Fixed the typo with new plugins, add more pictures about copying and spin up vm on tutorial 2

This commit is contained in:
prism_breaker 2024-12-18 09:44:22 +00:00
parent 05eec9bc47
commit 19f554029d
23 changed files with 86 additions and 35 deletions

1
.gitignore vendored Normal file
View file

@ -0,0 +1 @@
.vscode/settings.json

View file

@ -0,0 +1,2 @@
wireguard
openvpn

View file

@ -63,7 +63,7 @@
<a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>nihilist - 00 / 00 / 00</ba></p>
<h1>Qubes OS guide </h1>
<p>Official site of Qubes OS <a href="https://www.qubes-os.org">https://www.qubes-os.org</a></p>
<p>When you land into this tutorial, I assume you already have some Linux experience, if not this might not be suitable for you, since Qubes OS is not very user friendly. I recommend you to try some normal Linux distribution first <a href="../linux/index.html">How to Install Linux as a beginner</a></p>
<p>When you land into this tutorial, I assume you already have some Linux experience, if not this might not be suitable for you, since Qubes OS is not very user-friendly. I recommend you to try some normal Linux distribution first <a href="../linux/index.html">How to Install Linux as a beginner</a></p>
<p>Qubes OS is a very cutting edge OS that uses virtualization everywhere to compartmentalize your digital life. It is technically not a Linux distribution, it is built on Xen which is a type 1 hypervisor that runs on bare metal, <a href="https://en.wikipedia.org/wiki/Xen">https://en.wikipedia.org/wiki/Xen</a></p>
<p>First you have Xen hypervisor booted at startup, then you get separate VM for all of your activities. Because all of your activities are separated by VM, one of them get hacked will not compromise the security of your entire system. It is like manage your personal pc like a server, that is why Qubes OS is a highly secure OS if used correctly</p>
<p>If you want to dive into the tech details and concepts about Qubes, official document is the best place <a href="https://www.qubes-os.org/intro/">https://www.qubes-os.org/intro/</a></p>
@ -80,17 +80,17 @@
<h2><b>Comparison </b></h2>
<p>Why you should use Qubes OS instead of xyz config I use?</p>
<p>1.Easier network configuration</p>
<p>Qubes OS is designed to have a basket of differnt VMs with different <b>trust level</b>, and has a very easy menu in GUI to manage the network of these VMs. Qubes OS also has built-in firewall function to stop unexpected leaks. In short, it is less likely for you to make mistakes in Qubes</p>
<p>Qubes OS is designed to have a basket of different VMs with different <b>trust level</b>, and has a very easy menu in GUI to manage the network of these VMs. Qubes OS also has built-in firewall function to stop unexpected leaks. In short, it is less likely for you to make mistakes in Qubes</p>
<p>For example if you want to have many different network configs like below link to satisfy your different online identities, Qubes OS is the right tool.</p>
<p><a href="../internetsegmentation/index.html">Theories about building up your online identites</a>. Check this theory about online identities, with Qubes OS you can easily build up chains of vm for doing whatever you want, for example different combination of vpn/proxy/tor</p>
<p><a href="../internetsegmentation/index.html">Theories about building up your online identities</a>. Check this theory about online identities, with Qubes OS you can easily build up chains of vm for doing whatever you want, for example different combination of vpn/proxy/tor</p>
<img src="qubes-trust-level-architecture.png" class="imgRz" style="width: 600px">
<p>A image that shows Qubes OS with different vm for different functions and identities</p>
<p>2.Integrated Whonix</p>
<p>Qubes OS integrate whonix gateway and workstation by default, thus tor browser works out of the box. You can also use whonix gateway to torrify applications that do not support tor be assured it is leak proof. You can achieve all of these with some clicks of buttons, and no complicated iptables needed</p>
<p>Qubes OS integrate whonix gateway and workstation by default, thus tor browser works out of the box. You can also use whonix gateway to torrify applications that do not support tor and be guaranteed it is leakproof. You can achieve all of these with some clicks of buttons, and no complicated iptables needed</p>
<p>For learning what is whonix <a href="https://www.whonix.org/wiki/FAQ">https://www.whonix.org/wiki/FAQ</a></p>
<p>3.Superior safety</p>
<p>Xen is a hypervisor that has a much smaller code than vmware/virtual box/kvm, it is possible to read and audit the entire code base. Besides qubes OS also put networking and usb service stack into VM, this feature greatly increases your host OS security from malicious network and usb. The days when you just plugin a bad usb into your computer and it booms are gone!</p>
<p>Xen is a hypervisor that has a much smaller codebase than vmware/virtual box/kvm, it is possible to read and audit the entire code base. Besides qubes OS also put networking and usb service stack into VM, this feature greatly increases your host OS security from malicious network and usb. The days when you just plug in a bad usb into your computer and it booms are gone!</p>
</div>
</div><!-- /row -->
@ -105,14 +105,14 @@
<p>If you decided to install and try Qubes OS, then you must pick the correct hardware, since Qubes OS is a very cutting edge OS you should expect some compatibility issues.</p>
<p>For desktop PC actually you should not worry too much, I have installed Qubes OS on many intel/amd platforms, with all kinds of peculiar combination of cpu and gpu, it all works. As long as you are on a quite modern platform with common consumer gpu, you should be fine</p>
<p>This is the official hardware compatibility list, but be aware it is definitely incomplete, since people runs Qubes OS without problem mostly do not bother to report their config <a href="https://www.qubes-os.org/hcl/">https://www.qubes-os.org/hcl/</a></p>
<p>For laptops you should be careful, you better get a mainstream business laptop. I tried many installation on lenovo or hp business laptops from recent years, they all worked fine. However you should especially try to avoid laptops from non-traditional vendors like Xiaomi or whatever Chinese brand, and any gaming laptop with very peculiar gpu setup.</p>
<p>For laptops, you should be careful, you better get a mainstream business laptop. I tried many installations on Lenovo or hp business laptops from recent years, they all worked fine. However, you should especially try to avoid laptops from non-traditional vendors like Xiaomi or whatever Chinese brand, and any gaming laptop with very peculiar gpu setup.</p>
<p>Next thing is to download the installation ISO, go to their website and download</p>
<img src="Screenshot From 2024-12-05 11-20-03.png" class="imgRz" style="width: 800px">
<p>Download the ISO and hash digest</p>
<p>Next thing is to verify your ISO file is authentic, Qubes OS has a very detailed guide on how to do that so there is no need for me to build the wheel again <a href="https://www.qubes-os.org/security/verifying-signatures/">https://www.qubes-os.org/security/verifying-signatures/</a></p>
<p>I will paste the master key fingerprint here for comparison:427F11FD0FAA4B080123F01CDDFA1A3E36879494</p>
<p>Next thing is to <b>verify</b> your ISO file is authentic, Qubes OS has a very detailed guide on how to do that so there is no need for me to build the wheel again <a href="https://www.qubes-os.org/security/verifying-signatures/">https://www.qubes-os.org/security/verifying-signatures/</a></p>
<p>I will paste the master key fingerprint here for comparison:<b>427F11FD0FAA4B080123F01CDDFA1A3E36879494</b></p>
<p>Next step is to find a usb, make sure it is at least 16GB, then find its path</p>
<p>Next step is to find an usb, make sure it is at least 16GB, then find its path</p>
<pre><code class="nim">
$ sudo blkid
@ -131,15 +131,15 @@ $ sudo dd if=file_name.iso of=/dev/sda status=progress
<!-- +++++ Second Post +++++ -->
<div id="anon1">
<div class="container">
<div class="container">
<div class="row">
<div class="col-lg-8 col-lg-offset-2">
<h2><b>Install</b></h2> </br> </br>
<p>Next thing is to reboot into your computer and enter BIOS(EFI), this is different for every platform so you should find it out on google.</p>
<p>You need to make two changes in BIOS basically, first you need to turn off secure boot(I know this is sad), but unfortunately secure boot and Xen did not work together on most consumer grade machines. I personally recommends only use qubes at home pc, or those so called "Qubes certified" laptops equipped with heads(What is heads : <a href="https://trmm.net/Heads/">https://trmm.net/Heads/</a>) that can protect your boot partition and has anti evil maid features <a href="https://www.qubes-os.org/doc/certified-hardware/">https://www.qubes-os.org/doc/certified-hardware/</a>. </p>
<p>You need to make two changes in BIOS basically, first you need to turn off secure boot(I know this is sad), but unfortunately secure boot and Xen did not work together on most consumer grade machines. I personally recommend only use qubes at home pc, or those so called "Qubes certified" laptops equipped with heads(What is heads : <a href="https://trmm.net/Heads/">https://trmm.net/Heads/</a>) that can protect your boot partition and has anti-evil maid features <a href="https://www.qubes-os.org/doc/certified-hardware/">https://www.qubes-os.org/doc/certified-hardware/</a>. </p>
<p>Next if you are on UEFI mode you need to enable "CSM". <a href="https://superuser.com/questions/1284392/what-exactly-is-uefi-with-csm-boot-mode">https://superuser.com/questions/1284392/what-exactly-is-uefi-with-csm-boot-mode</a>. You also need to find that in your bios menu, it should usually appear below boot options. This can fix a lot of potential troubles later</p>
<p>Final thing is remember to turn on vt-x or cpu virtualization support, since this is needed for Qubes. Check your bios, if there is a setting called IOMMU, you also need to enable that</p>
<p>For example you can expect something look like this</p>
<p>Final thing is remembering to turn on vt-x or cpu virtualization support, since this is needed for Qubes. Check your bios, if there is a setting called IOMMU, you also need to enable that</p>
<p>For example, you can expect something look like this</p>
<img src="../linux/19.png" class="imgRz" style="width: 900px">
<p></p>
<img src="../linux/20.png" class="imgRz" style="width: 900px">
@ -148,7 +148,7 @@ $ sudo dd if=file_name.iso of=/dev/sda status=progress
<img src="Screenshot From 2024-12-05 16-26-38.png" class="imgRz" style="width: 900px">
<p>If things worked correctly, you should see a menu like this, just click enter and wait</p>
<img src="Screenshot From 2024-12-05 16-28-18.png" class="imgRz" style="width: 900px">
<p>At this step, click "continue", if your computer is fully compatible and all bios settings are correct, you should see no warning message, otherwise go back to check bios again. If your computer is not some ancient stuff if should be compatible</p>
<p>At this step, click "continue", if your computer is fully compatible and all bios settings are correct, you should see no warning message, otherwise go back to check bios again. If your computer is not some ancient stuff it should be compatible</p>
<img src="Screenshot From 2024-12-05 16-28-40.png" class="imgRz" style="width: 900px">
<p>At this step you need to config the disk, click the installation destination</p>
<img src="Screenshot From 2024-12-05 16-29-00.png" class="imgRz" style="width: 900px">
@ -175,10 +175,10 @@ $ sudo dd if=file_name.iso of=/dev/sda status=progress
<p>These configs in most situation do not need to be changed, however if you are using wired connection you can make sys-net disposable, this increases your security a little bit.</p>
<p>If you are using wireless network through a usb dongle you might need to choose "Use sys-net qube for both networking and USB devices"</p>
<p>You can also enable system and template update over tor, but this will make it significantly slower for big updates. And there is no need to touch the advanced configuration.</p>
<p>Click done and let the scripts run, do not interrupt it by closing your computer, it might seems unresponsive for a while.</p>
<p>Click done and let the scripts run, do not interrupt it by closing your computer, it might seem unresponsive for a while.</p>
<img src="Screenshot From 2024-12-05 17-40-39.png" class="imgRz" style="width: 900px">
<p>And finally we get our Qubes, in next tutorial we will start to compartmentalize our online activities by creating different qubes.</p>
<p>Next tutorial : <a href="../qubesosnetwork/index.html">How to use qubes for different online activites</a></p>
<p>Next tutorial : <a href="../qubesosnetwork/index.html">How to use qubes for different online activities</a></p>
</div>
</div><!-- /row -->
</div> <!-- /container -->

Binary file not shown.

After

Width:  |  Height:  |  Size: 109 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 67 KiB

BIN
opsec/qubesosnetwork/create.png Executable file

Binary file not shown.

After

Width:  |  Height:  |  Size: 212 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 80 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 188 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 110 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 131 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 84 KiB

View file

@ -8,7 +8,7 @@
<meta name="author" content="">
<link rel="shortcut icon" href="../../../../../../assets/img/favicon.png">
<title>Qubes OS network</title>
<title>How to navigate qubes OS and segment your internet uses</title>
<!-- Bootstrap core CSS -->
<link href="../../assets/css/bootstrap.css" rel="stylesheet">
@ -61,8 +61,9 @@
<div class="row">
<div class="col-lg-8 col-lg-offset-2">
<a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>nihilist - 00 / 00 / 00</ba></p>
<h1>Qubes OS network </h1>
<p> We will show some examples of qubes network setup for creating different purpose online identities in this tutorial</p>
<h1>How to navigate qubes OS and segment your internet uses </h1>
<p>In this tutorial we will set up the environment for public, private and anonymous online identities, and how to use qubes os.</p>
<p>If you are still not familiar with the identity model please check this link <a href="../internetsegmentation/index.html">Theories about building up your online identities</a></p>
</div>
</div><!-- /row -->
</div> <!-- /container -->
@ -80,7 +81,7 @@
<p>2.dom0: This is the admin vm, it is still a vm, but it is very special vm with all the tools to control the entire machine. It never connects to the network and no files from other qubes should touch it, once it gets compromised you are done</p>
<img src="structure.png" class="imgRz" style="width: 400px">
<p>3.Template VM: Template VM is like the concept of "class" in programming language, you will install all the applications you like in template vm, and appvm will simply share the root partition with the template vm, so appvm only needs to keeps its own /home directory, this greatly saves disk space and time you spent on software update.</p>
<p>3.Template VM: Template VM is like the concept of "class" in programming language, you will install all the applications you like in template vm, and appvm will simply share the root partition with the template vm, so appvm only needs to keep its own /home directory, this greatly saves disk space and time you spent on software update.</p>
<p>Template VM do not connect to network by default for safety, since if they are compromised all the app vm spawned by them are also done. Updates are conducted through a special proxy so attack surface is minimized</p>
<p>4.App VM: Lightweight VM spawned from template VM, any changes done to root partition will not persist across boot, it is meant to only use software installed from template VM and save your work in /home</p>
<img src="appvm.png" class="imgRz" style="width: 400px">
@ -88,7 +89,7 @@
<p>5.PVH: a para virtualization mode, which means some costly actions are not performed in the vm, instead they are done in the host through a special interface to make vm runs faster</p>
<p>Most qubes will run under PVH mode</p>
<p>6.HVM: Full virtualization, no host assistance. Only used in situation where PCI passthrough is required, or you installed your own special qube like windows</p>
<p>7.Disposable VM: This is a special App VM, it is spawned from a disposable VM template everytime when needed, but is destroyed immediately after the task without anything being saved. Ideal for performing some known dangerous activites</p>
<p>7.Disposable VM: This is a special App VM, it is spawned from a disposable VM template every time when needed, but is destroyed immediately after the task without anything being saved. Ideal for performing some known dangerous activities</p>
<p>8.PCI passthrough: By default qubes OS qube do not touch any peripheral devices for example usb or network card, if you want some qube to do something with the hardware, you need to do a PCI passthrough. For example if you want to setup a network qube you need to pass through the network adapter</p>
<p>9.Standalone qube: These are the qubes that do not depend on template vm, you either copied it from a template or installed it yourself</p>
<p>This is all the basic concepts you need to know, now we start our exploration</p>
@ -102,18 +103,25 @@
<div class="row">
<div class="col-lg-8 col-lg-offset-2">
<h2><b>Network Setup</b></h2> </br> </br>
<p>Qubes already comes with many default qubes, you can find them inside the qubes manager, which can be found on the top left menu</p>
<p>Now we will build up chains of qubes for different online activities.</p>
<p>0.sys-usb</p>
<p>Qubes already comes with many default qubes, you can find them inside the qubes manager</p>
<p>On the desktop, right click and choose "Open terminal here", you will get a terminal in dom0 </p>
<img src="terminal.png" class="imgRz" style="width: 1000px">
<p>Input "qubes-qube-manager", and click enter you will get the qubes manager</p>
<img src="manager.png" class="imgRz" style="width: 1000px">
<p>Now we are going to explain these default qubes</p>
<p>0.Template qubes</p>
<p>Qubes with the name "debian-12-xfce", "fedora-40-xfce", "whonix*" are template vms, you can install software in these template qubes, and use them in the app qubes</p>
<p>1.sys-usb</p>
<img src="usb-qube.png" class="imgRz" style="width: 400px">
<p>A qube that did not connect to network, and is responsible for providing usb service only, if you have usb keyboard or mouse it might also proxy the input for you. In some circumstances when you have a usb wifi dongle it also becomes the factual network qube</p>
<p>A qube that did not connect to network, and is responsible for providing usb service only, if you have usb keyboard or mouse it might also proxy the input for you. In some circumstances when you have an usb wifi dongle it also becomes the factual network qube</p>
<p>This is installed by default and is a disposable vm</p>
<p>1.sys-net</p>
<img src="net-qube.png" class="imgRz" style="width: 400px">
<p>This is where everything starts, you need to passthrough your ethernet adapater(wired or wireless) to a qube, and that qube will be used to as a first part in the network chain</p>
<p>This is where everything starts, you need to passthrough your Ethernet adapter(wired or wireless) to a qube, and that qube will be used to as a first part in the network chain</p>
<p>Since it is directly in contact with network adapter and the routers, it should be considered as untrusted because it is exposed to a lot of uncertain stuff</p>
<p>Only intended to be used as a basic router and nothing else</p>
<p>It is installed by default and only intended to be used as a basic router and nothing else</p>
<p>2.sys-firewall</p>
<p>The qube that separate the rest of your network chain from the sys-net for better security, and it is also the qube that enforces firewall rules if you have vpn qube directly behind it.</p>
<p>If you have any public identity it is best to directly connect it to sys-firewall, for example online banking</p>
@ -123,24 +131,44 @@
<p>And any qube provides network service need to enable "provides network" in advanced tab below "Run in debug mode"</p>
<img src="firewall-service.png" class="imgRz" style="width: 1200px">
<p>Any qube directly connect to sys-firewall will have your home isp ip address, best suited for public activity, for example online banking</p>
<img src="banking.png" class="imgRz" style="width: 1200px">
<p>Let's go back to our qubes manager, click "New qube" in the top left corner</p>
<img src="create.png" class="imgRz" style="width: 1000px">
<p>First name it as "banking", and we assign it with <b>Yellow</b> tag, since it is for banking identities, so yellow is a medium trust score for me. Color tag is a very important feature of qubes, every qube has its own color tag for avoiding you accidentally type something sensitive in a insecure vm. Dom0 always has the special <b>White</b> tag</p>
<p>For Type and Template I just leave it as AppVM and fedora-40-xfce, since this is exactly what I want</p>
<p>For networking, I choose "sys-firewall", since I want my bank to see my home ip address instead of my vpn ip and get my account banned</p>
<p>Now click ok and the qube will be created, you can find your qube app menu on the top left <b>Q</b> icon, then we can open firefox and start banking</p>
<img src="banking.png" class="imgRz" style="width: 1000px">
<p>3.vpn qube</p>
<p>A qube setup with vpn profile, redirect all the traffic to your designated vpn server. Ideal for providing a pseudonymous identity. If applied with firewall rules it can be guaranteed leak proof</p>
<p>Works fine with wireguard and openvpn cli, but for vpn vendor's own gui there might be problems, sometimes those apps break the dns setup in qubes</p>
<p>Mullvad has a very detailed tutorial on how to setup a vpn qube <a href="https://mullvad.net/en/help/qubes-os-4-and-mullvad-vpn">https://mullvad.net/en/help/qubes-os-4-and-mullvad-vpn</a>. However iptables mentioned in it is already deprecated by Qubes, and I personally recommend using wireguard, it works without need to config anything in the qube, and use sys-firewall to enforce leak protection</p>
<p>A qube setup with vpn profile, redirect all the traffic to your designated vpn server. Ideal for providing a pseudonymous identity. If applied with firewall rules it can be guaranteed leakproof</p>
<p>Qubes OS works fine with wireguard and openvpn cli programs, but for vpn vendor's own gui there might be problems, sometimes those apps break the dns setup in qubes</p>
<p>Mullvad has a very detailed tutorial on how to setup a vpn qube <a href="https://mullvad.net/en/help/wireguard-on-qubes-os">https://mullvad.net/en/help/wireguard-on-qubes-os</a>. However, iptables mentioned in it is already deprecated by Qubes, but it still works without DNS hijack config.</p>
<img src="vpn-qube.png" class="imgRz" style="width: 400px">
<p>If you have any pseudonymous activities it is best to connect behind vpn qube, for example torrenting</p>
<p>The setup is pretty much similar and you only need to change the network qube to vpn qube</p>
<p>First we start a template vm, for example debian in this case, and install transmission</p>
<img src="template_install.png" class="imgRz" style="width: 1000px">
<p>After installation enter "sudo poweroff" to shut down the qube, make sure it is shutdown, since your changes in template qube only get reflected when it is shutdown <b>at least once!</b></p>
<p>Next go back to qubes manager, and create a new qube called torrent, I assume you already set up a vpn qube according to the mullvad tutorial mentioned above</p>
<img src="torrent_vm.png" class="imgRz" style="width: 1000px">
<p>First give it a name called "torrent", and I personally prefer this is a medium trust score, so it is given a yellow tag.</p>
<p>We still leave it as appvm, and choose template as debian, since this is the template we just installed transmission</p>
<p>Most importantly set the networking to vpn qube you just setup, if you do not want DMCA notice get sent to your home. Then click ok the qube will be created</p>
<p>For accessing transmission app easily, we will add the transmission app into our "Q" menu which is in the top left corner</p>
<p>Right click the torrent qube in the manager, choose "settings", and choose "application"</p>
<img src="torrent_transmission.png" class="imgRz" style="width: 1000px">
<p>Find "Transmission" on the left, click it, and click the ">" icon in the middle, then click ok. Now transmission will be visible in the app menu</p>
<img src="transmission_on.png" class="imgRz" style="width: 1000px">
<p>Now happy torrenting</p>
<p>4.whonix qubes</p>
<p>Whonix is the best part of qubes, it makes tor very easy to use. Whonix qubes consists of two parts, first is whonix gateway, which onionlize all the network traffic behind it. Whonix workstation is a workstation specifically tuned for anonymity, and is usually disposable for increased security</p>
<p>Whonix is the best part of qubes, it makes tor very easy to use. Whonix qubes consists of two parts, first is whonix gateway, which onionize all the network traffic behind it. Whonix workstation is a workstation specifically tuned for anonymity, and is usually disposable for increased security</p>
<p>You can also hook up other non workstation qubes behind whonix gateway in rare circumstances, for example a windows qube, but you should be careful and should have a specialized gateway qube only for this.</p>
<p>This is the ideal place for all the high risk activities like all the darknet stuff</p>
<p>You might choose to whether or not to put whonix gateway behind a vpn</p>
<img src="whonix-qube.png" class="imgRz" style="width: 400px">
<p>Here we use whonix workstation to access tor.taxi for exploring the darknet</p>
<img src="whonix-usage.png" class="imgRz" style="width: 1200px">
<p>Try to find something names "whonix-workstation-17-dvm" in the qubes menu, click "Tor Browser(AnonDist)", and you will get a disposable vm running tor browser. This is great since anything happen inside this vm get destroyed after you shut down the browser</p>
<img src="whonix_dread.png" class="imgRz" style="width: 1000px">
<p>If you see something as <b>disp</b> on the vm windows title, then you are on a disposable vm, congrats!</p>
</div>
</div><!-- /row -->
</div> <!-- /container -->
@ -155,7 +183,27 @@
<h2><b>Tips</b></h2> </br> </br>
<p>There are some tricky problems about qube, like how to copy and paste text between qubes, and how to transfer files, or how to use usb.</p>
<p>For copy text, there is a master pasteboard in dom0, once you copy some text normally inside a qube, click shift+ctrl+c, then the text get transferred to the master pasteboard, and go to the vm you want to paste, click shift+ctrl+v, then the text is inside the clipboard of your destination vm</p>
<img src="copy_in_vm.png" class="imgRz" style="width: 1000px">
<p>For example you first copy some text inside a vm, then click SHIFT+CTRL+C</p>
<img src="master_pasteboard.png" class="imgRz" style="width: 1000px">
<p>Then you will see a message about Global Clipboard</p>
<p>Go to your destination vm and click CTRL+SHIFT+V, then you will see a message says Global Clipboard wiped</p>
<img src="master_pasteboard_wiped.png" class="imgRz" style="width: 1000px">
<p>Then just paste as normal</p>
<img src="destination_paste.png" class="imgRz" style="width: 1000px">
<p>
</p>
<img src="text_arrived.png" class="imgRz" style="width: 1000px">
<p>For copying file between vm you need to use qvm-copy command inside the vm</p>
<p>First we created a test file called "new_file"</p>
<img src="file_await_transfer.png" class="imgRz" style="width: 1000px">
<p>Then we use "qvm-copy" command, and choose "banking" vm in the dom0 prompt.</p>
<img src="copy_destination.png" class="imgRz" style="width: 1000px">
<p>Then you can see the new_file in banking vm</p>
<img src="file_arrived.png" class="imgRz" style="width: 1000px">
<p>Files from other VM are all located inside ~/QubesIncoming </p>
<p>Other stuff are inside the official document, no need to rebuild the wheels again</p>
<p><a href="https://www.qubes-os.org/doc/getting-started/">All the qubes "how to" guide</a></p>
</div>
</div><!-- /row -->

BIN
opsec/qubesosnetwork/manager.png Executable file

Binary file not shown.

After

Width:  |  Height:  |  Size: 186 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 70 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 65 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 168 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 295 KiB

BIN
opsec/qubesosnetwork/terminal.png Executable file

Binary file not shown.

After

Width:  |  Height:  |  Size: 48 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 68 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 246 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 224 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 192 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 78 KiB