e0f6
Decrease audio attack surface to qubes that will never need to use it. |
||
---|---|---|
.. | ||
files | ||
clone.sls | ||
clone.top | ||
configure.sls | ||
configure.top | ||
create.sls | ||
create.top | ||
init.top | ||
install.sls | ||
install.top | ||
README.md |
media
Media opener through disposables in Qubes OS.
Table of Contents
Description
Creates the offline "media" qube for storing multimedia files and open the files in a named disposable "disp-media" via MIME configuration.
Installation
- Top:
qubesctl top.enable media
qubesctl --targets=tpl-media,media state.apply
qubesctl top.disable media
- State:
qubesctl state.apply media.create
qubesctl --skip-dom0 --targets=tpl-media state.apply media.install
qubesctl --skip-dom0 --targets=media state.apply media.configure
Usage
You will store multimedia files in the "media" qube. When you try to open a file in that qube, it will open instead in the disposable "disp-media".
No file browser is installed in the "media" qube as code execution exploits in
file browsers are common when rendering thumbnails, indexing file name,
automatically running scripts saved in the home directory. You are open to
forward files from the "media" qube to "disp-media" by running xdg-open /path/file
or more explicitly, qvm-open-in-dvm /path/file
.