fix typos

This commit is contained in:
nihilist 2025-05-20 19:38:52 +02:00
parent 68ac71a535
commit 17422dd6ef
2 changed files with 3 additions and 4 deletions

View file

@ -7,11 +7,11 @@ xmr: 87iB34vdFvNULrAjyfVAZ7jMXc8vbq9tLGMLjo6WC8N9Xo2JFaa8Vkp6dwXBt8rK12Xpz5z1rTa
# Qubes Host OS setup guide # Qubes Host OS setup guide
**DISCLAIMER: Qubes OS is not suitable as a Host OS for our [Deniability tutorials](../deniability/index.md) because it lacks the live mode and ram-wipe feature** (which is a hard requirement), we consider Qubes OS as suitable for Private and Anonymous uses at best, **IT CANNOT be used for sensitive use** unlike with our main [Kicksecure Host OS](../linux/index.md) recommendation. **DISCLAIMER: Qubes OS is not suitable as a Host OS for our long-term [Deniability tutorials](../deniability/index.md) because it lacks the [live mode and ram-wipe](../livemode/index.md) feature** (which is a hard requirement), we consider Qubes OS as suitable for Private and Anonymous uses at best, **IT CANNOT be used for long-term sensitive use** unlike with our main [Kicksecure Host OS](../linux/index.md) recommendation.
![alt text](image-1.png) ![alt text](image-1.png)
([source of the forum thread](https://forum.qubes-os.org/t/what-is-the-consensus-on-running-vms-in-a-hidden-veracrypt-volume/28721/9)) ([related forum thread](https://forum.qubes-os.org/t/what-is-the-consensus-on-running-vms-in-a-hidden-veracrypt-volume/28721/9))
Official site of Qubes OS <https://www.qubes-os.org> Official site of Qubes OS <https://www.qubes-os.org>

View file

@ -6,11 +6,10 @@ xmr: 87iB34vdFvNULrAjyfVAZ7jMXc8vbq9tLGMLjo6WC8N9Xo2JFaa8Vkp6dwXBt8rK12Xpz5z1rTa
--- ---
# How to navigate qubes OS and segment your internet uses # How to navigate qubes OS and segment your internet uses
**DISCLAIMER: Qubes OS is not suitable as a Host OS for our [Deniability tutorials](../deniability/index.md) because it lacks the live mode and ram-wipe feature** (which is a hard requirement), we consider Qubes OS as suitable for Private and Anonymous uses at best, **IT CANNOT be used for sensitive use** unlike with our main [Kicksecure Host OS](../linux/index.md) recommendation. **DISCLAIMER: Qubes OS is not suitable as a Host OS for our long-term [Deniability tutorials](../deniability/index.md) because it lacks the [live mode and ram-wipe](../livemode/index.md) feature** (which is a hard requirement), we consider Qubes OS as suitable for Private and Anonymous uses at best, **IT CANNOT be used for long-term sensitive use** unlike with our main [Kicksecure Host OS](../linux/index.md) recommendation. ([related forum thread](https://forum.qubes-os.org/t/what-is-the-consensus-on-running-vms-in-a-hidden-veracrypt-volume/28721/9))
![alt text](../qubesos/image-1.png) ![alt text](../qubesos/image-1.png)
([source of the forum thread](https://forum.qubes-os.org/t/what-is-the-consensus-on-running-vms-in-a-hidden-veracrypt-volume/28721/9))
In this tutorial we will set up the environment for public, private and anonymous online identities, and how to use qubes os. In this tutorial we will set up the environment for public, private and anonymous online identities, and how to use qubes os.