From f05e5e39737a5413032600a93999cae45698504e Mon Sep 17 00:00:00 2001 From: Tommy Date: Sat, 24 May 2025 20:00:02 -0400 Subject: [PATCH] Add Disposable Qubes file access note Signed-off-by: Tommy --- Quality of Life.md | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/Quality of Life.md b/Quality of Life.md index bc6cb65..42135d5 100644 --- a/Quality of Life.md +++ b/Quality of Life.md @@ -87,6 +87,12 @@ Set the `PrntSc` button to run `qvm-screenshot` in shortcut settings. One trivial way for malicious applications to exfiltrate data from an offline VM is to open a link in a disposable VM with a payload. To prevent this, open Qubes Global Config -> URL handing -> All Qubes will ask and default to Default Disposable Template. +### Disposable Qubes file access + +Although not as important security wise, it is nice to also set similar rules for file access as well. + +Qubes Global Config -> File Access -> Open in Disposable Qubes -> All Qubes will ask and defailt to Default Disposable Templatte. + ### Edge Dark Mode Go to `edge://flags` and set "Auto Dark Mode for Web Contents" to "Enable with selective inversion of non-image elements". This reduces flashbangs a lot.