mirror of
https://github.com/tommytran732/QubesOS-Scripts.git
synced 2025-06-29 16:47:19 -04:00
Add Disposable Qubes file access note
Signed-off-by: Tommy <contact@tommytran.io>
This commit is contained in:
parent
21a6334632
commit
f05e5e3973
1 changed files with 6 additions and 0 deletions
|
@ -87,6 +87,12 @@ Set the `PrntSc` button to run `qvm-screenshot` in shortcut settings.
|
|||
|
||||
One trivial way for malicious applications to exfiltrate data from an offline VM is to open a link in a disposable VM with a payload. To prevent this, open Qubes Global Config -> URL handing -> All Qubes will ask and default to Default Disposable Template.
|
||||
|
||||
### Disposable Qubes file access
|
||||
|
||||
Although not as important security wise, it is nice to also set similar rules for file access as well.
|
||||
|
||||
Qubes Global Config -> File Access -> Open in Disposable Qubes -> All Qubes will ask and defailt to Default Disposable Templatte.
|
||||
|
||||
### Edge Dark Mode
|
||||
|
||||
Go to `edge://flags` and set "Auto Dark Mode for Web Contents" to "Enable with selective inversion of non-image elements". This reduces flashbangs a lot.
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue