Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upDisable speaker output for Whonix WS-based AppVMs by default #2724
Comments
rootkovska
added
C: Whonix
enhancement
privacy
labels
Mar 23, 2017
rootkovska
added this to the Release 3.2 updates milestone
Mar 23, 2017
adrelanos
referenced this issue
Jun 3, 2017
Open
Document qubes.PostInstall service, `/etc/qubes/post-install.d`, qvm-features-request #2829
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
rootkovska commentedMar 23, 2017
To prevent them from communicating to other mic-equipped devices and deanonymizing the user. (Note we do not expose mic to any AppVM by default since forever.)
Seems like we can easily do that during installation via Salt config. But maybe consider also some runtime check to ensure this also (in Qubes 4.x)?
/cc @adrelanos