mirror of
http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/opsec-blogposts.git
synced 2025-06-08 13:59:32 +00:00
updated qubes tutorials
This commit is contained in:
parent
7978673f86
commit
68ac71a535
33 changed files with 16 additions and 2 deletions
|
@ -6,6 +6,13 @@ xmr: 87iB34vdFvNULrAjyfVAZ7jMXc8vbq9tLGMLjo6WC8N9Xo2JFaa8Vkp6dwXBt8rK12Xpz5z1rTa
|
|||
---
|
||||
# How to navigate qubes OS and segment your internet uses
|
||||
|
||||
**DISCLAIMER: Qubes OS is not suitable as a Host OS for our [Deniability tutorials](../deniability/index.md) because it lacks the live mode and ram-wipe feature** (which is a hard requirement), we consider Qubes OS as suitable for Private and Anonymous uses at best, **IT CANNOT be used for sensitive use** unlike with our main [Kicksecure Host OS](../linux/index.md) recommendation.
|
||||
|
||||

|
||||
|
||||
([source of the forum thread](https://forum.qubes-os.org/t/what-is-the-consensus-on-running-vms-in-a-hidden-veracrypt-volume/28721/9))
|
||||
|
||||
|
||||
In this tutorial we will set up the environment for public, private and anonymous online identities, and how to use qubes os.
|
||||
|
||||
If you are still not familiar with the identity model please check this link [Theories about building up your online identities](../internetsegmentation/index.md)
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue