This commit is contained in:
Tommy 2022-07-25 07:20:34 -04:00 committed by GitHub
parent ae9cfb965e
commit b3e151d9f5
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 1 additions and 62 deletions

View File

@ -8,4 +8,4 @@ gtk-theme='Arc-Dark'" | sudo tee /etc/dconf/db/local.d/custom
sudo dconf update sudo dconf update
sudo rm -rf /usr/share/icons/arc-icon-theme sudo rm -rf /usr/share/icons/Arc

View File

@ -1,15 +0,0 @@
#!/bin/bash
#This needs to be run as a standalone VM
#Also a couple of things:
#RiseUp does appear to be some sort of communist/socialist/anarchist activist organization, I am not really sure.
#I am not that much into politics, and I am certainly not an activist, so I don't really know or care much about any of this stuff.
#In any case, I only made this script because it is one of the few VPN (oh, free one too) that has a working client on QubesOS.
#Obfs4proxy support is also fancy, it may come in handy one day.
#Don't take this as my recommendation to use RiseUp because I have zero clue how trustworthy they are or if you are gonna paint a
#target on your back by associating with an organization promoting an ideology that your government doesn't like.
sudo dnf install -y snapd qubes-snapd-helper lxpolkit
sudo ln -s /var/lib/snapd/snap /snap
sudo snap install riseup-vpn --classic

View File

@ -1,31 +0,0 @@
#!/bin/bash
sudo apt install curl -y
#Adding KickSecure's signing key
curl --proxy http://127.0.0.1:8082/ --tlsv1.3 --proto =https --max-time 180 --output ~/derivative.asc https://www.kicksecure.com/derivative.asc
sudo cp ~/derivative.asc /usr/share/keyrings/derivative.asc
echo "deb [signed-by=/usr/share/keyrings/derivative.asc] https://deb.kicksecure.com bullseye main contrib non-free" | sudo tee /etc/apt/sources.list.d/derivative.list
sudo apt update
#Distribution morphing
sudo apt install --no-install-recommends kicksecure-qubes-cli -y
sudo apt autoremove -y
sudo mv /etc/apt/sources.list ~/
sudo touch /etc/apt/sources.list
#Enabling SUID Disabler and Permission Hardener
sudo systemctl enable --now permission-hardening
#Install LKRG
sudo apt install --no-install-recommends linux-headers-amd64 lkrg-dkms -y
#Enable hardened malloc
echo "/usr/lib/libhardened_malloc.so/libhardened_malloc.so" | sudo tee /etc/ld.so.preload
#Restrict /proc and access
sudo systemctl enable --now proc-hidepid.service
#Reduce kernel information leaks
#Will break a lot of applications. The apps I use on KickSecure work fine with it so I am enabling it.
sudo systemctl enable --now hide-hardware-info.service

View File

@ -1,15 +0,0 @@
#!/bin/bash
sudo apt install -y qubes-core-agent-networking qubes-core-agent-network-manager firmware-iwlwifi gnome-keyring arc-theme
sudo mkdir -p /etc/gtk-3.0
echo '[Settings]
gtk-theme-name=Arc-Dark
gtk-application-prefer-dark-theme=1
' | sudo tee /etc/gtk-3.0/settings.ini
sudo mkdir -p /etc/gtk-4.0
echo '[Settings]
gtk-theme-name=Arc-Dark
gtk-application-prefer-dark-theme=1
' | sudo tee /etc/gtk-4.0/settings.ini