mirror of
https://github.com/tommytran732/QubesOS-Scripts.git
synced 2025-06-25 06:40:33 -04:00
Better trivial data exfil mitigation
Thanks to @mintpilo for telling about this Signed-off-by: Tommy <contact@tommytran.io>
This commit is contained in:
parent
2fbeda90a9
commit
21a6334632
1 changed files with 2 additions and 2 deletions
|
@ -85,7 +85,7 @@ Set the `PrntSc` button to run `qvm-screenshot` in shortcut settings.
|
||||||
|
|
||||||
### Trivial data exfiltration prevention
|
### Trivial data exfiltration prevention
|
||||||
|
|
||||||
One trivial way for malicious applications to exfiltrate data from an offline VM is to open a link in a disposable VM with a payload. To prevent this, open the VM settings, go to advanced and set the default disposable template to none.
|
One trivial way for malicious applications to exfiltrate data from an offline VM is to open a link in a disposable VM with a payload. To prevent this, open Qubes Global Config -> URL handing -> All Qubes will ask and default to Default Disposable Template.
|
||||||
|
|
||||||
### Edge Dark Mode
|
### Edge Dark Mode
|
||||||
|
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue