1
0
mirror of https://github.com/tommytran732/QubesOS-Scripts synced 2025-02-20 18:21:34 -05:00

Compare commits

..

No commits in common. "7bba86e169f46c53d518de3a509facce653a7028" and "150c4c590334967da471ec0eff5047c06cf745ce" have entirely different histories.

View File

@ -64,27 +64,13 @@ qubes.Gpg * thunderbird vault allow
Note that I just use allow here, because the vault VM on a new Fedora 41 already prompts for confirmation, so I don't wanna have to answer yet another prompt from dom0.
### qvm-screenshot-tool
```bash
sudo qubes-d0m-update zenity
```
Copy [this file](https://github.com/ben-grande/qubes-qvm-screenshot-tool/blob/master/qvm-screenshot) to `/usr/local/bin` in dom0.
```bash
sudo chmod +x /usr/local/bin
```
Set the `PrntSc` button to run `qvm-screenshot` in shortcut settings.
### Trivial data exfiltration prevention
One trivial way for malicious applications to exfiltrate data from an offline VM is to open a link in a disposable VM with a payload. To prevent this, open the VM settings, go to advanced and set the default disposable template to none.
### Edge Dark Mode
Go to `edge://flags` and set "Auto Dark Mode for Web Contents" to "Enable with selective inversion of non-image elements". This reduces flashbangs a lot.
Go to edge://flags and set "Auto Dark Mode for Web Contents" to "Enable with selective inversion of non-image elements". This reduces flashbangs a lot.
### Bitwarden & Element Flatpak