Example file for adding hardware function to Qubes (Qubes tablet touchscreen example) Qubes uses hardware isolation to enhance security - avoid usb passthrough for untrusted hardware
Go to file
user e5f89e3622 example file for touchscreen when setting up Qubes tablet 2023-08-28 00:54:28 -04:00
README.md example file for touchscreen when setting up Qubes tablet 2023-08-28 00:54:28 -04:00
qubes.InputTablet example file for touchscreen when setting up Qubes tablet 2023-08-28 00:54:28 -04:00

README.md

Provides an example config file used for x220 tablet running Qubes

In my case, the file was named qubes.InputTablet. Yours may be different if working on using another piece of hardware (keyboard, etc).

This file is for touchscreens, and a file should exist.

Check for access file in /etc/qubes-rpc/policy/qubes.InputTablet

Save the file edit (hash out your old config to save reference), and reboot Qubes

In the example config file, there are hashed out lines. These lines represent a permission based access control

The unhashed line is what is used for touchscreen function "out of box" across all VM's


READ MORE QUBES DOCUMENTATION: https://qubes-os/doc


CONTACT RTP: righttoprivacy[at]i2pmail.org / righttoprivacy[at]tutanota.com

BLOG: https://bmc.link/politictech/posts