Scripts for setting up QubesOS
Go to file
Tommy c2093a9715
Enforce connection padding
Signed-off-by: Tommy <contact@tommytran.io>
2024-05-19 02:06:09 -07:00
debian-gnome Rename files 2024-05-17 10:43:01 -07:00
etc Fix IVPN for chaining 2024-05-17 02:26:21 -07:00
fedora-gnome Move DNF down 2024-05-17 06:41:42 -07:00
fedora-minimal unpriv curl for minimal VMs 2024-05-16 22:47:39 -07:00
whonix Enforce connection padding 2024-05-19 02:06:09 -07:00
.gitignore Create .gitignore 2023-01-16 00:39:37 -05:00
dom0.sh Readd qt5-qtstyleplugins 2024-05-16 17:27:09 -07:00
LICENSE Initial commit 2022-02-03 02:57:15 -05:00
README.md Typo fix 2024-04-28 14:25:32 -07:00
Shortcuts.md Shortcuts for Lenovo ePrivacy 2024-05-01 06:47:53 -07:00

QubesOS-Scripts

My scripts for setting up QubesOS.

Running these scripts should be very straight forward. For the default Fedora template, run fedora-gnome.sh to trim it down first.

After you are done running those scripts, any other script can be used in a different template based on those trimmed down templates to create their respective virtual machines.

If you want to install Flatpak packages, install them inside of an AppVM as a user Flatpak and enable the update-user-flatpaks.service as a user systemd service for automatic updates.

It is recommended that you follow the docs here to make a prompt for root access on non-minimal VMs. dom0.sh already takes care dom dom0 so you only need to worry about the guests.