Chromium
Using Chromium in Kicksecure.
Installation[edit]
One option might be to install using flatpak from flathub
. Special instructions are also required in this case.
Install org.chromium.Chromium
via flatpak.
1. Add a Flatpak repository.
A : Kicksecure
===Already enabled by default. (system-wide). No additional stepss needed to enable the Flathub repository.
B : Kicksecure-Qubes Template
===kicksecure-17
)Already enabled by default. (system-wide). No additional stepss needed to enable the Flathub repository.
C : Kicksecure-Qubes App Qube
kicksecure
)The user needs to Enable the Flathub Repository . Must be enabled per-user.
2. Install the flatpak org.chromium.Chromium
package.
B : Kicksecure-Qubes Template
===Kicksecure-Qubes Template (kicksecure-17
) [2]
Note: Advanced users that uninstalled the qubes-core-agent-passwordless-sudo
package should see forum thread Warning: Flatpak system operation Deploy not allowed for user.
http_proxy=http://127.0.0.1:8082 https_proxy=$http_proxy flatpak install flathub org.chromium.Chromium
C : Kicksecure-Qubes App Qube
Kicksecure-Qubes App Qube (kicksecure
) [3]
flatpak --user remote-add --if-not-exists flathub https://dl.flathub.org/repo/flathub.flatpakrepo
flatpak --user install flathub org.chromium.Chromium
3. Done.
The procedure of installing org.chromium.Chromium
is complete.
4. Upgrades notice.
Note: this procedure will not keep the software up-to-date. How to update installation installed by flatpak is also documented on the Operating System Software and Updates wiki page.
Usage[edit]
flatpak run org.chromium.Chromium
Update[edit]
- Kicksecure: flatpak update
- Kicksecure for Qubes Template: http_proxy=http://127.0.0.1:8082 https_proxy=http://127.0.0.1:8082 flatpak update
Qubes Specific[edit]
flatpak installed applications do not show up in Qubes start menu
Related[edit]
- Chrome
- Dev/Chromium
- Dev/Default Browser
- Chromium Browser for Kicksecure Discussions (not Whonix)
- Google Chrome Repository Insecurity
- Firefox
Footnotes[edit]
- ↑
Kicksecure:
- system-wide (requires administrative ("root") rights) (compatible with noexec): flatpak install flathub {{{package}}}
- per-user (no administrative rights required) (probably not compatible with noexec): flatpak --user install flathub {{{package}}}
- <>usability:</> Flathub is enabled by default system-wide but not per-user.
- multi-user: On a multi-user system (probably if multiple human users use the same computer, which is rare nowadays), system-wide might be preferable as this saves disk space.
- At preset: Does not make any difference.
- Future-proof: Per-user might be more future-proof. It would be compatible with future Kicksecure security improvements Dev/boot_modes (strong user account isolation). However, noexec for the home folder is to be considered later, at which point this documentation needs to be updated once that has been implemented.
- ↑
Kicksecure-Qubes Template:
flatpak
cannot be used with the--user
option. This is because in case of using a Qubes Template, the flatpak needs to be installed system-wide into the/var/lib/flatpak
folder. This is due to Qubes Persistence. If the--user
option was used, the flatpak would only be available in the Template's home folder but not in any App Qube based on that Template, because App Qubes have their own independent home folder. - ↑
Kicksecure-Qubes App Qube:
flatpak
should be used with the--user
option. This is because in case of using an App Qube, the flatpak needs to be installed per-user only into the~/.local/share/flatpak
folder and not system-wide. This is due to Qubes Persistence. If the--user
option was not used, the flatpak would only be available in the App Qube's non-persistent/var/lib/flatpak
folder located in the root image. - ↑ flatpak run org.chromium.Chromium --password-store=basic
We believe security software like Kicksecure needs to remain Open Source and independent. Would you help sustain and grow the project? Learn more about our 12 year success story and maybe DONATE!