Qubes Best Practices and whonix section

This commit is contained in:
deathrow 2022-12-06 11:54:36 -05:00
parent 81eacba5fd
commit 775f27fca2
No known key found for this signature in database
GPG Key ID: FF39D67A22069F73

View File

@ -16,12 +16,13 @@ Website: [https://qubes-os.org](https://qubes-os.org) <button type="button" clas
#### Table of contents:
-\>> [Best Practices](#best-practices) <br>
-\>> [Template Setup](#template-setup) <br>
- -\> *[Debian](#debian)* <br>
- -\> *[Security](#debian-security)* <br>
- -\> *[Fedora](#fedora)* <br>
- -\> *[Upgrading Fedora](#upgrading-fedora)* <br>
- -\> *[Whonix](#whonix)* <br>
-\>> [Links & Resources](#links--resources) <br>
- -\> *[Customizations](#customizations)* <br>
@ -29,6 +30,31 @@ Website: [https://qubes-os.org](https://qubes-os.org) <button type="button" clas
- -\> *[Templates](#templates)* <br>
- -\> *[Wiki](#wiki)* <br>
<br>
### Best Practices
- All repositories should be routed over Tor and [onionized](https://anonymousland.org/#onionizing-repositories)
- Each application should be installed in its own separate minimal template Qube (provided your system has applicable resources for such)
- `sys-usb` should be configured on a laptop
- Avoid using `sleep` on a Qubes system
- Read all of the Qubes documentation
- Frequently visit the Qubes forums
- Consider creating a shutdown script / shortcut
- Consider if you would benefit by creating backups of your Qubes system
- Update frequently
- Harden Qubes if applicable (debian kicksecure, Fedora CORP hardened-malloc, etc.)
<br>
### Template Setup
@ -209,6 +235,28 @@ rm /var/tmp/template-upgrade-cache.img
<br>
#### Whonix
Whonix-GW and Whonix-WS should be upgraded via:
```
upgrade-nonroot
```
Installing LKRG:
```
sudo apt install --no-install-recommends lkrg-dkms
```
Enabling Hardened Malloc:
```
echo "/usr/lib/libhardened_malloc.so/libhardened_malloc.so" | sudo tee /etc/ld.so.preload
```
<br>
### Links & Resources
- [qpowerkill](https://github.com/NobodySpecial256/qpowerkill)