1
0
mirror of https://github.com/tommytran732/QubesOS-Scripts synced 2024-11-22 01:41:34 -05:00

Update dom0.sh

This commit is contained in:
Tommy 2022-05-24 07:10:47 -04:00 committed by GitHub
parent 34cf913810
commit e2e42908a7
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -14,4 +14,4 @@ echo "export export QT_QPA_PLATFORMTHEME=gtk2" | sudo tee /etc/environment
#I am using the sys-usb VM for GPG here because I am using a PGP smartcard. You probably shouldn't do this if you store your GPG private key on disk. It **might** be safer to still have a dedicated gpg-backend VM for this, but then you will have to reassign the smartcard to the VM after every boot, which could be annoying. #I am using the sys-usb VM for GPG here because I am using a PGP smartcard. You probably shouldn't do this if you store your GPG private key on disk. It **might** be safer to still have a dedicated gpg-backend VM for this, but then you will have to reassign the smartcard to the VM after every boot, which could be annoying.
echo "emails sys-usb allow" >> /etc/qubes-rpc/policy/qubes.Gpg echo "emails sys-usb allow" >> /etc/qubes-rpc/policy/qubes.Gpg
echo "@anyvm @anyvm ask,default_target=work-gpg" >> /etc/qubes-rpc/policy/qubes.Gpg echo "@anyvm @anyvm ask,default_target=sys-usb" >> /etc/qubes-rpc/policy/qubes.Gpg