mirror of
https://github.com/tommytran732/QubesOS-Scripts.git
synced 2025-06-24 22:30:33 -04:00
Better trivial data exfil mitigation
Thanks to @mintpilo for telling about this Signed-off-by: Tommy <contact@tommytran.io>
This commit is contained in:
parent
2fbeda90a9
commit
21a6334632
1 changed files with 2 additions and 2 deletions
|
@ -85,7 +85,7 @@ Set the `PrntSc` button to run `qvm-screenshot` in shortcut settings.
|
|||
|
||||
### Trivial data exfiltration prevention
|
||||
|
||||
One trivial way for malicious applications to exfiltrate data from an offline VM is to open a link in a disposable VM with a payload. To prevent this, open the VM settings, go to advanced and set the default disposable template to none.
|
||||
One trivial way for malicious applications to exfiltrate data from an offline VM is to open a link in a disposable VM with a payload. To prevent this, open Qubes Global Config -> URL handing -> All Qubes will ask and default to Default Disposable Template.
|
||||
|
||||
### Edge Dark Mode
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue