diff --git a/qubesos/index.md b/qubesos/index.md index 9e9e318..0b735ed 100644 --- a/qubesos/index.md +++ b/qubesos/index.md @@ -7,7 +7,7 @@ xmr: 87iB34vdFvNULrAjyfVAZ7jMXc8vbq9tLGMLjo6WC8N9Xo2JFaa8Vkp6dwXBt8rK12Xpz5z1rTa # Qubes Host OS setup guide -**DISCLAIMER: Qubes OS is not suitable as a Host OS for our long-term [Deniability tutorials](../deniability/index.md) because it lacks the [live mode and ram-wipe](../livemode/index.md) feature** (which is a hard requirement), we consider Qubes OS as suitable for Private and Anonymous uses at best, **IT CANNOT be used for long-term sensitive use** unlike with our main [Kicksecure Host OS](../linux/index.md) recommendation. +**DISCLAIMER: Qubes OS is not suitable as a Host OS for our long-term [Deniability tutorials](../../opsec/deniability/index.md) because it lacks the [live mode and ram-wipe](../../opsec/livemode/index.md) feature** (which is a hard requirement), we consider Qubes OS as suitable for Private and Anonymous uses at best, **IT CANNOT be used for long-term sensitive use** unlike with our main [Kicksecure Host OS](../../opsec/linux/index.md) recommendation. ![alt text](image-1.png) @@ -15,7 +15,7 @@ xmr: 87iB34vdFvNULrAjyfVAZ7jMXc8vbq9tLGMLjo6WC8N9Xo2JFaa8Vkp6dwXBt8rK12Xpz5z1rTa Official site of Qubes OS -When you land into this tutorial, I assume you already have some Linux experience, if not this might not be suitable for you, since Qubes OS is **not very user-friendly**. I recommend you to try some normal Linux distribution first [How to Install Linux as a beginner](../linux/index.md) +When you land into this tutorial, I assume you already have some Linux experience, if not this might not be suitable for you, since Qubes OS is **not very user-friendly**. I recommend you to try some normal Linux distribution first [How to Install Linux as a beginner](../../opsec/linux/index.md) Qubes OS is a very cutting edge OS that uses virtualization everywhere to compartmentalize your digital life. It is technically not a Linux distribution, it is built on Xen which is a type 1 hypervisor that runs on bare metal, @@ -35,7 +35,7 @@ Qubes OS is designed to have a basket of different VMs with different **trust le For example if you want to have many different network configs like below link to satisfy your different online identities, Qubes OS is the right tool. -[Theories about building up your online identities](../internetsegmentation/index.md). Check this theory about online identities, with Qubes OS you can easily build up chains of vm for doing whatever you want, for example different combination of vpn/proxy/tor +[Theories about building up your online identities](../../opsec/internetsegmentation/index.md). Check this theory about online identities, with Qubes OS you can easily build up chains of vm for doing whatever you want, for example different combination of vpn/proxy/tor ![](qubes-trust-level-architecture.png) @@ -97,9 +97,9 @@ Final thing is remembering to turn on vt-x or cpu virtualization support, since For example, you can expect something look like this -![](../linux/19.png) +![](../../opsec/linux/19.png) -![](../linux/20.png) +![](../../opsec/linux/20.png) Finally, reboot and choose your usb as a boot device @@ -151,5 +151,5 @@ Click done and let the scripts run, do not interrupt it by closing your computer And finally we get our Qubes, in next tutorial we will start to compartmentalize our online activities by creating different qubes. -Next tutorial : [How to use qubes for different online activities](../qubesosnetwork/index.md) +Next tutorial : [How to use qubes for different online activities](../../opsec/qubesosnetwork/index.md) diff --git a/qubesosnetwork/index.md b/qubesosnetwork/index.md index a9188f1..a188cfc 100644 --- a/qubesosnetwork/index.md +++ b/qubesosnetwork/index.md @@ -6,7 +6,7 @@ xmr: 87iB34vdFvNULrAjyfVAZ7jMXc8vbq9tLGMLjo6WC8N9Xo2JFaa8Vkp6dwXBt8rK12Xpz5z1rTa --- # How to navigate qubes OS and segment your internet uses -**DISCLAIMER: Qubes OS is not suitable as a Host OS for our long-term [Deniability tutorials](../deniability/index.md) because it lacks the [live mode and ram-wipe](../livemode/index.md) feature** (which is a hard requirement), we consider Qubes OS as suitable for Private and Anonymous uses at best, **IT CANNOT be used for long-term sensitive use** unlike with our main [Kicksecure Host OS](../linux/index.md) recommendation. ([related forum thread](https://forum.qubes-os.org/t/what-is-the-consensus-on-running-vms-in-a-hidden-veracrypt-volume/28721/9)) +**DISCLAIMER: Qubes OS is not suitable as a Host OS for our long-term [Deniability tutorials](../../opsec/deniability/index.md) because it lacks the [live mode and ram-wipe](../../opsec/livemode/index.md) feature** (which is a hard requirement), we consider Qubes OS as suitable for Private and Anonymous uses at best, **IT CANNOT be used for long-term sensitive use** unlike with our main [Kicksecure Host OS](../../opsec/linux/index.md) recommendation. ([related forum thread](https://forum.qubes-os.org/t/what-is-the-consensus-on-running-vms-in-a-hidden-veracrypt-volume/28721/9)) ![alt text](../qubesos/image-1.png) @@ -14,7 +14,7 @@ xmr: 87iB34vdFvNULrAjyfVAZ7jMXc8vbq9tLGMLjo6WC8N9Xo2JFaa8Vkp6dwXBt8rK12Xpz5z1rTa In this tutorial we will set up the environment for public, private and anonymous online identities, and how to use qubes os. -If you are still not familiar with the identity model please check this link [Theories about building up your online identities](../internetsegmentation/index.md) +If you are still not familiar with the identity model please check this link [Theories about building up your online identities](../../opsec/internetsegmentation/index.md)