mirror of
http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/selfhosting-blogposts.git
synced 2025-07-01 09:16:40 +00:00
fix some links in qubesos tutorial
This commit is contained in:
parent
b30b526e74
commit
d5696b304a
2 changed files with 8 additions and 8 deletions
|
@ -7,7 +7,7 @@ xmr: 87iB34vdFvNULrAjyfVAZ7jMXc8vbq9tLGMLjo6WC8N9Xo2JFaa8Vkp6dwXBt8rK12Xpz5z1rTa
|
|||
# Qubes Host OS setup guide
|
||||
|
||||
|
||||
**DISCLAIMER: Qubes OS is not suitable as a Host OS for our long-term [Deniability tutorials](../deniability/index.md) because it lacks the [live mode and ram-wipe](../livemode/index.md) feature** (which is a hard requirement), we consider Qubes OS as suitable for Private and Anonymous uses at best, **IT CANNOT be used for long-term sensitive use** unlike with our main [Kicksecure Host OS](../linux/index.md) recommendation.
|
||||
**DISCLAIMER: Qubes OS is not suitable as a Host OS for our long-term [Deniability tutorials](../../opsec/deniability/index.md) because it lacks the [live mode and ram-wipe](../../opsec/livemode/index.md) feature** (which is a hard requirement), we consider Qubes OS as suitable for Private and Anonymous uses at best, **IT CANNOT be used for long-term sensitive use** unlike with our main [Kicksecure Host OS](../../opsec/linux/index.md) recommendation.
|
||||
|
||||

|
||||
|
||||
|
@ -15,7 +15,7 @@ xmr: 87iB34vdFvNULrAjyfVAZ7jMXc8vbq9tLGMLjo6WC8N9Xo2JFaa8Vkp6dwXBt8rK12Xpz5z1rTa
|
|||
|
||||
Official site of Qubes OS <https://www.qubes-os.org>
|
||||
|
||||
When you land into this tutorial, I assume you already have some Linux experience, if not this might not be suitable for you, since Qubes OS is **not very user-friendly**. I recommend you to try some normal Linux distribution first [How to Install Linux as a beginner](../linux/index.md)
|
||||
When you land into this tutorial, I assume you already have some Linux experience, if not this might not be suitable for you, since Qubes OS is **not very user-friendly**. I recommend you to try some normal Linux distribution first [How to Install Linux as a beginner](../../opsec/linux/index.md)
|
||||
|
||||
Qubes OS is a very cutting edge OS that uses virtualization everywhere to compartmentalize your digital life. It is technically not a Linux distribution, it is built on Xen which is a type 1 hypervisor that runs on bare metal, <https://en.wikipedia.org/wiki/Xen>
|
||||
|
||||
|
@ -35,7 +35,7 @@ Qubes OS is designed to have a basket of different VMs with different **trust le
|
|||
|
||||
For example if you want to have many different network configs like below link to satisfy your different online identities, Qubes OS is the right tool.
|
||||
|
||||
[Theories about building up your online identities](../internetsegmentation/index.md). Check this theory about online identities, with Qubes OS you can easily build up chains of vm for doing whatever you want, for example different combination of vpn/proxy/tor
|
||||
[Theories about building up your online identities](../../opsec/internetsegmentation/index.md). Check this theory about online identities, with Qubes OS you can easily build up chains of vm for doing whatever you want, for example different combination of vpn/proxy/tor
|
||||
|
||||

|
||||
|
||||
|
@ -97,9 +97,9 @@ Final thing is remembering to turn on vt-x or cpu virtualization support, since
|
|||
|
||||
For example, you can expect something look like this
|
||||
|
||||

|
||||

|
||||
|
||||

|
||||

|
||||
|
||||
Finally, reboot and choose your usb as a boot device
|
||||
|
||||
|
@ -151,5 +151,5 @@ Click done and let the scripts run, do not interrupt it by closing your computer
|
|||
|
||||
And finally we get our Qubes, in next tutorial we will start to compartmentalize our online activities by creating different qubes.
|
||||
|
||||
Next tutorial : [How to use qubes for different online activities](../qubesosnetwork/index.md)
|
||||
Next tutorial : [How to use qubes for different online activities](../../opsec/qubesosnetwork/index.md)
|
||||
|
||||
|
|
|
@ -6,7 +6,7 @@ xmr: 87iB34vdFvNULrAjyfVAZ7jMXc8vbq9tLGMLjo6WC8N9Xo2JFaa8Vkp6dwXBt8rK12Xpz5z1rTa
|
|||
---
|
||||
# How to navigate qubes OS and segment your internet uses
|
||||
|
||||
**DISCLAIMER: Qubes OS is not suitable as a Host OS for our long-term [Deniability tutorials](../deniability/index.md) because it lacks the [live mode and ram-wipe](../livemode/index.md) feature** (which is a hard requirement), we consider Qubes OS as suitable for Private and Anonymous uses at best, **IT CANNOT be used for long-term sensitive use** unlike with our main [Kicksecure Host OS](../linux/index.md) recommendation. ([related forum thread](https://forum.qubes-os.org/t/what-is-the-consensus-on-running-vms-in-a-hidden-veracrypt-volume/28721/9))
|
||||
**DISCLAIMER: Qubes OS is not suitable as a Host OS for our long-term [Deniability tutorials](../../opsec/deniability/index.md) because it lacks the [live mode and ram-wipe](../../opsec/livemode/index.md) feature** (which is a hard requirement), we consider Qubes OS as suitable for Private and Anonymous uses at best, **IT CANNOT be used for long-term sensitive use** unlike with our main [Kicksecure Host OS](../../opsec/linux/index.md) recommendation. ([related forum thread](https://forum.qubes-os.org/t/what-is-the-consensus-on-running-vms-in-a-hidden-veracrypt-volume/28721/9))
|
||||
|
||||

|
||||
|
||||
|
@ -14,7 +14,7 @@ xmr: 87iB34vdFvNULrAjyfVAZ7jMXc8vbq9tLGMLjo6WC8N9Xo2JFaa8Vkp6dwXBt8rK12Xpz5z1rTa
|
|||
|
||||
In this tutorial we will set up the environment for public, private and anonymous online identities, and how to use qubes os.
|
||||
|
||||
If you are still not familiar with the identity model please check this link [Theories about building up your online identities](../internetsegmentation/index.md)
|
||||
If you are still not familiar with the identity model please check this link [Theories about building up your online identities](../../opsec/internetsegmentation/index.md)
|
||||
|
||||
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue