1
0
mirror of https://github.com/tommytran732/QubesOS-Scripts synced 2024-11-09 04:11:32 -05:00

Remove mentions of removed stuff

Signed-off-by: Tommy <contact@tommytran.io>
This commit is contained in:
Tommy 2024-04-28 14:22:17 -07:00
parent a5c22bbff2
commit a92c7efe09
Signed by: Tomster
GPG Key ID: 555C902A34EC968F

View File

@ -1,12 +1,10 @@
# QubesOS-Scripts
My scripts for setting up QubesOS.
Running these scripts should be very straight forward. For the default Fedora template, run fedora.sh to trim it down first. For the Debian template, run kicksecure.sh to trim them down and convert them to KickSecure.
Running these scripts should be very straight forward. For the default Fedora template, run fedora.sh to trim it down first.
After you are done running those scripts, any other script can be used in a different template based on those trimmed down templates to create their respective virtual machines.
I have a script to create a Brave VM based on the normal Fedora template. The idea behind this is that you would want to use a disposable Brave VM for web browsing most of the time, and have it seperated from your AppVM. If you try to visit a link inside of an AppVM without a browser, qubes will launch a browser inside of a disposable VM for you. Of course, for VMs where you want the browser to stay persistent, you can just base it on the Brave template instead.
If you want to install Flatpak packages, install them inside of an AppVM as a **user Flatpak** and enable the update-user-flatpaks.service as a **user** systemd service for automatic updates.
It is recommended that you follow the docs [here](https://www.qubes-os.org/doc/vm-sudo/#replacing-passwordless-root-access-with-dom0-user-prompt) to make a prompt for root access on non-minimal VMs. dom0.sh already takes care dom dom0 so you only need to worry about the guests.