update qubes memory opsec

This commit is contained in:
anarsec 2024-04-27 16:50:18 +00:00
parent d938fb3dee
commit 9bbc0e364b
No known key found for this signature in database
3 changed files with 45 additions and 13 deletions

View file

@ -111,3 +111,4 @@ For your VPN provider, we recommend either [Mullvad](https://www.privacyguides.o
* Connect to the router via Wi-Fi with "Geologic-5G" or via ethernet to a LAN port. The network traffic from your laptop or phone now connects to a VPN, even though there is no VPN running on your laptop or phone.
* In the case of Tails or Qubes-Whonix, this means that you now connect to the VPN *before* connecting to Tor, which is what we want.
* It's unnecessary to "double up" a VPN — if its running on your networking device, it doesn't need to be running on your phone or laptop, and vice-versa. This means that a phone or laptop running a VPN should disable it before connecting to Wi-Fi configured with a "VPN Kill Switch".
* Give visitors access to the Guest Wi-Fi so that their devices are on a compartmentalized part of the home network (a VLAN, or "virtual LAN"). Their traffic will still be routed through the VPN.