Scripts for setting up QubesOS
Go to file
2022-05-26 18:09:59 -04:00
fedora Remove cups 2022-05-26 18:03:00 -04:00
fedora-brave Kicksecure 2022-05-26 16:43:33 -04:00
kicksecure Typos 2022-05-26 18:09:59 -04:00
kicksecure-minimal Typos 2022-05-26 18:09:59 -04:00
dom0.sh More fixes 2022-05-26 17:41:00 -04:00
LICENSE Initial commit 2022-02-03 02:57:15 -05:00
README.md kickseucre 2022-05-26 13:50:11 -04:00
whonix-hardening.sh kickseucre 2022-05-26 13:50:11 -04:00

QubesOS-Scripts

My scripts for setting up QubesOS. Read the scripts and adjust them to your needs, don't just blindly run them. Note that the scripts do not disable passwordless sudo. If you want to do it, follow https://www.qubes-os.org/doc/vm-sudo/ and set it up on the Fedora and Debian templates before using my scripts. The purpose of this is to hopefully get a bit better protection against VM escapes (as an attacker would need to both get root privilege in the VM and exploit a bug in the Qubes agents or Xen hypervisor).