1
0
mirror of https://github.com/tommytran732/QubesOS-Scripts synced 2025-02-20 18:21:34 -05:00

Compare commits

...

2 Commits

Author SHA1 Message Date
7bba86e169
Add highlighting
Signed-off-by: Tommy <contact@tommytran.io>
2025-02-18 01:03:15 -07:00
39298bc952
Add qvm-screenshot-tool
Signed-off-by: Tommy <contact@tommytran.io>
2025-02-18 00:35:20 -07:00

View File

@ -64,13 +64,27 @@ qubes.Gpg * thunderbird vault allow
Note that I just use allow here, because the vault VM on a new Fedora 41 already prompts for confirmation, so I don't wanna have to answer yet another prompt from dom0. Note that I just use allow here, because the vault VM on a new Fedora 41 already prompts for confirmation, so I don't wanna have to answer yet another prompt from dom0.
### qvm-screenshot-tool
```bash
sudo qubes-d0m-update zenity
```
Copy [this file](https://github.com/ben-grande/qubes-qvm-screenshot-tool/blob/master/qvm-screenshot) to `/usr/local/bin` in dom0.
```bash
sudo chmod +x /usr/local/bin
```
Set the `PrntSc` button to run `qvm-screenshot` in shortcut settings.
### Trivial data exfiltration prevention ### Trivial data exfiltration prevention
One trivial way for malicious applications to exfiltrate data from an offline VM is to open a link in a disposable VM with a payload. To prevent this, open the VM settings, go to advanced and set the default disposable template to none. One trivial way for malicious applications to exfiltrate data from an offline VM is to open a link in a disposable VM with a payload. To prevent this, open the VM settings, go to advanced and set the default disposable template to none.
### Edge Dark Mode ### Edge Dark Mode
Go to edge://flags and set "Auto Dark Mode for Web Contents" to "Enable with selective inversion of non-image elements". This reduces flashbangs a lot. Go to `edge://flags` and set "Auto Dark Mode for Web Contents" to "Enable with selective inversion of non-image elements". This reduces flashbangs a lot.
### Bitwarden & Element Flatpak ### Bitwarden & Element Flatpak