From 7edb1e6949e5fbdafeecb712b792f0fd5f24c6ae Mon Sep 17 00:00:00 2001 From: nihilist Date: Fri, 9 May 2025 18:05:15 +0200 Subject: [PATCH] fix stuff --- 0_template/index.md | 2 +- sensitivevm/index.md | 17 +++++++++++------ 2 files changed, 12 insertions(+), 7 deletions(-) diff --git a/0_template/index.md b/0_template/index.md index 4977f7a..fe45221 100644 --- a/0_template/index.md +++ b/0_template/index.md @@ -41,7 +41,7 @@ Prerequisites: ## How can I implement the solution ? -1) Order the blinds through the commandline to look cool: +1) Order the blinds through the command-line to look cool: ```sh curl -H 'Content-Type: application/json' \ diff --git a/sensitivevm/index.md b/sensitivevm/index.md index 6af08e5..bca5714 100644 --- a/sensitivevm/index.md +++ b/sensitivevm/index.md @@ -144,9 +144,9 @@ So here we first make sure that the whonix gateway has 1GB memory, and that it h [...] - <__memory dumpCore="off" unit="GiB">1 <__/memory> <__currentMemory unit="GiB">1 <__/currentMemory> + 1 1 - [...] <__disk type="file" device="disk"> <__driver name="qemu" type="qcow2"/> <__source file="/run/media/private/user/sda/Whonix-Gateway.qcow2"/> <__target dev="vda" bus="virtio"/> <__address type="pci" domain="0x0000" bus="0x00" slot="0x06" function="0x0"/> <__/disk> + [...]
[...] @@ -158,11 +158,11 @@ So here we do the same for the whonix workstation to give it 8GB of memory, with [...] - <__memory dumpCore="off" unit="GiB">8 <__/memory> <__currentMemory unit="GiB">8 <__/currentMemory> + <__memory dumpCore="off" unit="GiB">8 <__currentMemory unit="GiB">8 - [...] <__vcpu placement="static" cpuset="1">4 <__/vcpu> + [...] 4 - [...] <__disk type="file" device="disk"> <__driver name="qemu" type="qcow2"/> <__source file="/run/media/private/user/sda/Whonix-Gateway.qcow2"/> <__target dev="vda" bus="virtio"/> <__address type="pci" domain="0x0000" bus="0x00" slot="0x06" function="0x0"/> <__/disk> + [...] <__source file="/run/media/private/user/sda/Whonix-Gateway.qcow2"/>
[...] @@ -368,6 +368,7 @@ Which after tweaking it accordingly we end up with the following reboot script: # kill all processes that could block veracrypt from closing killall thunar killall xfce4-terminal + systemctl kill libvirtd # close the veracrypt volume using zulucrypt sudo zuluCrypt-cli -q -d /dev/sda @@ -399,7 +400,11 @@ So let's showcase how to do it. First setup the context, booting from the Host O Then open the veracrypt hidden volume: -![](109.png) ![](110.png) ![](111.png) +![](109.png) + +![](110.png) + +![](111.png) and then run script.sh to setup the sensitive VMs: