mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-11-28 07:30:44 -05:00
Merge branch 'rst' into add-opengraph-extension
This commit is contained in:
commit
1cc1b6efac
116 changed files with 1427 additions and 1383 deletions
|
|
@ -231,8 +231,8 @@ Which virtualization modes do VMs use?
|
|||
|
||||
Here is an overview of the VM virtualization modes:
|
||||
|
||||
.. list-table::
|
||||
:widths: 42 42
|
||||
.. list-table::
|
||||
:widths: 42 42
|
||||
:align: center
|
||||
:header-rows: 1
|
||||
|
||||
|
|
@ -248,7 +248,7 @@ Here is an overview of the VM virtualization modes:
|
|||
- PV
|
||||
* - Stub domains - HVMs
|
||||
- PV
|
||||
|
||||
|
||||
|
||||
|
||||
What's so special about Qubes' GUI virtualization?
|
||||
|
|
@ -543,7 +543,7 @@ or
|
|||
|
||||
- Go to the sysfs (``/sys/bus/pci``), find the right device, detach it from the pciback driver and attach back to the original driver. Replace ``<BDF>`` with your device, for example ``00:1c.2``:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
echo 0000:<BDF> > /sys/bus/pci/drivers/pciback/unbind
|
||||
MODALIAS=`cat /sys/bus/pci/devices/0000:<BDF>/modalias`
|
||||
|
|
@ -570,7 +570,7 @@ For Debian:
|
|||
|
||||
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
$ sudo apt install vlc
|
||||
|
||||
|
|
@ -589,7 +589,7 @@ For Fedora:
|
|||
|
||||
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
$ sudo dnf install vlc
|
||||
|
||||
|
|
@ -672,7 +672,7 @@ I see a screen popup with SeaBios and 4 lines, last one being ``Probing EDD (edd
|
|||
|
||||
From a ``dom0`` prompt, enter:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
qvm-prefs <HVMname> kernel ""
|
||||
|
||||
|
|
@ -696,7 +696,7 @@ I see a "Failed to start Load Kernel Modules" message on boot
|
|||
|
||||
The full message looks like:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: text
|
||||
|
||||
[FAILED] Failed to start Load Kernel Modules.
|
||||
See 'systemctl status systemd-modules-load.service' for details.
|
||||
|
|
@ -834,4 +834,4 @@ Is there a way to automate tasks for continuous integration or DevOps?
|
|||
Yes, Qubes natively supports automation via :doc:`Salt (SaltStack) </user/advanced-topics/salt>`. There is also the unofficial `ansible-qubes toolkit <https://github.com/Rudd-O/ansible-qubes>`__. (**Warning:** Since this is an external project that has not been reviewed or endorsed by the Qubes team, `allowing it to manage dom0 may be a security risk <https://forum.qubes-os.org/t/19075#dom0-precautions>`__.)
|
||||
|
||||
.. |checkmark| image:: /attachment/doc/checkmark.png
|
||||
.. |redx| image:: /attachment/doc/red_x.png
|
||||
.. |redx| image:: /attachment/doc/red_x.png
|
||||
|
|
|
|||
|
|
@ -8,11 +8,11 @@ What is Qubes OS?
|
|||
-----------------
|
||||
|
||||
Qubes OS is a free and open-source, security-oriented operating system for
|
||||
single-user desktop computing. Qubes OS `leverages Xen-based virtualization <https://wiki.xen.org/wiki/Xen_Project_Software_Overview>`__ to allow for the creation and management of isolated compartments called :ref:`qubes <user/reference/glossary:qube>`.
|
||||
single-user desktop computing. Qubes OS leverages `Xen-based virtualization <https://wiki.xen.org/wiki/Xen_Project_Software_Overview>`__ to allow for the creation and management of isolated compartments called :ref:`qubes <user/reference/glossary:qube>`.
|
||||
|
||||
|
||||
These qubes, which are implemented as :ref:`virtual machines (VMs)<user/reference/glossary:vm>`, have specific:
|
||||
|
||||
|
||||
- **Purposes:** with a predefined set of one or many isolated
|
||||
applications, for personal or professional projects, to manage the
|
||||
:doc:`network stack </developer/system/networking>`, :doc:`the firewall </user/security-in-qubes/firewall>`, or to fulfill other
|
||||
|
|
@ -22,7 +22,7 @@ These qubes, which are implemented as :ref:`virtual machines (VMs)<user/referenc
|
|||
:doc:`stripped-down </introduction/getting-started/>` virtual machines based on popular operating systems,
|
||||
such as :doc:`Fedora </user/templates/fedora/fedora>`, :doc:`Debian </user/templates/debian/debian>`, and
|
||||
`Windows <https://github.com/Qubes-Community/Contents/blob/master/docs/os/windows/windows.md>`__.
|
||||
|
||||
|
||||
- **Levels of trust:** from complete to non-existent. All windows are displayed in a unified desktop environment with
|
||||
:doc:`unforgeable colored window borders </introduction/getting-started>` so that different security levels are easily identifiable.
|
||||
|
||||
|
|
@ -49,7 +49,7 @@ Features
|
|||
- **Multiple operating systems** Use multiple operating systems at the same time, including
|
||||
:doc:`Fedora </user/templates/fedora/fedora>`, :doc:`Debian </user/templates/debian/debian/>`, and
|
||||
`Windows <https://github.com/Qubes-Community/Contents/blob/master/docs/os/windows/windows.md>`__
|
||||
|
||||
|
||||
- **Disposables** Create :doc:`disposables </user/how-to-guides/how-to-use-disposables>` on the fly that self-destruct when shut down.
|
||||
|
||||
- **Whonix integration** Run `Tor <https://www.torproject.org/>`__ securely system-wide using `Whonix with Qubes <https://www.whonix.org/wiki/Qubes>`__.
|
||||
|
|
@ -100,10 +100,6 @@ and data across these compartments.
|
|||
Qubes allows you to compartmentalize your digital life
|
||||
------------------------------------------------------
|
||||
|
||||
.. figure:: /attachment/site/qubes-partition-data-flows.jpg
|
||||
:alt: Compartmentalization example
|
||||
|
||||
|
||||
Many of us are initially surprised to learn that our devices do not
|
||||
support the kind of secure compartmentalization that our lives demand, and
|
||||
we're disappointed that software vendors rely on generic defenses that
|
||||
|
|
@ -127,6 +123,8 @@ physical computer without having to worry about a single successful
|
|||
cyberattack taking down your entire digital life in one fell swoop. In
|
||||
fact, Qubes has `distinct advantages over physical air gaps <https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf>`__.
|
||||
|
||||
.. figure:: /attachment/site/qubes-partition-data-flows.jpg
|
||||
:alt: Compartmentalization example
|
||||
|
||||
Made to support vulnerable users and power users alike
|
||||
------------------------------------------------------
|
||||
|
|
@ -141,7 +139,7 @@ plug in devices, and install software free from worry. It's a place where
|
|||
**you** have control over your software, not the other way around.
|
||||
(See some :doc:`examples of how different types of users organize their qubes </user/how-to-guides/how-to-organize-your-qubes>`.)
|
||||
|
||||
Qubes is also powerful. Organizations like the `Freedom of the Press Foundation <https://securedrop.org/news/piloting-securedrop-workstation-qubes-os>`__,
|
||||
Qubes is also powerful. Organizations like the `Freedom of the Press Foundation <https://securedrop.org/news/piloting-securedrop-workstation-qubes-os>`__,
|
||||
`Mullvad <https://twitter.com/mullvadnet/status/631010362083643392>`__,
|
||||
and `Let's Encrypt <https://twitter.com/letsencrypt/status/1239934557710737410>`__
|
||||
rely on Qubes as they build and maintain critical privacy and
|
||||
|
|
|
|||
|
|
@ -207,13 +207,13 @@ Use collapsible sections for long, nonessential content
|
|||
|
||||
On GitHub, create collapsible sections in Markdown like so:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: html
|
||||
|
||||
<details>
|
||||
<summary>Summary goes here. This line is optional.</summary>
|
||||
|
||||
|
||||
Long, nonessential content goes here. You can put a code block here, but make sure to leave empty lines before and after the fence lines (```).
|
||||
|
||||
|
||||
</details>
|
||||
|
||||
|
||||
|
|
|
|||
|
|
@ -36,7 +36,7 @@ How are Tor users counted?
|
|||
|
||||
We estimate the number of Tor users as a proportion of the total number of *requests* from Tor exit nodes on the assumption that the proportion of users to requests is roughly the same for both clearnet and Tor users. To be precise, the formula is:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: text
|
||||
|
||||
tor_users = tor_requests * (plain_users / plain_requests)
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue