This have many advantages: - prevent XSS (QubesOS/qubes-issues#1462) - use default browser instead of default HTML viewer - better qrexec policy control - easier to control where are opened files vs URLs For now allow only http(s):// and ftp:// addresses (especially prevent file://). But this list can be easily extended. QubesOS/qubes-issues#1462 Fixes QubesOS/qubes-issues#1487 |
||
|---|---|---|
| archlinux | ||
| autostart-dropins | ||
| debian | ||
| doc | ||
| misc | ||
| network | ||
| pkgs | ||
| qrexec | ||
| qubes-rpc | ||
| rpm_spec | ||
| vm-init.d | ||
| vm-systemd | ||
| .gitignore | ||
| debian-quilt | ||
| LICENSE | ||
| Makefile | ||
| Makefile.builder | ||
| series-debian-vm.conf | ||
| version | ||