mirror of
http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions.git
synced 2025-07-02 11:56:40 +00:00
Fixed the images and some typo
This commit is contained in:
parent
a756b0e62d
commit
7db6c79c17
19 changed files with 8 additions and 3 deletions
|
@ -63,7 +63,7 @@
|
|||
<a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>nihilist - 00 / 00 / 00</ba></p>
|
||||
<h1>Qubes OS guide </h1>
|
||||
<p>Official site of Qubes OS <a href="https://www.qubes-os.org">https://www.qubes-os.org</a></p>
|
||||
<p>When you land into this tutorial, I assume you already have some Linux experience, if not this might not be suitable for you, since Qubes OS is not very user friendly. I recommend you to try some normal Linux distribution first <a href="https://blog.nowhere.moe/opsec/linux/index.html">https://blog.nowhere.moe/opsec/linux/index.html</a></p>
|
||||
<p>When you land into this tutorial, I assume you already have some Linux experience, if not this might not be suitable for you, since Qubes OS is not very user friendly. I recommend you to try some normal Linux distribution first <a href="../linux/index.html">How to Install Linux as a beginner</a></p>
|
||||
<p>Qubes OS is a very cutting edge OS that uses virtualization everywhere to compartmentalize your digital life. It is technically not a Linux distribution, it is built on Xen which is a type 1 hypervisor that runs bare metal, <a href="https://en.wikipedia.org/wiki/Xen">https://en.wikipedia.org/wiki/Xen</a></p>
|
||||
<p>First you have Xen hypervisor booted at startup, then you get separate VM for all of your activities. Because all of your activities are separated by VM, one of them get hacked will not compromise the security of your entire system. It is like manage your personal pc like a server, that is why Qubes OS is a highly secure OS if used correctly</p>
|
||||
<p>If you want to dive into the tech details and concepts about Qubes, official document is the best place <a href="https://www.qubes-os.org/intro/">https://www.qubes-os.org/intro/</a></p>
|
||||
|
@ -82,7 +82,7 @@
|
|||
<p>1.Easier network configuration</p>
|
||||
<p>Qubes OS is designed to have a basket of differnt VMs with different <b>trust level</b>, and has a very easy menu in GUI method to manage the network of these VMs. Qubes OS also has built-in firewall function to stop unexpected leaks. In short, it is less likely for you to make mistakes in Qubes</p>
|
||||
<p>For example if you want to have many different network configs like below link to satisfy your different online identities, Qubes OS is the right tool.</p>
|
||||
<p><a href="https://blog.nowhere.moe/opsec/internetsegmentation/index.html">https://blog.nowhere.moe/opsec/internetsegmentation/index.html</a>. Check this theory about online identities, with Qubes OS you can easily build up chains of vm for doing whatever you want, for example different combination of vpn/proxy/tor</p>
|
||||
<p><a href="../internetsegmentation/index.html">Theories about building up your online identites</a>. Check this theory about online identities, with Qubes OS you can easily build up chains of vm for doing whatever you want, for example different combination of vpn/proxy/tor</p>
|
||||
<img src="qubes-trust-level-architecture.png" class="imgRz" style="width: 600px">
|
||||
<p>A image that shows Qubes OS with different vm for different functions and identities</p>
|
||||
|
||||
|
@ -139,6 +139,11 @@ $ sudo dd if=file_name.iso of=/dev/sda status=progress
|
|||
<p>You need to make two changes in BIOS basically, first you need to turn off secure boot(I know this is sad), but unfortunately secure boot and Xen did not work together on most consumer grade machines. I personally recommends only use qubes at home pc, or those so called "Qubes certified" laptops equipped with heads(What is heads : <a href="https://trmm.net/Heads/">https://trmm.net/Heads/</a>) that can protect your boot partition and has anti evil maid features <a href="https://www.qubes-os.org/doc/certified-hardware/">https://www.qubes-os.org/doc/certified-hardware/</a>. </p>
|
||||
<p>Next if you are on UEFI mode you need to enable "CSM". <a href="https://superuser.com/questions/1284392/what-exactly-is-uefi-with-csm-boot-mode">https://superuser.com/questions/1284392/what-exactly-is-uefi-with-csm-boot-mode</a>. You also need to find that in your bios menu, it should usually appear below boot options. This can fix a lot of potential troubles later</p>
|
||||
<p>Final thing is remember to turn on vt-x or cpu virtualization support, since this is needed for Qubes. Check your bios, if there is a setting called IOMMU, you also need to enable that</p>
|
||||
<p>For example you can expect something look like this</p>
|
||||
<img src="../linux/19.png" class="imgRz" style="width: 900px">
|
||||
<p></p>
|
||||
<img src="../linux/20.png" class="imgRz" style="width: 900px">
|
||||
|
||||
<p>Finally, reboot and choose your usb as a boot device</p>
|
||||
<img src="Screenshot From 2024-12-05 16-26-38.png" class="imgRz" style="width: 900px">
|
||||
<p>If things worked correctly, you should see a menu like this, just click enter and wait</p>
|
||||
|
@ -172,7 +177,7 @@ $ sudo dd if=file_name.iso of=/dev/sda status=progress
|
|||
<p>You can also enable system and template update over tor, but this will make it significantly slower for big updates. And there is no need to touch the advanced configuration.</p>
|
||||
<p>Click done and let the scripts run, do not interrupt it by closing your computer</p>
|
||||
<img src="Screenshot From 2024-12-05 17-40-39.png" class="imgRz" style="width: 900px">
|
||||
<p>And finally we get our Qubes</p>
|
||||
<p>And finally we get our Qubes, in next tutorial we will start to compartmentalize our online activities by creating different qubes.</p>
|
||||
</div>
|
||||
</div><!-- /row -->
|
||||
</div> <!-- /container -->
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue