1
0
mirror of https://github.com/tommytran732/QubesOS-Scripts synced 2024-09-19 15:14:43 -04:00

Update README.md

This commit is contained in:
Tommy 2022-05-25 04:27:15 -04:00 committed by GitHub
parent 97c298473c
commit 6a261d047e
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -2,6 +2,6 @@
My scripts for setting up QubesOS. Read the scripts and adjust them to your needs, don't just blindly run them.
1. Run dom0.sh script to set up dom0
2. Download the Fedora Minimal template and use the Fedora Minimal scripts to create TemplateVMs based on it. The most important thing here is that you replace sys-net and sys-firewall with a minimal version for attack surface reduction. I have been trying to create a minimal template for ProtonVPN, but haven't been able to so far. Any help with this would be appreciated.
2. Download the Fedora Minimal template and use the fedora-minimal.sh script to do basic configuration. Then, create TemplateVMs based on it. The most important thing here is that you replace sys-net and sys-firewall with a minimal version for attack surface reduction. I have been trying to create a minimal template for ProtonVPN, but haven't been able to so far. Any help with this would be appreciated.
3. Run the fedora.sh script to trim down the default Fedora template and do basic configuration. The script includes a systemd user timer `update-user-flatpaks.timer` that you can manually enable on AppVMs. Firefox is also replaced with Brave. Other TemplateVMs should be based on the trimmed down Fedora template.
4. Run the whonix_hardening.sh script on both the Whonix Gateway and Workstation templates to enable experimental hardening features.