diff --git a/customization/disposablevm-customization.md b/customization/disposablevm-customization.md index 361243a0..2a482455 100644 --- a/customization/disposablevm-customization.md +++ b/customization/disposablevm-customization.md @@ -246,6 +246,15 @@ Using DisposableVMs in this manner is ideal for untrusted qubes which require pe [user@dom0 ~]$ qvm-prefs disp-sys-usb autostart true 7. Users should now follow instructions on [How to hide USB controllers from dom0](/doc/usb/#how-to-hide-all-usb-controllers-from-dom0) +8. At this point your mouse may not work. In which case you should follow this qubes guide https://www.qubes-os.org/doc/usb/ + +Edit the qubes.InputMouse policy file in dom0, which is located here: + +/etc/qubes-rpc/policy/qubes.InputMouse + +Add a line like this to the top of the file: + +disp-sys-usb dom0 allow,user=root #### Starting the DisposableVMs ####