diff --git a/qubesos/index.md b/qubesos/index.md index 21a0337..9e9e318 100644 --- a/qubesos/index.md +++ b/qubesos/index.md @@ -7,11 +7,11 @@ xmr: 87iB34vdFvNULrAjyfVAZ7jMXc8vbq9tLGMLjo6WC8N9Xo2JFaa8Vkp6dwXBt8rK12Xpz5z1rTa # Qubes Host OS setup guide -**DISCLAIMER: Qubes OS is not suitable as a Host OS for our [Deniability tutorials](../deniability/index.md) because it lacks the live mode and ram-wipe feature** (which is a hard requirement), we consider Qubes OS as suitable for Private and Anonymous uses at best, **IT CANNOT be used for sensitive use** unlike with our main [Kicksecure Host OS](../linux/index.md) recommendation. +**DISCLAIMER: Qubes OS is not suitable as a Host OS for our long-term [Deniability tutorials](../deniability/index.md) because it lacks the [live mode and ram-wipe](../livemode/index.md) feature** (which is a hard requirement), we consider Qubes OS as suitable for Private and Anonymous uses at best, **IT CANNOT be used for long-term sensitive use** unlike with our main [Kicksecure Host OS](../linux/index.md) recommendation. ![alt text](image-1.png) -([source of the forum thread](https://forum.qubes-os.org/t/what-is-the-consensus-on-running-vms-in-a-hidden-veracrypt-volume/28721/9)) +([related forum thread](https://forum.qubes-os.org/t/what-is-the-consensus-on-running-vms-in-a-hidden-veracrypt-volume/28721/9)) Official site of Qubes OS diff --git a/qubesosnetwork/index.md b/qubesosnetwork/index.md index 9f04ea2..a9188f1 100644 --- a/qubesosnetwork/index.md +++ b/qubesosnetwork/index.md @@ -6,11 +6,10 @@ xmr: 87iB34vdFvNULrAjyfVAZ7jMXc8vbq9tLGMLjo6WC8N9Xo2JFaa8Vkp6dwXBt8rK12Xpz5z1rTa --- # How to navigate qubes OS and segment your internet uses -**DISCLAIMER: Qubes OS is not suitable as a Host OS for our [Deniability tutorials](../deniability/index.md) because it lacks the live mode and ram-wipe feature** (which is a hard requirement), we consider Qubes OS as suitable for Private and Anonymous uses at best, **IT CANNOT be used for sensitive use** unlike with our main [Kicksecure Host OS](../linux/index.md) recommendation. +**DISCLAIMER: Qubes OS is not suitable as a Host OS for our long-term [Deniability tutorials](../deniability/index.md) because it lacks the [live mode and ram-wipe](../livemode/index.md) feature** (which is a hard requirement), we consider Qubes OS as suitable for Private and Anonymous uses at best, **IT CANNOT be used for long-term sensitive use** unlike with our main [Kicksecure Host OS](../linux/index.md) recommendation. ([related forum thread](https://forum.qubes-os.org/t/what-is-the-consensus-on-running-vms-in-a-hidden-veracrypt-volume/28721/9)) ![alt text](../qubesos/image-1.png) -([source of the forum thread](https://forum.qubes-os.org/t/what-is-the-consensus-on-running-vms-in-a-hidden-veracrypt-volume/28721/9)) In this tutorial we will set up the environment for public, private and anonymous online identities, and how to use qubes os.