422b01e0f6
Decrease audio attack surface to qubes that will never need to use it. |
||
---|---|---|
.. | ||
appmenus.sls | ||
appmenus.top | ||
clone.sls | ||
clone.top | ||
create.sls | ||
create.top | ||
init.top | ||
install.sls | ||
install.top | ||
README.md |
reader
Reader environment as the default_dispvm in Qubes OS.
Table of Contents
Description
Create a disposable template for reading documents and viewing images called "dvm-reader". It is designated to be the "default_dispvm", because of this, there is no "netvm", but if you assign one, you will get networking as the necessary packages will be installed in the template.
Installation
- Top:
qubesctl top.enable reader
qubesctl --targets=tpl-reader state.apply
qubesctl top.disable reader
qubesctl state.apply reader.appmenus
- State:
qubesctl state.apply reader.create
qubesctl --skip-dom0 --targets=tpl-reader state.apply reader.install
qubesctl state.apply reader.appmenus
Usage
The intended usage of this qube is a receiver of incoming files that the call
originator/client did no trust to open in its environment. When you run
qvm-open-in-dvm
from a qube and it is using the global preferences default
default_dispvm
, it will open the file to be read in a disposable based on
dvm-reader
.
By default, there is no netvm
, thus allowing you to set the networking chain
you want before the disposable makes a connection.