Skip to content

Instantly share code, notes, and snippets.

View tlaurion's full-sized avatar

Thierry Laurion tlaurion

View GitHub Profile
@tlaurion
tlaurion / PrivacyBeast_Restore_Qubes_from_Tails
Last active January 18, 2022 15:36
PrivacyBeast script to restore to deployed OEM disk state
#!/bin/bash
#
#GENERAL PATHS
INSTALL_DISK="/dev/sda"
WYNG_BACKUPS_ARCHIVE_DIR="/media/wyng-backups/home/user/wyng-backups/wyng.backup"
QUBES_VM_POOL="/dev/qubes_dom0"
OEM_MOUNT="/media/wyng-backups/home/user/"
GPG_OEM_KEY="/media/wyng-backups/home/user/Insurgo_2022-06-15.asc"
@tlaurion
tlaurion / Docker-on-qubes.md
Last active September 12, 2020 16:50 — forked from xahare/Docker-on-qubes.md
How to run docker on Qubes-OS

Docker on Qubes

As of qubes 4.x and docker 19+, the below method now works again. Debian-10 added with bind-dir hack works out of the box again. Dont know about other templates.

(Docker)[https://www.docker.com] a software container platform. You may have heard of it.

(Qubes-OS)[https://www.qubes-os.org] "A Reasonably Secure Operating System"

It takes a little work to get Docker running on qubes because you have to modify a templatevm. But, once you do it, you have the ease of compartmentalization qubes is famous for.

@tlaurion
tlaurion / qvm-portfwd-iptables
Created November 20, 2018 15:54 — forked from Joeviocoe/qvm-portfwd-iptables
Qubes-os port forwarding to allow external connections
#!/bin/sh
# Inspired by https://gist.github.com/daktak/f887352d564b54f9e529404cc0eb60d5
# Inspired by https://gist.github.com/jpouellet/d8cd0eb8589a5b9bf0c53a28fc530369
ip() { qvm-prefs -g -- "$1" ip; }
netvm() { qvm-prefs -g -- "$1" netvm; }
forward() {
local from_domain=$1
local to_domain=$2
@tlaurion
tlaurion / qvm-port-forward.sh
Created November 15, 2018 20:56 — forked from Ashaman-/qvm-port-forward.sh
Forwards a specified port to a specified VM, auto-detecting its NetVM chain. (Qubes OS)
#!/bin/sh
# Inspired by https://gist.github.com/daktak/f887352d564b54f9e529404cc0eb60d5
ip() { qvm-ls --fields ip --raw-data -- "$1"; }
netvm() { qvm-prefs -g -- "$1" netvm; }
forward() {
local from_domain=$1
local to_domain=$2