mirror of
https://github.com/tommytran732/QubesOS-Scripts
synced 2025-02-20 18:21:34 -05:00
Compare commits
2 Commits
7bba86e169
...
014e7254d0
Author | SHA1 | Date | |
---|---|---|---|
014e7254d0 | |||
26350db28f |
@ -67,10 +67,10 @@ Note that I just use allow here, because the vault VM on a new Fedora 41 already
|
||||
### qvm-screenshot-tool
|
||||
|
||||
```bash
|
||||
sudo qubes-d0m-update zenity
|
||||
sudo qubes-d0m-update maim zenity
|
||||
```
|
||||
|
||||
Copy [this file](https://github.com/ben-grande/qubes-qvm-screenshot-tool/blob/master/qvm-screenshot) to `/usr/local/bin` in dom0.
|
||||
Copy [this file](https://github.com/ben-grande/qubes-qvm-screenshot-tool/blob/master/qvm-screenshot) to `/usr/local/bin` in dom0. Maim is needed until [this issue](https://github.com/ben-grande/qubes-qvm-screenshot-tool/issues/1) is resolved.
|
||||
|
||||
```bash
|
||||
sudo chmod +x /usr/local/bin
|
||||
@ -86,6 +86,12 @@ One trivial way for malicious applications to exfiltrate data from an offline VM
|
||||
|
||||
Go to `edge://flags` and set "Auto Dark Mode for Web Contents" to "Enable with selective inversion of non-image elements". This reduces flashbangs a lot.
|
||||
|
||||
### Firefox based browsers
|
||||
|
||||
Currently Firefox based browsers [will break](https://github.com/QubesOS/qubes-issues/issues/8612#issuecomment-1764832181) when you try to open a YouTube video in fullscreen if their window is maximized. To workaround this, set `full-screen-api.ignore-widgets` in `about:config` to true.
|
||||
|
||||
I have no idea if this will make you more fingerprintable or not.
|
||||
|
||||
### Bitwarden & Element Flatpak
|
||||
|
||||
These apps require the keyring to be created first to work properly. Simply open a browser like Microsoft Edge and set an empty password for the keyring before using them.
|
||||
|
Loading…
Reference in New Issue
Block a user