mirror of
http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/opsec-blogposts.git
synced 2025-06-08 13:59:32 +00:00
fix typos
This commit is contained in:
parent
68ac71a535
commit
17422dd6ef
2 changed files with 3 additions and 4 deletions
|
@ -6,11 +6,10 @@ xmr: 87iB34vdFvNULrAjyfVAZ7jMXc8vbq9tLGMLjo6WC8N9Xo2JFaa8Vkp6dwXBt8rK12Xpz5z1rTa
|
|||
---
|
||||
# How to navigate qubes OS and segment your internet uses
|
||||
|
||||
**DISCLAIMER: Qubes OS is not suitable as a Host OS for our [Deniability tutorials](../deniability/index.md) because it lacks the live mode and ram-wipe feature** (which is a hard requirement), we consider Qubes OS as suitable for Private and Anonymous uses at best, **IT CANNOT be used for sensitive use** unlike with our main [Kicksecure Host OS](../linux/index.md) recommendation.
|
||||
**DISCLAIMER: Qubes OS is not suitable as a Host OS for our long-term [Deniability tutorials](../deniability/index.md) because it lacks the [live mode and ram-wipe](../livemode/index.md) feature** (which is a hard requirement), we consider Qubes OS as suitable for Private and Anonymous uses at best, **IT CANNOT be used for long-term sensitive use** unlike with our main [Kicksecure Host OS](../linux/index.md) recommendation. ([related forum thread](https://forum.qubes-os.org/t/what-is-the-consensus-on-running-vms-in-a-hidden-veracrypt-volume/28721/9))
|
||||
|
||||

|
||||
|
||||
([source of the forum thread](https://forum.qubes-os.org/t/what-is-the-consensus-on-running-vms-in-a-hidden-veracrypt-volume/28721/9))
|
||||
|
||||
|
||||
In this tutorial we will set up the environment for public, private and anonymous online identities, and how to use qubes os.
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue