Add Disposable Qubes file access note

Signed-off-by: Tommy <contact@tommytran.io>
This commit is contained in:
Tommy 2025-05-24 20:00:02 -04:00 committed by GitHub
parent 21a6334632
commit f05e5e3973
No known key found for this signature in database
GPG key ID: B5690EEEBB952194

View file

@ -87,6 +87,12 @@ Set the `PrntSc` button to run `qvm-screenshot` in shortcut settings.
One trivial way for malicious applications to exfiltrate data from an offline VM is to open a link in a disposable VM with a payload. To prevent this, open Qubes Global Config -> URL handing -> All Qubes will ask and default to Default Disposable Template.
### Disposable Qubes file access
Although not as important security wise, it is nice to also set similar rules for file access as well.
Qubes Global Config -> File Access -> Open in Disposable Qubes -> All Qubes will ask and defailt to Default Disposable Templatte.
### Edge Dark Mode
Go to `edge://flags` and set "Auto Dark Mode for Web Contents" to "Enable with selective inversion of non-image elements". This reduces flashbangs a lot.