diff --git a/opsec/qubesos/Screenshot From 2024-12-05 16-26-38.png b/opsec/qubesos/Screenshot From 2024-12-05 16-26-38.png index 654e797..91276cb 100755 Binary files a/opsec/qubesos/Screenshot From 2024-12-05 16-26-38.png and b/opsec/qubesos/Screenshot From 2024-12-05 16-26-38.png differ diff --git a/opsec/qubesos/Screenshot From 2024-12-05 16-28-18.png b/opsec/qubesos/Screenshot From 2024-12-05 16-28-18.png index f3b26a4..067d30b 100755 Binary files a/opsec/qubesos/Screenshot From 2024-12-05 16-28-18.png and b/opsec/qubesos/Screenshot From 2024-12-05 16-28-18.png differ diff --git a/opsec/qubesos/Screenshot From 2024-12-05 16-28-40.png b/opsec/qubesos/Screenshot From 2024-12-05 16-28-40.png index c79d696..59c61be 100755 Binary files a/opsec/qubesos/Screenshot From 2024-12-05 16-28-40.png and b/opsec/qubesos/Screenshot From 2024-12-05 16-28-40.png differ diff --git a/opsec/qubesos/Screenshot From 2024-12-05 16-28-51.png b/opsec/qubesos/Screenshot From 2024-12-05 16-28-51.png index c4ca101..304f74e 100755 Binary files a/opsec/qubesos/Screenshot From 2024-12-05 16-28-51.png and b/opsec/qubesos/Screenshot From 2024-12-05 16-28-51.png differ diff --git a/opsec/qubesos/Screenshot From 2024-12-05 16-29-00.png b/opsec/qubesos/Screenshot From 2024-12-05 16-29-00.png index 118f501..1d084e3 100755 Binary files a/opsec/qubesos/Screenshot From 2024-12-05 16-29-00.png and b/opsec/qubesos/Screenshot From 2024-12-05 16-29-00.png differ diff --git a/opsec/qubesos/Screenshot From 2024-12-05 16-29-12.png b/opsec/qubesos/Screenshot From 2024-12-05 16-29-12.png index 7b16d78..c4f686a 100755 Binary files a/opsec/qubesos/Screenshot From 2024-12-05 16-29-12.png and b/opsec/qubesos/Screenshot From 2024-12-05 16-29-12.png differ diff --git a/opsec/qubesos/Screenshot From 2024-12-05 16-29-23.png b/opsec/qubesos/Screenshot From 2024-12-05 16-29-23.png index c506d67..bf44a16 100755 Binary files a/opsec/qubesos/Screenshot From 2024-12-05 16-29-23.png and b/opsec/qubesos/Screenshot From 2024-12-05 16-29-23.png differ diff --git a/opsec/qubesos/Screenshot From 2024-12-05 16-29-33.png b/opsec/qubesos/Screenshot From 2024-12-05 16-29-33.png index f49f169..b4520e1 100755 Binary files a/opsec/qubesos/Screenshot From 2024-12-05 16-29-33.png and b/opsec/qubesos/Screenshot From 2024-12-05 16-29-33.png differ diff --git a/opsec/qubesos/Screenshot From 2024-12-05 16-29-47.png b/opsec/qubesos/Screenshot From 2024-12-05 16-29-47.png index 00e187e..5b17c3a 100755 Binary files a/opsec/qubesos/Screenshot From 2024-12-05 16-29-47.png and b/opsec/qubesos/Screenshot From 2024-12-05 16-29-47.png differ diff --git a/opsec/qubesos/Screenshot From 2024-12-05 16-29-57.png b/opsec/qubesos/Screenshot From 2024-12-05 16-29-57.png index d3076b7..89dd6b2 100755 Binary files a/opsec/qubesos/Screenshot From 2024-12-05 16-29-57.png and b/opsec/qubesos/Screenshot From 2024-12-05 16-29-57.png differ diff --git a/opsec/qubesos/Screenshot From 2024-12-05 16-39-09.png b/opsec/qubesos/Screenshot From 2024-12-05 16-39-09.png index c909ba0..6575fc8 100755 Binary files a/opsec/qubesos/Screenshot From 2024-12-05 16-39-09.png and b/opsec/qubesos/Screenshot From 2024-12-05 16-39-09.png differ diff --git a/opsec/qubesos/Screenshot From 2024-12-05 16-39-27.png b/opsec/qubesos/Screenshot From 2024-12-05 16-39-27.png index 73db770..42844c2 100755 Binary files a/opsec/qubesos/Screenshot From 2024-12-05 16-39-27.png and b/opsec/qubesos/Screenshot From 2024-12-05 16-39-27.png differ diff --git a/opsec/qubesos/Screenshot From 2024-12-05 16-39-44.png b/opsec/qubesos/Screenshot From 2024-12-05 16-39-44.png deleted file mode 100755 index a0d85dc..0000000 Binary files a/opsec/qubesos/Screenshot From 2024-12-05 16-39-44.png and /dev/null differ diff --git a/opsec/qubesos/Screenshot From 2024-12-05 16-40-07.png b/opsec/qubesos/Screenshot From 2024-12-05 16-40-07.png index 3dd7659..aa2c7a2 100755 Binary files a/opsec/qubesos/Screenshot From 2024-12-05 16-40-07.png and b/opsec/qubesos/Screenshot From 2024-12-05 16-40-07.png differ diff --git a/opsec/qubesos/Screenshot From 2024-12-05 16-40-34.png b/opsec/qubesos/Screenshot From 2024-12-05 16-40-34.png index b226154..d175165 100755 Binary files a/opsec/qubesos/Screenshot From 2024-12-05 16-40-34.png and b/opsec/qubesos/Screenshot From 2024-12-05 16-40-34.png differ diff --git a/opsec/qubesos/Screenshot From 2024-12-05 16-40-42.png b/opsec/qubesos/Screenshot From 2024-12-05 16-40-42.png index 96bbd6f..0d01052 100755 Binary files a/opsec/qubesos/Screenshot From 2024-12-05 16-40-42.png and b/opsec/qubesos/Screenshot From 2024-12-05 16-40-42.png differ diff --git a/opsec/qubesos/Screenshot From 2024-12-05 17-40-25.png b/opsec/qubesos/Screenshot From 2024-12-05 17-40-25.png index 0dbf425..78c87f1 100755 Binary files a/opsec/qubesos/Screenshot From 2024-12-05 17-40-25.png and b/opsec/qubesos/Screenshot From 2024-12-05 17-40-25.png differ diff --git a/opsec/qubesos/Screenshot From 2024-12-05 17-40-39.png b/opsec/qubesos/Screenshot From 2024-12-05 17-40-39.png index 4a07d9b..54abc3e 100755 Binary files a/opsec/qubesos/Screenshot From 2024-12-05 17-40-39.png and b/opsec/qubesos/Screenshot From 2024-12-05 17-40-39.png differ diff --git a/opsec/qubesos/index.html b/opsec/qubesos/index.html index d50a19d..871c1a1 100644 --- a/opsec/qubesos/index.html +++ b/opsec/qubesos/index.html @@ -63,7 +63,7 @@ Previous Page
Official site of Qubes OS https://www.qubes-os.org
-When you land into this tutorial, I assume you already have some Linux experience, if not this might not be suitable for you, since Qubes OS is not very user friendly. I recommend you to try some normal Linux distribution first https://blog.nowhere.moe/opsec/linux/index.html
+When you land into this tutorial, I assume you already have some Linux experience, if not this might not be suitable for you, since Qubes OS is not very user friendly. I recommend you to try some normal Linux distribution first How to Install Linux as a beginner
Qubes OS is a very cutting edge OS that uses virtualization everywhere to compartmentalize your digital life. It is technically not a Linux distribution, it is built on Xen which is a type 1 hypervisor that runs bare metal, https://en.wikipedia.org/wiki/Xen
First you have Xen hypervisor booted at startup, then you get separate VM for all of your activities. Because all of your activities are separated by VM, one of them get hacked will not compromise the security of your entire system. It is like manage your personal pc like a server, that is why Qubes OS is a highly secure OS if used correctly
If you want to dive into the tech details and concepts about Qubes, official document is the best place https://www.qubes-os.org/intro/
@@ -82,7 +82,7 @@1.Easier network configuration
Qubes OS is designed to have a basket of differnt VMs with different trust level, and has a very easy menu in GUI method to manage the network of these VMs. Qubes OS also has built-in firewall function to stop unexpected leaks. In short, it is less likely for you to make mistakes in Qubes
For example if you want to have many different network configs like below link to satisfy your different online identities, Qubes OS is the right tool.
-https://blog.nowhere.moe/opsec/internetsegmentation/index.html. Check this theory about online identities, with Qubes OS you can easily build up chains of vm for doing whatever you want, for example different combination of vpn/proxy/tor
+Theories about building up your online identites. Check this theory about online identities, with Qubes OS you can easily build up chains of vm for doing whatever you want, for example different combination of vpn/proxy/tor
A image that shows Qubes OS with different vm for different functions and identities
@@ -139,6 +139,11 @@ $ sudo dd if=file_name.iso of=/dev/sda status=progressYou need to make two changes in BIOS basically, first you need to turn off secure boot(I know this is sad), but unfortunately secure boot and Xen did not work together on most consumer grade machines. I personally recommends only use qubes at home pc, or those so called "Qubes certified" laptops equipped with heads(What is heads : https://trmm.net/Heads/) that can protect your boot partition and has anti evil maid features https://www.qubes-os.org/doc/certified-hardware/.
Next if you are on UEFI mode you need to enable "CSM". https://superuser.com/questions/1284392/what-exactly-is-uefi-with-csm-boot-mode. You also need to find that in your bios menu, it should usually appear below boot options. This can fix a lot of potential troubles later
Final thing is remember to turn on vt-x or cpu virtualization support, since this is needed for Qubes. Check your bios, if there is a setting called IOMMU, you also need to enable that
+For example you can expect something look like this
+Finally, reboot and choose your usb as a boot device
If things worked correctly, you should see a menu like this, just click enter and wait
@@ -172,7 +177,7 @@ $ sudo dd if=file_name.iso of=/dev/sda status=progressYou can also enable system and template update over tor, but this will make it significantly slower for big updates. And there is no need to touch the advanced configuration.
Click done and let the scripts run, do not interrupt it by closing your computer
And finally we get our Qubes
+And finally we get our Qubes, in next tutorial we will start to compartmentalize our online activities by creating different qubes.