Fixed some typo, linked two tutorials

This commit is contained in:
prism_breaker 2024-12-17 12:57:44 +00:00
parent 7e8c396947
commit 05eec9bc47

View file

@ -64,7 +64,7 @@
<h1>Qubes OS guide </h1> <h1>Qubes OS guide </h1>
<p>Official site of Qubes OS <a href="https://www.qubes-os.org">https://www.qubes-os.org</a></p> <p>Official site of Qubes OS <a href="https://www.qubes-os.org">https://www.qubes-os.org</a></p>
<p>When you land into this tutorial, I assume you already have some Linux experience, if not this might not be suitable for you, since Qubes OS is not very user friendly. I recommend you to try some normal Linux distribution first <a href="../linux/index.html">How to Install Linux as a beginner</a></p> <p>When you land into this tutorial, I assume you already have some Linux experience, if not this might not be suitable for you, since Qubes OS is not very user friendly. I recommend you to try some normal Linux distribution first <a href="../linux/index.html">How to Install Linux as a beginner</a></p>
<p>Qubes OS is a very cutting edge OS that uses virtualization everywhere to compartmentalize your digital life. It is technically not a Linux distribution, it is built on Xen which is a type 1 hypervisor that runs bare metal, <a href="https://en.wikipedia.org/wiki/Xen">https://en.wikipedia.org/wiki/Xen</a></p> <p>Qubes OS is a very cutting edge OS that uses virtualization everywhere to compartmentalize your digital life. It is technically not a Linux distribution, it is built on Xen which is a type 1 hypervisor that runs on bare metal, <a href="https://en.wikipedia.org/wiki/Xen">https://en.wikipedia.org/wiki/Xen</a></p>
<p>First you have Xen hypervisor booted at startup, then you get separate VM for all of your activities. Because all of your activities are separated by VM, one of them get hacked will not compromise the security of your entire system. It is like manage your personal pc like a server, that is why Qubes OS is a highly secure OS if used correctly</p> <p>First you have Xen hypervisor booted at startup, then you get separate VM for all of your activities. Because all of your activities are separated by VM, one of them get hacked will not compromise the security of your entire system. It is like manage your personal pc like a server, that is why Qubes OS is a highly secure OS if used correctly</p>
<p>If you want to dive into the tech details and concepts about Qubes, official document is the best place <a href="https://www.qubes-os.org/intro/">https://www.qubes-os.org/intro/</a></p> <p>If you want to dive into the tech details and concepts about Qubes, official document is the best place <a href="https://www.qubes-os.org/intro/">https://www.qubes-os.org/intro/</a></p>
</div> </div>
@ -80,14 +80,14 @@
<h2><b>Comparison </b></h2> <h2><b>Comparison </b></h2>
<p>Why you should use Qubes OS instead of xyz config I use?</p> <p>Why you should use Qubes OS instead of xyz config I use?</p>
<p>1.Easier network configuration</p> <p>1.Easier network configuration</p>
<p>Qubes OS is designed to have a basket of differnt VMs with different <b>trust level</b>, and has a very easy menu in GUI method to manage the network of these VMs. Qubes OS also has built-in firewall function to stop unexpected leaks. In short, it is less likely for you to make mistakes in Qubes</p> <p>Qubes OS is designed to have a basket of differnt VMs with different <b>trust level</b>, and has a very easy menu in GUI to manage the network of these VMs. Qubes OS also has built-in firewall function to stop unexpected leaks. In short, it is less likely for you to make mistakes in Qubes</p>
<p>For example if you want to have many different network configs like below link to satisfy your different online identities, Qubes OS is the right tool.</p> <p>For example if you want to have many different network configs like below link to satisfy your different online identities, Qubes OS is the right tool.</p>
<p><a href="../internetsegmentation/index.html">Theories about building up your online identites</a>. Check this theory about online identities, with Qubes OS you can easily build up chains of vm for doing whatever you want, for example different combination of vpn/proxy/tor</p> <p><a href="../internetsegmentation/index.html">Theories about building up your online identites</a>. Check this theory about online identities, with Qubes OS you can easily build up chains of vm for doing whatever you want, for example different combination of vpn/proxy/tor</p>
<img src="qubes-trust-level-architecture.png" class="imgRz" style="width: 600px"> <img src="qubes-trust-level-architecture.png" class="imgRz" style="width: 600px">
<p>A image that shows Qubes OS with different vm for different functions and identities</p> <p>A image that shows Qubes OS with different vm for different functions and identities</p>
<p>2.Integrated Whonix</p> <p>2.Integrated Whonix</p>
<p>Qubes OS integrate whonix gateway and workstation by default, tor browser works out of the box. You can also use whonix gateway to torrify applications that do not support tor and it is leak proof. You can achieve all of these with some clicks of buttons, and no complicated iptables needed</p> <p>Qubes OS integrate whonix gateway and workstation by default, thus tor browser works out of the box. You can also use whonix gateway to torrify applications that do not support tor be assured it is leak proof. You can achieve all of these with some clicks of buttons, and no complicated iptables needed</p>
<p>For learning what is whonix <a href="https://www.whonix.org/wiki/FAQ">https://www.whonix.org/wiki/FAQ</a></p> <p>For learning what is whonix <a href="https://www.whonix.org/wiki/FAQ">https://www.whonix.org/wiki/FAQ</a></p>
<p>3.Superior safety</p> <p>3.Superior safety</p>
<p>Xen is a hypervisor that has a much smaller code than vmware/virtual box/kvm, it is possible to read and audit the entire code base. Besides qubes OS also put networking and usb service stack into VM, this feature greatly increases your host OS security from malicious network and usb. The days when you just plugin a bad usb into your computer and it booms are gone!</p> <p>Xen is a hypervisor that has a much smaller code than vmware/virtual box/kvm, it is possible to read and audit the entire code base. Besides qubes OS also put networking and usb service stack into VM, this feature greatly increases your host OS security from malicious network and usb. The days when you just plugin a bad usb into your computer and it booms are gone!</p>
@ -175,9 +175,10 @@ $ sudo dd if=file_name.iso of=/dev/sda status=progress
<p>These configs in most situation do not need to be changed, however if you are using wired connection you can make sys-net disposable, this increases your security a little bit.</p> <p>These configs in most situation do not need to be changed, however if you are using wired connection you can make sys-net disposable, this increases your security a little bit.</p>
<p>If you are using wireless network through a usb dongle you might need to choose "Use sys-net qube for both networking and USB devices"</p> <p>If you are using wireless network through a usb dongle you might need to choose "Use sys-net qube for both networking and USB devices"</p>
<p>You can also enable system and template update over tor, but this will make it significantly slower for big updates. And there is no need to touch the advanced configuration.</p> <p>You can also enable system and template update over tor, but this will make it significantly slower for big updates. And there is no need to touch the advanced configuration.</p>
<p>Click done and let the scripts run, do not interrupt it by closing your computer</p> <p>Click done and let the scripts run, do not interrupt it by closing your computer, it might seems unresponsive for a while.</p>
<img src="Screenshot From 2024-12-05 17-40-39.png" class="imgRz" style="width: 900px"> <img src="Screenshot From 2024-12-05 17-40-39.png" class="imgRz" style="width: 900px">
<p>And finally we get our Qubes, in next tutorial we will start to compartmentalize our online activities by creating different qubes.</p> <p>And finally we get our Qubes, in next tutorial we will start to compartmentalize our online activities by creating different qubes.</p>
<p>Next tutorial : <a href="../qubesosnetwork/index.html">How to use qubes for different online activites</a></p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->
</div> <!-- /container --> </div> <!-- /container -->