mirror of
http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions.git
synced 2025-07-02 07:26:41 +00:00
Edited based on comments
This commit is contained in:
parent
daea9bb45e
commit
e1271118fd
1 changed files with 6 additions and 3 deletions
|
@ -160,7 +160,8 @@
|
|||
<p>And they fit in different places of our network identity threat model obviously</p>
|
||||
<img src="threat_level.png" class="imgRz">
|
||||
<p></p>
|
||||
<p><b>Banking VM</b></p>
|
||||
<p><b>Public Use: Banking VM</b></p>
|
||||
<p>In a public use setup, you can run closed source software, or access service that is directly tied to your real life identity.</p>
|
||||
<p>Let's go back to our qubes manager, click "New qube" in the top left corner</p>
|
||||
<img src="create.png" class="imgRz">
|
||||
<p>First name it as "banking", and we assign it with <b>Yellow</b> tag, since it is for banking identities, so yellow is a medium trust score for me. Color tag is a very important feature of qubes, every qube has its own color tag for avoiding you accidentally type something sensitive in a insecure vm. Dom0 always has the special <b>White</b> tag</p>
|
||||
|
@ -169,7 +170,8 @@
|
|||
<p>Now click ok and the qube will be created, you can find your qube app menu on the top left <b>Q</b> icon, then we can open firefox and start banking</p>
|
||||
<img src="banking.png" class="imgRz">
|
||||
<p></p>
|
||||
<p><b>Torrent VM</b></p>
|
||||
<p><b>Private use: Torrent VM</b></p>
|
||||
<p>In a private use setup, you should only use FOSS software, and use a vpn service for hiding your home ip </p>
|
||||
<p>First we start a template vm, for example debian in this case, and install transmission</p>
|
||||
<img src="template_install.png" class="imgRz">
|
||||
<p>After installation enter "sudo poweroff" to shut down the qube, make sure it is shutdown, since your changes in template qube only get reflected when it is shutdown <b>at least once!</b></p>
|
||||
|
@ -185,7 +187,8 @@
|
|||
<img src="transmission_on.png" class="imgRz">
|
||||
<p>Now happy torrenting</p>
|
||||
<p></p>
|
||||
<p><b>Darknet VM</b></p>
|
||||
<p><b>Anonymous use: Darknet VM</b></p>
|
||||
<p>Same as private setup, but you should use tor instead of vpn</p>
|
||||
<p>Here we use whonix workstation to access dread for exploring the darknet</p>
|
||||
<p>If you follow the default setting during the installation config, you should have disposable whonix workstation installed by default, which means we do not need to create anything</p>
|
||||
<p>Try to find something named "whonix-workstation-17-dvm" in the qubes Q menu, click "Tor Browser(AnonDist)", and you will get a disposable vm running tor browser. This is great since anything happen inside this vm get destroyed after you shut down the browser</p>
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue