whonix simplex

This commit is contained in:
anarsec 2024-04-22 23:46:16 +00:00
parent 8b617cdb37
commit c78b17e068
No known key found for this signature in database
2 changed files with 3 additions and 4 deletions

View file

@ -247,8 +247,8 @@ SimpleX Chat on Whonix does not guarantee Tor [Stream Isolation](/posts/qubes/#w
* Copy the file to your new App qube
* Make the AppImage executable
* In the File Manager, right-click "Properties". Under "Permissions", enable "Allow this file to run as a program".
* Reboot the App qube. In the **Settings → Applications** tab of the new App qube, you may need to click "Refresh applications" for SimpleX Chat to show up. Move SimpleX Chat to the Selected column and press "OK".
* Updates will be handled by **Qubes Update** as you would expect.
* You can now launch SimpleX Chat by double-clicking the AppImage file.
* When a new version of SimpleX Chat is released, you will have to update manually. Download the new version and replace the .AppImage file.
<br>
</details>

View file

@ -302,11 +302,10 @@ If you are using Persistent Storage, this is another passphrase that you will ha
SiriKali is an encrypted volume program that uses [gocryptfs](https://nuetzlich.net/gocryptfs/) behind the scenes. It is [available in the Debian repository](https://packages.debian.org/bookworm/sirikali) and can be easily installed as [additional software](/posts/tails#installing-additional-software). In Synaptic, install both sirikali and gocryptfs (if you are comfortable on the [command line](/glossary/#command-line-interface-cli), you can use gocryptfs directly and you don't actually need sirikali). If you don't want to reinstall SiriKali every session, you will need to [configure Additional Software in Persistent Storage](/posts/tails-best#unlocking-the-switch).
Using SiriKali to create a volume will make two new directories: a "cipher" directory (`VolumeName/` on your "personal data" USB) where the encrypted files are actually stored and a "plain" directory where you access your decrypted volume once it is mounted there (`/home/amnesia/.SiriKali/VolumeName`).
Using SiriKali to create a volume will make two new directories: a "cipher" directory where the encrypted files are actually stored (`VolumeName/` on your "personal data" USB), and a "plain" directory where you access your decrypted volume once it is mounted there (`/home/amnesia/.SiriKali/VolumeName`).
### Creating an encrypted volume
* Start Tails with an Administration Password.
* Plug in the "personal data" USB where you will store this encrypted volume and enter its LUKS passphrase.
* Then in SiriKali, press "Create Volume" and select the option "gocryptfs."
* You will be prompted for a password. Create a new entry in your KeepassXC file and generate a password using the Generate Password feature (the dice icon).