You know any good site out there? And how do i add them in Qubes? Thank you
Hi @b4xqrm7nti. Websites to find wallpapers are outside of scope of this forum (there are plenty of answers on that already on the internet).
you should keep in mind that background colors may affect your ability to disabiguate qubeās border colors. I donāt know if this is well studied, but I would encourage using either light or dark wallpapers.
A) Using the default wallpapers (easy and safe)
A lot of amazing qubes artwork already exists in dom0 in the folder (/usr/share/backgrounds/
).
Just open the Settings Manager
application in dom0 Ā» Desktop
And then set the Folder:
to /usr/share/backgrounds/
.
B) Downloading from the internet
1. Moving image to dom0
Option a) - safest
The safest way is to open it in full screen from within a qube and then use the dom0 screenshot application to take a pic of the wallpaper. It will be saved on your pictures folder (/home/user/Pictures
).
Option b) - discouraged but is āprettierā
You download the files from a qube and then move it to dom0. Itās not technically easy but you can consult it here. The security downside is that you are copying an untrusted image from the internet onto the most trusted component of Qubes (dom0)ā¦
2. Setting background
See path A)
but set the Folder
to wherever in dom0 you downloaded it.
Thanks. Yeah, but itās a pictureā¦ Are there many exploits today in pictures or what? Iām not that paranoid, but itās good to know. Thanks for your reply! I need some more wallpapers in this cool OS.
I found this now randomlyā¦ Some people in here might like cubes.
Yes, there are:
https://www.pcworld.com/article/2105408/watch-out-for-photos-containing-malware.html
https://www.opswat.com/blog/image-borne-malware-how-viewing-image-can-infect-device
There are many more I can post, and this is just from the top results of searches such as āhiding malware in jpegsā and āmalicious image attackā, but the point is that this is old hat for even moderately sophisticated everyday attackers, the sort that go after your Instagram account or credit card informationānot truly sophisticated APTs with nearly unlimited budgets. When considered in the context of NSA capabilities, which includes exploiting network race conditions in-transit and injecting malware into packets after they leave the server but before they arrive to you or by intercepting the request altogether1, image-based exploits that take over dom0 through a wallpaper you downloaded off the Internet is entirely within the realm of possibility.
If your threat model includes such expensive and targeted attacks from nation-state adversaries, even if only because your use of Qubes OS already sets you up as potential ācollateral damageā of any nation-state attack on Qubes users generally, then not even your wallpaper is safe.
Remember: images and even text are not just images and text, but code that must be rendered by your computer and so can be exploited during that process. Simply loading an image or running unsafe text containing malicious code, even without further user interaction, can be sufficient to trigger an exploit chain that infects your computer. While they are rare and sophisticated, they can and do occur.
Regards,
John
1 One example is QUANTUM, which was used in conjunction with FOXACID to successfully attack Tor users. From Schneierās blog:
Expand to see full quote
Highly related:
Just found out about dom0 terminal command qvm-get-image
. Apparently it converts an image to trusted.
This link doesnāt work for me
Out of curiosity, would would it be āprettierā? If the image is fullscreen and not resized or compressed when the screenshot is taken, it should be pixel perfect.
If you can get it in those conditions, it does work perfect. However, wallpapers in a non-standard size will have a scrollbar on one or both of the edges in the screenshot, and since youāre working in dom0 I donāt think thereās a way to crop them out.
No idea why my 2-years-ago self thought that