http://www.buskillvampfih2iucxhit3qp36i2zzql3u6pmkeafvlxs3tlmot5yad.onion/qubes-disarm
It’s important to keep in mind that, in QubesOS The keyboard and UI are configured in ‘ dom0' USB devices (like the BusKill device) are routed to the ‘ sys-usb ‘ VM dom0 has the privilege to execute scripts inside other VMs (eg ‘ sys-usb ‘) By design, VMs should *not* be able to send arbitrary commands to be executed in dom0 …but via the qubes-rpc , we can permit some VMs (eg ‘ sys-usb ‘) to execute a script in dom0 (though for security reasons, ideally such that no data/input is sent from...