Edited based on comments

This commit is contained in:
prism_breaker 2024-12-20 05:11:02 +00:00
parent daea9bb45e
commit e1271118fd

View file

@ -160,7 +160,8 @@
<p>And they fit in different places of our network identity threat model obviously</p>
<img src="threat_level.png" class="imgRz">
<p></p>
<p><b>Banking VM</b></p>
<p><b>Public Use: Banking VM</b></p>
<p>In a public use setup, you can run closed source software, or access service that is directly tied to your real life identity.</p>
<p>Let's go back to our qubes manager, click "New qube" in the top left corner</p>
<img src="create.png" class="imgRz">
<p>First name it as "banking", and we assign it with <b>Yellow</b> tag, since it is for banking identities, so yellow is a medium trust score for me. Color tag is a very important feature of qubes, every qube has its own color tag for avoiding you accidentally type something sensitive in a insecure vm. Dom0 always has the special <b>White</b> tag</p>
@ -169,7 +170,8 @@
<p>Now click ok and the qube will be created, you can find your qube app menu on the top left <b>Q</b> icon, then we can open firefox and start banking</p>
<img src="banking.png" class="imgRz">
<p></p>
<p><b>Torrent VM</b></p>
<p><b>Private use: Torrent VM</b></p>
<p>In a private use setup, you should only use FOSS software, and use a vpn service for hiding your home ip </p>
<p>First we start a template vm, for example debian in this case, and install transmission</p>
<img src="template_install.png" class="imgRz">
<p>After installation enter "sudo poweroff" to shut down the qube, make sure it is shutdown, since your changes in template qube only get reflected when it is shutdown <b>at least once!</b></p>
@ -185,7 +187,8 @@
<img src="transmission_on.png" class="imgRz">
<p>Now happy torrenting</p>
<p></p>
<p><b>Darknet VM</b></p>
<p><b>Anonymous use: Darknet VM</b></p>
<p>Same as private setup, but you should use tor instead of vpn</p>
<p>Here we use whonix workstation to access dread for exploring the darknet</p>
<p>If you follow the default setting during the installation config, you should have disposable whonix workstation installed by default, which means we do not need to create anything</p>
<p>Try to find something named "whonix-workstation-17-dvm" in the qubes Q menu, click "Tor Browser(AnonDist)", and you will get a disposable vm running tor browser. This is great since anything happen inside this vm get destroyed after you shut down the browser</p>