From 39298bc9522a690d11585a6261fdf88dfbbf09dd Mon Sep 17 00:00:00 2001 From: Tommy Date: Tue, 18 Feb 2025 00:35:20 -0700 Subject: [PATCH] Add qvm-screenshot-tool Signed-off-by: Tommy --- Quality of Life.md | 14 ++++++++++++++ 1 file changed, 14 insertions(+) diff --git a/Quality of Life.md b/Quality of Life.md index fd7ec32..d873e28 100644 --- a/Quality of Life.md +++ b/Quality of Life.md @@ -64,6 +64,20 @@ qubes.Gpg * thunderbird vault allow Note that I just use allow here, because the vault VM on a new Fedora 41 already prompts for confirmation, so I don't wanna have to answer yet another prompt from dom0. +### qvm-screenshot-tool + +```bash +sudo qubes-d0m-update zenity +``` + +Copy [this file](https://github.com/ben-grande/qubes-qvm-screenshot-tool/blob/master/qvm-screenshot) to `/usr/local/bin` in dom0. + +```bash +sudo chmod +x /usr/local/bin +``` + +Set the `PrntSc` button to run `qvm-screenshot` in shortcut settings. + ### Trivial data exfiltration prevention One trivial way for malicious applications to exfiltrate data from an offline VM is to open a link in a disposable VM with a payload. To prevent this, open the VM settings, go to advanced and set the default disposable template to none.