Update Collections Format + dvm-zulucrypt Qubes guide

This commit is contained in:
deathrow 2023-01-19 13:24:29 -05:00
parent c136ebc3a0
commit 8b38416b38
No known key found for this signature in database
GPG Key ID: FF39D67A22069F73
2 changed files with 45 additions and 2 deletions

View File

@ -5,7 +5,9 @@ title: Collections
permalink: /collections permalink: /collections
--- ---
## Information Pages <div style="text-align:center;">
<p>Various pages on miscellaneous information and topics.</p>
</div>
<br> <br>
@ -15,6 +17,13 @@ A collection of links, articles, resources and more.
<br> <br>
---
## [Qubes OS](./qubes) ## [Qubes OS](./qubes)
A collection of QubesOS related content. A collection of QubesOS related content.
<br>
[dvm-zulucrypt](./qubes/dvm-zulucrypt) - Notes on how to setup a disposable zulucrypt instance for USB devices.

View File

@ -0,0 +1,34 @@
---
layout: default1
description: Notes reguarding DVM zulucrypt
title: dvm-zulucrypt
permalink: /qubes/dvm-zulucrypt
---
Notes on how to setup a disposable zulucrypt instance for USB devices.
<br>
### Prerequesites:
Setup a minimal `kicksecure` template based on [this guide](./#debian-security).
Install the `zulucrypt` package:
``sudo apt install zulucrypt``
<br>
### Setup
- Create an `AppVM` titled `template-dvm-crypt` with the template created above.
- Net Qube: `(none)`
- In `Advanced`, select `Disposable Template`
- In `Applications` select `zuluCrypt`
<br>
After this, create a new `DisposableVM` titled `dvm-crypt` with the template as `template-dvm-crypt` and networking as `(none)`.