diff --git a/content/posts/e2ee/index.md b/content/posts/e2ee/index.md index 4fe635a..1471924 100644 --- a/content/posts/e2ee/index.md +++ b/content/posts/e2ee/index.md @@ -247,8 +247,8 @@ SimpleX Chat on Whonix does not guarantee Tor [Stream Isolation](/posts/qubes/#w * Copy the file to your new App qube * Make the AppImage executable * In the File Manager, right-click "Properties". Under "Permissions", enable "Allow this file to run as a program". -* Reboot the App qube. In the **Settings → Applications** tab of the new App qube, you may need to click "Refresh applications" for SimpleX Chat to show up. Move SimpleX Chat to the Selected column and press "OK". -* Updates will be handled by **Qubes Update** as you would expect. +* You can now launch SimpleX Chat by double-clicking the AppImage file. +* When a new version of SimpleX Chat is released, you will have to update manually. Download the new version and replace the .AppImage file.
diff --git a/content/posts/tails-best/index.md b/content/posts/tails-best/index.md index 16f6364..1e117de 100644 --- a/content/posts/tails-best/index.md +++ b/content/posts/tails-best/index.md @@ -302,11 +302,10 @@ If you are using Persistent Storage, this is another passphrase that you will ha SiriKali is an encrypted volume program that uses [gocryptfs](https://nuetzlich.net/gocryptfs/) behind the scenes. It is [available in the Debian repository](https://packages.debian.org/bookworm/sirikali) and can be easily installed as [additional software](/posts/tails#installing-additional-software). In Synaptic, install both sirikali and gocryptfs (if you are comfortable on the [command line](/glossary/#command-line-interface-cli), you can use gocryptfs directly and you don't actually need sirikali). If you don't want to reinstall SiriKali every session, you will need to [configure Additional Software in Persistent Storage](/posts/tails-best#unlocking-the-switch). -Using SiriKali to create a volume will make two new directories: a "cipher" directory (`VolumeName/` on your "personal data" USB) where the encrypted files are actually stored and a "plain" directory where you access your decrypted volume once it is mounted there (`/home/amnesia/.SiriKali/VolumeName`). +Using SiriKali to create a volume will make two new directories: a "cipher" directory where the encrypted files are actually stored (`VolumeName/` on your "personal data" USB), and a "plain" directory where you access your decrypted volume once it is mounted there (`/home/amnesia/.SiriKali/VolumeName`). ### Creating an encrypted volume -* Start Tails with an Administration Password. * Plug in the "personal data" USB where you will store this encrypted volume and enter its LUKS passphrase. * Then in SiriKali, press "Create Volume" and select the option "gocryptfs." * You will be prompted for a password. Create a new entry in your KeepassXC file and generate a password using the Generate Password feature (the dice icon).