Better trivial data exfil mitigation

Thanks to @mintpilo for telling about this

Signed-off-by: Tommy <contact@tommytran.io>
This commit is contained in:
Tommy 2025-05-23 03:01:39 -04:00 committed by GitHub
parent 2fbeda90a9
commit 21a6334632
No known key found for this signature in database
GPG key ID: B5690EEEBB952194

View file

@ -85,7 +85,7 @@ Set the `PrntSc` button to run `qvm-screenshot` in shortcut settings.
### Trivial data exfiltration prevention
One trivial way for malicious applications to exfiltrate data from an offline VM is to open a link in a disposable VM with a payload. To prevent this, open the VM settings, go to advanced and set the default disposable template to none.
One trivial way for malicious applications to exfiltrate data from an offline VM is to open a link in a disposable VM with a payload. To prevent this, open Qubes Global Config -> URL handing -> All Qubes will ask and default to Default Disposable Template.
### Edge Dark Mode