mirror of
https://github.com/tommytran732/QubesOS-Scripts
synced 2025-02-20 18:21:34 -05:00
Add qvm-screenshot-tool
Signed-off-by: Tommy <contact@tommytran.io>
This commit is contained in:
parent
150c4c5903
commit
39298bc952
@ -64,6 +64,20 @@ qubes.Gpg * thunderbird vault allow
|
|||||||
|
|
||||||
Note that I just use allow here, because the vault VM on a new Fedora 41 already prompts for confirmation, so I don't wanna have to answer yet another prompt from dom0.
|
Note that I just use allow here, because the vault VM on a new Fedora 41 already prompts for confirmation, so I don't wanna have to answer yet another prompt from dom0.
|
||||||
|
|
||||||
|
### qvm-screenshot-tool
|
||||||
|
|
||||||
|
```bash
|
||||||
|
sudo qubes-d0m-update zenity
|
||||||
|
```
|
||||||
|
|
||||||
|
Copy [this file](https://github.com/ben-grande/qubes-qvm-screenshot-tool/blob/master/qvm-screenshot) to `/usr/local/bin` in dom0.
|
||||||
|
|
||||||
|
```bash
|
||||||
|
sudo chmod +x /usr/local/bin
|
||||||
|
```
|
||||||
|
|
||||||
|
Set the `PrntSc` button to run `qvm-screenshot` in shortcut settings.
|
||||||
|
|
||||||
### Trivial data exfiltration prevention
|
### Trivial data exfiltration prevention
|
||||||
|
|
||||||
One trivial way for malicious applications to exfiltrate data from an offline VM is to open a link in a disposable VM with a payload. To prevent this, open the VM settings, go to advanced and set the default disposable template to none.
|
One trivial way for malicious applications to exfiltrate data from an offline VM is to open a link in a disposable VM with a payload. To prevent this, open the VM settings, go to advanced and set the default disposable template to none.
|
||||||
|
Loading…
Reference in New Issue
Block a user