Move translatable pages into qubes-doc

QubesOS/qubes-issues#2929
This commit is contained in:
Andrew David Wong 2017-07-19 20:30:21 -05:00
parent f074152217
commit 3db4fe4ed5
No known key found for this signature in database
GPG key ID: 8CE137352A019A17
18 changed files with 2951 additions and 0 deletions

54
about/code-of-conduct.md Normal file
View file

@ -0,0 +1,54 @@
---
layout: default
title: Code of Conduct
permalink: /code-of-conduct/
---
## Our Pledge
The Qubes OS project creates a reasonably secure OS. In the interest of fostering an open and welcoming environment, we as contributors and maintainers pledge to make participation in our project and our community a harassment-free experience for everyone, regardless of age, body size, disability, ethnicity, gender identity and expression, level of experience, nationality, personal appearance, race, religion, sexual identity and orientation, or other characteristic.
## Our Standards
Examples of behavior that contributes to creating a positive environment include:
- Using welcoming and inclusive language
- Being respectful of differing viewpoints and experiences
- Gracefully accepting constructive criticism
- Focusing on what is best for the community
- Showing empathy towards other community members
Examples of unacceptable behavior by participants include:
- The use of sexualized language or imagery and unwelcome sexual attention or advances
- Trolling, insulting/derogatory comments, and personal or political attacks
- Reinforcing stereotypical models for illustration of non-technical users (e.g. our mothers/grandmothers, etc.)
- Public or private harassment, as defined by the [Citizen Code of Conduct](http://citizencodeofconduct.org/)
- Publishing others' private information, such as a physical or electronic address, without explicit permission
- Other conduct which could reasonably be considered inappropriate in a professional setting
(Please also see our [mailing list discussion guidelines](https://www.qubes-os.org/mailing-lists/#discussion-list-guidelines).)
## Our Responsibilities
Project maintainers are responsible for clarifying the standards of acceptable behavior and are expected to take appropriate and fair corrective action in response to any instances of unacceptable behavior. This action can include removing, editing, or rejecting comments, commits, code, wiki edits, issues, and other contributions, or to ban temporarily or permanently any contributor for other behaviors that they deem inappropriate, threatening, offensive, or harmful.
## Scope
This Code of Conduct applies both within project spaces and in public spaces when an individual is representing the project or its community. Examples of representing a project or community include using an official project e-mail address, posting via an official social media account, or acting as an appointed representative at an online or offline event. Representation of a project may be further defined and clarified by project maintainers.
## Enforcement
Instances of abusive, harassing, or otherwise unacceptable behavior may be reported by contacting the project team at `mods@qubes-os.org`. All complaints will be reviewed and investigated and will result in a response that is deemed necessary and appropriate to the circumstances. The project team is obligated to maintain confidentiality with regard to the reporter of an incident. Further details of specific enforcement policies may be posted separately.
Project maintainers who do not follow or enforce the Code of Conduct in good faith may face temporary or permanent repercussions as determined by other members of the project's leadership.
## A note on trust
Expect all contributions to be reviewed with some amount of healthy adversarial skepticism, regardless of your perceived standing in the community.
This is a security project, and allowing ourselves to get complacent while reviewing code simply because it comes from a well-known party would not be in the best interest of the project.
Please try not to get offended if you perceive your contributions as being met with distrust -- we are most definitely thankful and appreciative of your efforts, but must also remain vigilant in order to ensure continued quality and safeguard against potential sabotage.
## Attribution
This Code of Conduct is adapted from the [Contributor Covenant, version 1.4](http://contributor-covenant.org/version/1/4) and the [Rust Code of Conduct](https://www.rust-lang.org/en-US/conduct.html).

80
about/donate.md Normal file
View file

@ -0,0 +1,80 @@
---
layout: default
title: Donations
permalink: /donate/
redirect_from:
- /en/donate/
- /doc/Donations/
- /wiki/Donations/
---
**News:** [Qubes OS Begins Commercialization and Community Funding Efforts!](/news/2016/11/30/qubes-commercialization/)
Thank you for your interest in supporting Qubes! The Qubes Project accepts
monetary donations in
<a href="#bitcoin"><i class="fa fa-btc black-icon" aria-hidden="true"></i> Bitcoin</a>
(preferred) or by
<a href="#credit-card"><i class="fa fa-credit-card black-icon" aria-hidden="true"></i> Credit Card</a>.
If you are interested instead in donating hardware or providing substantial and
sustained [funding], please visit the [Qubes Partners page].
<h2 id="bitcoin"><img src="/attachment/site/btc.png"> Donate Bitcoin</h2>
Bitcoin donations have zero administrative overhead for us, which means 100% of
your donation goes towards supporting Qubes development!
(Please note that we do not currently accept donations in other cryptocurrencies.)
#### Donation Address:
<form class="more-bottom">
<div class="form-group">
<div class="input-group input-group-lg">
<span class="input-group-addon" id="donate-btn-icon"><i class="fa fa-btc"></i></span>
<input type="text" class="form-control" aria-describedby="donate-btc-icon" value="3GakuQQDUGyyUnV1p5Jc3zd6CpQDkDwmDq" readonly>
</div>
</div>
</form>
#### How to Verify the Address
The donation address can be verified via the [Qubes Security Pack]
(QSP or `qubes-secpack`), specifically in the [fund] directory. Detailed
instructions for verifying the digital signatures are available [here][verify].
You can also view the address on [blockexplorer.com] and [blockchain.info].
#### About the Donation Fund
The Qubes Project maintains a decentralized Bitcoin fund using a
multi-signature wallet. This means that no single person is capable of spending
these funds. For further details, please see [here][announcement].
<h2 id="credit-card"><i class="fa fa-credit-card" aria-hidden="true"></i> Donate with a Credit Card</h2>
You can donate towards Qubes development using your credit card through
[Open Collective] (which uses [Stripe][stripe] to process financial
transactions). Please note that, unlike [Bitcoin donations], we lose
[~14%][open-collective-faq] of every credit card donation to administrative
overhead.
---
## About Your Donation
- We will use your donations to fund our continued development of Qubes.
- We regret that we cannot implement requested features based on funding. (If
everybody were to decide, then nothing would get implemented.)
- Donations to the Qubes project are not tax-deductible.
[funding]: /funding/
[Qubes Partners page]: /partners/
[Qubes Security Pack]: /security/pack/
[fund]: https://github.com/QubesOS/qubes-secpack/tree/master/fund
[announcement]: /news/2016/07/13/qubes-distributed-fund/
[verify]: /security/pack/#how-to-obtain-verify-and-read
[blockexplorer.com]: https://blockexplorer.com/address/3GakuQQDUGyyUnV1p5Jc3zd6CpQDkDwmDq
[blockchain.info]: https://blockchain.info/address/3GakuQQDUGyyUnV1p5Jc3zd6CpQDkDwmDq
[Open Collective]: https://opencollective.com/qubes-os
[Bitcoin donations]: #bitcoin
[open-collective-faq]: https://opencollective.com/faq
[stripe]: https://stripe.com

121
about/experts.md Normal file
View file

@ -0,0 +1,121 @@
---
layout: home
title: Experts
permalink: /experts/
---
<div class="home-content container">
<div class="row more-top">
<div class="col-lg-12 col-md-12">
<h2 class="text-center"><i class="fa fa-thumbs-o-up"></i> What the experts are saying about Qubes</h2>
</div>
</div>
<div class="white-box more-bottom">
<div class="row featured-quotes">
<div class="col-lg-3 col-md-3 text-center">
<a class="avatar-large" href="https://twitter.com/Snowden/status/781493632293605376" target="_blank">
<img src="/attachment/site/picture-snowden.jpg">
</a>
</div>
<div class="col-lg-9 col-md-9 more-top">
<a href="https://twitter.com/Snowden/status/781493632293605376" target="_blank">
<blockquote>"If you're serious about security, QubesOS is the best OS available today. It's what I use, and free. Nobody does VM isolation better."
<i class="fa fa-twitter fa-fw" aria-hidden="true"></i>
<footer>Edward Snowden<cite>, whistleblower and privacy advocate</cite></footer>
</blockquote>
</a>
</div>
</div>
<div class="row featured-quotes">
<div class="col-lg-3 col-md-3 text-center">
<a class="avatar-large" href="https://twitter.com/hashbreaker/status/577206817475850240" target="_blank">
<img src="/attachment/site/picture-dan-bernstein.jpg">
</a>
</div>
<div class="col-lg-9 col-md-9 more-top">
<a href="https://twitter.com/hashbreaker/status/577206817475850240" target="_blank">
<blockquote>"Happy thought of the day: An attacker who merely finds a browser bug can't listen to my microphone except when I've told Qubes to enable it."
<i class="fa fa-twitter fa-fw" aria-hidden="true"></i>
<footer>Daniel J. Bernstein<cite title="Source Title">, mathematician, cryptologist, computer scientist</cite></footer>
</blockquote>
</a>
</div>
</div>
<div class="row featured-quotes">
<div class="col-lg-3 col-md-3 text-center">
<a class="avatar-large" href="https://twitter.com/micahflee/status/577998730340622337" target="_blank">
<img src="/attachment/site/picture-micah-lee.jpg">
</a>
</div>
<div class="col-lg-9 col-md-9 more-top">
<a href="https://twitter.com/micahflee/status/577998730340622337" target="_blank">
<blockquote>"When I use Qubes I feel like a god. Software thinks that it's in control, that it can do what it wants? It can't. I'm in control."
<i class="fa fa-twitter fa-fw" aria-hidden="true"></i>
<footer>Micah Lee<cite title="Source Title">, Freedom of the Press Foundation, The Intercept</cite></footer>
</blockquote>
</a>
</div>
</div>
<div class="row featured-quotes">
<div class="col-lg-3 col-md-3 text-center">
<a class="avatar-large" href="https://twitter.com/isislovecruft" target="_blank">
<img src="/attachment/site/picture-isis.jpg">
</a>
</div>
<div class="col-lg-9 col-md-9 more-top">
<a href="https://twitter.com/isislovecruft" target="_blank">
<blockquote>"With QubesOS, I feel more comfortable accessing Tor Project infrastructure from the same laptop I use to execute random GameBoy ROMs I downloaded from the internet."
<i class="fa fa-twitter fa-fw" aria-hidden="true"></i>
<footer>Isis Agora Lovecruft<cite title="Source Title">, cypherpunk, Tor Project core developer</cite></footer>
</blockquote>
</a>
</div>
</div>
<div class="row featured-quotes">
<div class="col-lg-3 col-md-3 text-center">
<a class="avatar-large" href="https://twitter.com/csoghoian/status/756212792785534976" target="_blank">
<img src="/attachment/site/picture-soghoian.jpg">
</a>
</div>
<div class="col-lg-9 col-md-9 more-top">
<a href="https://twitter.com/csoghoian/status/756212792785534976" target="_blank">
<blockquote>"I am so much happier and less stressed out after switching to QubesOS. Can wholeheartedly recommend."
<i class="fa fa-twitter fa-fw" aria-hidden="true"></i>
<footer>Christopher Soghoian<cite title="Source Title">, privacy researcher, activist, and principal technologist at the ACLU</cite></footer>
</blockquote>
</a>
</div>
</div>
<div class="row featured-quotes">
<div class="col-lg-3 col-md-3 text-center">
<a class="avatar-large" href="https://twitter.com/petertoddbtc/status/709098684672135168" target="_blank">
<img src="/attachment/site/picture-todd.jpg">
</a>
</div>
<div class="col-lg-9 col-md-9 more-top">
<a href="https://twitter.com/petertoddbtc/status/709098684672135168" target="_blank">
<blockquote>"One of the most valuable parts of installing QubesOS was forcing myself to think through exactly what vulns [vulnerabilities] I have."
<i class="fa fa-twitter fa-fw" aria-hidden="true"></i>
<footer>Peter Todd<cite title="Source Title">, Applied Cryptography Consultant</cite></footer>
</blockquote>
</a>
</div>
</div>
<div class="row featured-quotes">
<div class="col-lg-3 col-md-3 text-center">
<a class="avatar-large" href="https://twitter.com/legind/status/742504400854257664" target="_blank">
<img src="/attachment/site/picture-bill-budington.jpg">
</a>
</div>
<div class="col-lg-9 col-md-9 more-top">
<a href="https://twitter.com/legind/status/742504400854257664" target="_blank">
<blockquote>"I really like it [Qubes OS]. If your hardware supports it, I recommend it. Everything is super well thought-out."
<i class="fa fa-twitter fa-fw" aria-hidden="true"></i>
<footer>Bill Budington<cite title="Source Title">, Security Engineer & Technologist, Electronic Frontier Foundation</cite></footer>
</blockquote>
</a>
</div>
</div>
</div>
{% include footer.html %}
</div>

71
about/funding.md Normal file
View file

@ -0,0 +1,71 @@
---
layout: default
title: Funding
permalink: /funding/
---
Qubes OS Project Funding
========================
Qubes OS is [free and open-source software][FOSS] (read about the [license]).
This means that Qubes OS is not a paid or proprietary product. We do not earn
any revenue by selling it. Instead, we rely external sources of funding and [donations][donate] from
individuals and organizations who find the work we do valuable and who in turn
rely on Qubes OS for secure computing in their work and personal lives. (Read
more about our [partners].)
We plan to fund continued Qubes OS development through a diverse mix of sources,
both in terms of the entities providing the funding and the timelines of the
funding.
We are seeking new sources of funding and welcome your help in these endeavors.
If you or your organization has relevant knowledge, experience, leads, or
resources and would like to help us secure the future of Qubes OS, please
[contact us].
Below you can find the funding of the project by year.
2017
----
| Funding tiers
| ----------|
| $250,000+ | [Invisible Things Lab]
| $50,000+ |
| $10,000+ |
2016
----
| Funding tiers
| --------- |
| $250,000+ | [Invisible Things Lab], [Open Technology Fund]
| $50,000+ |
| $10,000+ | [NLnet Foundation]
2015
----
| Funding tiers
| --------- |
| $100,000+ | [Open Technology Fund]
| $50,000+ |
| $10,000+ |
2010-2014
---------
| Funding tiers
| --------- |
| $∞ | [Invisible Things Lab]
| $50,000+ |
| $10,000+ |
[Open Technology Fund]: /partners/#open-technology-fund
[NLnet Foundation]: /partners/#nlnet-foundation
[Invisible Things Lab]: /partners/#invisible-things-lab
[FOSS]: https://en.wikipedia.org/wiki/Free_and_open-source_software
[license]: /doc/license/
[partners]: /partners/
[contact us]: mailto:funding@qubes-os.org
[donate]: /donate/

289
about/home.html Normal file
View file

@ -0,0 +1,289 @@
---
layout: home
title: "Qubes OS: A reasonably secure operating system"
permalink: /
redirect_from:
- /wiki/
- /wiki/WikiStart/
- /trac/
- /trac/WikiStart/
---
<!-- Featured Content -->
<div class="home-banner text-center more-bottom">
<div class="container-fluid">
<div class="row more-bottom">
<div class="col-lg-8 col-lg-offset-2 col-md-8 col-md-offset-2">
<h1 class="add-top">
<strong>Qubes</strong> OS
<small>A reasonably secure operating system</small>
</h1>
</div>
</div>
<div class="clearfix"></div>
<div class="row more-bottom">
<div class="col-lg-8 col-lg-offset-2 col-md-8 col-md-offset-2">
<div class="home-big-button">
<a class="btn btn-lg btn-primary btn-block" href="/downloads/" role="button">
Download &amp; Install<br>
<small>Version 3.2</small>
</a>
</div>
</div>
</div>
<div class="clearfix"></div>
<div class="row more-top">
<div class="col-lg-4 col-lg-offset-2 col-md-4 col-md-offset-2">
<a class="black-link" href="/intro/">What is Qubes OS?</a>
</div>
<div class="col-lg-4 col-md-4">
<a class="black-link" href="/video-tours/"><i class="fa fa-play-circle"></i> Watch a Video Tour</a>
</div>
</div>
<div class="clearfix"></div>
</div>
</div>
<div class="home-content container">
<!-- Experts -->
<div class="row">
<div class="col-lg-12 col-md-12">
<h2 class="text-center"><i class="fa fa-thumbs-o-up"></i> What the experts are saying</h2>
</div>
</div>
<div class="white-box more-bottom">
<div class="row featured-quotes">
<div class="col-lg-1 col-md-1 text-center">
<a class="avatar" href="https://twitter.com/Snowden/status/781493632293605376" target="_blank">
<img src="attachment/site/picture-snowden.jpg">
</a>
</div>
<div class="col-lg-5 col-md-5">
<a href="https://twitter.com/Snowden/status/781493632293605376" target="_blank">
<blockquote>"If you're serious about security, Qubes OS is the best OS available today. It's what I use, and free."
<i class="fa fa-twitter" aria-hidden="true"></i>
<footer>Edward Snowden<cite>, whistleblower and privacy advocate</cite></footer>
</blockquote>
</a>
</div>
<div class="col-lg-1 col-md-1 text-center">
<a class="avatar" href="https://twitter.com/hashbreaker/status/577206817475850240" target="_blank">
<img src="attachment/site/picture-dan-bernstein.jpg">
</a>
</div>
<div class="col-lg-5 col-md-5">
<a href="https://twitter.com/hashbreaker/status/577206817475850240" target="_blank">
<blockquote>"Happy thought of the day: An attacker who merely finds a browser bug can't listen to my microphone except when I've told Qubes to enable it."
<i class="fa fa-twitter fa-fw" aria-hidden="true"></i>
<footer>Daniel J. Bernstein<cite title="Source Title">, mathematician, cryptologist, computer scientist</cite></footer>
</blockquote>
</a>
</div>
</div>
<div class="row featured-quotes">
<div class="col-lg-1 col-md-1 text-center">
<a class="avatar" href="https://twitter.com/micahflee/status/577998730340622337" target="_blank">
<img src="attachment/site/picture-micah-lee.jpg">
</a>
</div>
<div class="col-lg-5 col-md-5">
<a href="https://twitter.com/micahflee/status/577998730340622337" target="_blank">
<blockquote>"When I use Qubes I feel like a god. Software thinks that it's in control, that it can do what it wants? It can't. I'm in control."
<i class="fa fa-twitter fa-fw" aria-hidden="true"></i>
<footer>Micah Lee<cite title="Source Title">, Freedom of the Press Foundation, The Intercept</cite></footer>
</blockquote>
</a>
</div>
<div class="col-lg-1 col-md-1 text-center">
<a class="avatar" href="https://twitter.com/isislovecruft" target="_blank">
<img src="attachment/site/picture-isis.jpg">
</a>
</div>
<div class="col-lg-5 col-md-5">
<a href="https://twitter.com/isislovecruft" target="_blank">
<blockquote>"With Qubes OS, I feel more comfortable accessing Tor Project infrastructure from the same laptop I use to execute random GameBoy ROMs I downloaded from the internet."
<i class="fa fa-twitter fa-fw" aria-hidden="true"></i>
<footer>Isis Agora Lovecruft<cite title="Source Title">, cypherpunk, Tor Project core developer</cite></footer>
</blockquote>
</a>
</div>
</div>
<div class="row featured-quotes add-bottom">
<div class="col-lg-12 col-md-12 text-center">
<a class="btn btn-small btn-primary" href="/experts/">More From The Experts</a>
</div>
</div>
</div>
<!-- News -->
<div class="row">
<div class="col-lg-6 col-md-6 more-bottom">
<h2 class="text-center"><i class="fa fa-newspaper-o"></i> Media &amp; Press</h2>
<div class="white-box">
<div class="featured-quotes">
<a href="https://motherboard.vice.com/read/finally-a-reasonably-secure-operating-system-qubes-r3" target="_blank">
<img src="attachment/site/motherboard-logo.png" class="logo">
<blockquote>
"Finally, a 'Reasonably-Secure' Operating System: Qubes R3"
<footer>by J.M. Porup</footer>
</blockquote>
</a>
</div>
<div class="featured-quotes">
<a href="https://www.economist.com/blogs/babbage/2014/03/computer-security" target="_blank">
<img src="attachment/site/the-economist-logo.png" class="logo">
<blockquote>
"For those willing to put in the effort, Qubes is more secure than almost any other operating system available today"
<footer>by J. M. P.</footer>
</blockquote>
</a>
</div>
<div class="featured-quotes">
<a href="https://www.wired.com/2014/11/protection-from-hackers" target="_blank">
<img src="attachment/site/wired-magazine-logo.png" class="logo">
<blockquote>
"So Rutkowska flipped the game, this time in favor of the defenders."
<footer>by Andy Greenberg</footer>
</blockquote>
</a>
</div>
<a href="/news/" class="btn btn-sm btn-primary">More Media &amp; Press</a>
</div>
</div>
<div class="col-lg-6 col-md-6 more-bottom">
<h2 class="text-center"><i class="fa fa-bullhorn"></i> Announcements</h2>
<div class="white-box">
<ul class="list-unstyled remove-bottom">
{% for post in site.posts limit:5 %}
<li class="list-links">
<a class="black-link" href="{{ post.url }}">
{{ post.title }}
<span class="detail">
{% for category in post.categories %}{% if site.allowed_categories contains category %}
<strong>{{ category | capitalize }}</strong>
{% endif %}{% endfor %} on {{ post.date | date: "%b %-d, %Y" }}
</span>
</a>
</li>
{% endfor %}
<li class="list-links-normal">
<a href="/news/" class="btn btn-sm btn-primary">More Articles &amp; Announcements</a>
</li>
</ul>
</div>
</div>
</div>
<!-- Technology -->
<div class="row">
<div class="col-lg-12 col-md-12">
<h2 class="text-center"><i class="fa fa-cogs"></i> What's Inside of Qubes?</h2>
</div>
</div>
<div class="white-box more-bottom">
<div class="row">
<div class="col-lg-6 col-md-6 text-center">
<img src="attachment/site/xen-logo.svg" class="add-top">
</div>
<div class="col-lg-6 col-md-6">
<h3 class="text-center add-bottom">Secure Compartmentalization</h3>
<p>Qubes brings to your personal computer the security of the Xen hypervisor, the same software relied on by many major hosting providers to isolate websites and services from each other. <a href="/doc/architecture/">Learn more</a></p>
</div>
</div>
<div class="row">
<div class="col-lg-6 col-md-6 text-center">
<img src="attachment/site/OS-logos.svg" class="add-top">
</div>
<div class="col-lg-6 col-md-6">
<h3 class="text-center add-bottom">Operating System Freedom</h3>
<p>Can't decide which Linux distribution you prefer? Still need that one Windows program for work? With Qubes, you're not limited to just one OS. <a href="/doc/templates/">Learn more</a></p>
</div>
</div>
<div class="row">
<div class="col-lg-6 col-md-6 text-center">
<img src="attachment/site/whonix-tor.svg" class="add-top">
</div>
<div class="col-lg-6 col-md-6">
<h3 class="text-center add-bottom">Serious Privacy</h3>
<p>With Whonix integrated into Qubes, using the Internet anonymously over the Tor network is safe and easy. <a href="/doc/whonix/">Learn more</a></p>
</div>
</div>
<div class="clearfix"></div>
</div>
<!-- Details: Awards / Follow -->
<div class="row">
<div class="col-lg-6 col-md-6 more-bottom">
<h3 class="text-center"><i class="fa fa-file-text"></i> Recent Research</h3>
<div class="white-box">
<ul class="list-unstyled remove-bottom">
{% for research in site.data.research.papers limit:5 %}
<li class="list-links">
<a class="black-link" href="{{research.url}}">
{{research.title}}
<span class="detail"><strong>{{research.author}}</strong>, {{research.date}}</span>
</a>
</li>
{% endfor %}
<li class="list-links-normal">
<a href="/research/" class="btn btn-sm btn-primary">Read More Research</a>
</li>
</ul>
</div>
</div>
<div class="col-lg-6 col-md-6 more-bottom">
<h3 class="text-center"><i class="fa fa-trophy"></i> Awards &amp; Grants</h3>
<div class="white-box">
<ul class="list-unstyled remove-bottom">
<li class="list-links text-center">
<a href="https://nlnet.nl/" target="_blank">
<img src="attachment/site/nlnet.gif" class="featured-logo center-block">
<span>2016</span>
</a>
</li>
<li class="list-links text-center">
<a href="https://www.opentech.fund/project/qubes-os" target="_blank">
<img src="attachment/site/OTF-logo.png" class="featured-logo center-block">
<span>2015 and 2016</span>
</a>
</li>
<li class="list-links text-center">
<a href="https://www.accessnow.org/blog/2014/02/13/endpoint-security-prize-finalists-announced" target="_blank">
<img src="attachment/site/access-innovation-prize.jpg" class="featured-logo center-block">
<span>2014 Finalist for Endpoint Security</span>
</a>
</li>
<li class="list-links text-center">
<a href="/partners/">
<img src="attachment/site/partners-shake.svg" class="center-block">
<span>We would love for you to fund or partner with us</span>
</a>
</li>
</ul>
</div>
</div>
</div>
<!-- Details: Get Involved -->
<div class="row">
<div class="col-lg-12 col-md-12">
<h2 class="text-center"><i class="fa fa-comments"></i> Join the Community!</h2>
</div>
</div>
<div class="white-box more-bottom">
<div class="row">
<div class="col-lg-12 col-md-12 text-center">
<a title="GitHub" href="https://github.com/QubesOS" class="fa fa-github fa-5x fa-fw black-icon" aria-hidden="true"></a>
<a title="Twitter" href="https://twitter.com/QubesOS" class="fa fa-twitter fa-5x fa-fw" aria-hidden="true"></a>
<a title="Reddit" href="https://www.reddit.com/r/Qubes/" class="fa fa-reddit fa-5x fa-fw" aria-hidden="true"></a>
<a title="Facebook" href="https://www.facebook.com/QubesOS" class="fa fa-facebook fa-5x fa-fw" aria-hidden="true"></a>
<a title="StackExchange" href="https://area51.stackexchange.com/proposals/98519/qubes-os" class="fa fa-stack-exchange fa-5x fa-fw" aria-hidden="true"></a>
<a title="Mailing Lists" href="/mailing-lists/" class="fa fa-envelope-o fa-5x fa-fw black-icon" aria-hidden="true"></a>
</div>
</div>
</div>
{% include footer.html %}
</div>

117
about/join.md Normal file
View file

@ -0,0 +1,117 @@
---
layout: sidebar
title: Join
permalink: /join/
---
Join the Qubes OS Team!
=======================
The Qubes OS Project is seeking individuals for the positions listed
below. If you're interested in any of these positions, please send an email to
[Marek Marczykowski-Górecki](mailto:marmarek@invisiblethingslab.com).
Besides the positions below, there are many different ways you can [contribute to the Qubes OS project](/doc/contributing/).
Stable release manager
----------------------
### General tasks ###
* Deciding what will be fixed in each stable release and what will be fixed
only in new major releases
* Backporting fixes to stable releases (and requesting core dev input when it
isn't trivial)
* Releasing packages for stable release (deciding when the package should be
released to the `current-testing` repository and when it should be moved to
the `current` repository)
As this position involves great trust and may have major impact on project
security, we'd like for the candidate to be already known and active in Qubes
OS community.
Core developer
--------------
### General tasks ###
* Actual debugging of issues
* Writing new features
* Writing tests
* Writing developer documentation (API, etc)
* Providing input for community contributors when requested
### Required and optional skills ###
* Python
* Shell scripting
* System configuration (basic services, startup scripts etc)
* Git, make
* (Optional) networking, firewalling
* (Optional) X11 protocol (raw)
* (Optional) GUI frameworks (Gtk, Qt)
* (Optional) kernel and/or hypervisor debugging skills
* (Optional) low level stuff (UEFI, PCI communication,
including IOMMU, networking down to ethernet layer, Xen
backend/frontend interfaces)
* (Optional) libvirt internals
* (Optional) salt stack
* (Optional) advanced desktop environment configuration, including
writing plugins (KDE, Gnome)
The more "optional" the better :)
### Example features for implementation ###
#### Smaller ####
* [#1499](https://github.com/QubesOS/qubes-issues/issues/1499)
* [#1454](https://github.com/QubesOS/qubes-issues/issues/1454)
* [#1363](https://github.com/QubesOS/qubes-issues/issues/1363)
* [#1329](https://github.com/QubesOS/qubes-issues/issues/1329)
* [#979](https://github.com/QubesOS/qubes-issues/issues/979)
#### Larger ####
* [#1455](https://github.com/QubesOS/qubes-issues/issues/1455)
* [#1426](https://github.com/QubesOS/qubes-issues/issues/1426)
* [#971](https://github.com/QubesOS/qubes-issues/issues/971)
* [#889](https://github.com/QubesOS/qubes-issues/issues/889)
* [#866](https://github.com/QubesOS/qubes-issues/issues/866)
* [#830](https://github.com/QubesOS/qubes-issues/issues/830)
Qubes Live USB Maintainer
-------------------------
### Required Skills ###
* Shell
* Python
* Bootloaders (`grub2`, `isolinux`)
* `initrd` creation (`dracut`)
* Kickstart (automated installation -- basics are enough)
* A general understanding of Qubes OS ;)
GNOME Desktop Environment developer
-------------------------------------
### Tasks ###
* Custom window decorations (colored frames)
* Configuration for Qubes OS dom0
* Disable uneeded things (e.g., file manager)
* Configure menu to ease navigation through multiple VMs (similar to [what is
configured in KDE](https://github.com/QubesOS/qubes-issues/issues/1784#issuecomment-216868265))
* [Implementation of new, GTK based Qubes Manager](https://github.com/QubesOS/qubes-issues/issues/1870)
### Example Tasks ###
Listed here: [#1806](https://github.com/QubesOS/qubes-issues/issues/1806)
### Required Skills ###
* GNOME
* GTK
* Whatever is needed to customize GNOME

385
about/mailing-lists.md Normal file
View file

@ -0,0 +1,385 @@
---
layout: sidebar
title: Mailing Lists
permalink: /mailing-lists/
redirect_from:
- /doc/mailing-lists/
- /en/doc/mailing-lists/
- /en/doc/qubes-lists/
- /doc/qubes-lists/
- /doc/QubesLists/
- /wiki/QubesLists/
---
Qubes Mailing Lists
===================
Discussion list guidelines
--------------------------
Qubes discussions take place on two mailing lists: `qubes-users` and
`qubes-devel`, both of which are explained below. Please send all questions
regarding Qubes to one of these two lists. **Please do not send questions to
individual Qubes developers.** By sending a message to the appropriate mailing
list, you are not only giving others a chance to help you, but you may also be
helping others by starting a public discussion about a shared problem or
interest.
These are open mailing lists where people freely come together to discuss Qubes
and voluntarily help each other out of mutual interest and good will. They are
*not* your personal, paid support service. **No one owes you a reply.** No one
here is responsible for solving your problems for you. Nonetheless, there are
many things you can do to make it more likely that you will receive a reply.
This community is fortunate to have an exceptionally large number of friendly
and knowledgeable people who enjoy corresponding on these lists. The vast
majority of them will be happy to help you if you follow these simple
guidelines.
* **Be polite and respectful.** Remember, no one here is under any obligation
to reply to you. Think about your readers. Most of them are coming home after
a long, hard day at work. The last thing they need is someone's temper
tantrum in their inboxes. If you are rude and disrespectful, you are very
likely to be ignored.
* **Be concise.** Include only essential information. Most of your readers lead
busy lives and have precious little time. We *want* to spend some of that
time helping you, if we can. But if you ramble, it will be easier to skip
over you and help someone else who gets right to the point.
* **Help us help you.** Tell us what you've already tried, and which
documentation pages you've already read. Put yourself in your readers' shoes.
What essential information would they require in order to be able to help
you? Make sure to include that information in your message. [Ask
questions the smart way.][smart-questions]
* **Be patient.** Do not "bump" a thread more than once every three days *at
most*. If it seems like your messages to the mailing lists are consistently
being ignored, make sure you're following the guidelines explained on this
page. If you're already doing so but still not getting any replies, then it's
likely that no one who knows the answer has had time to reply yet. Remember
that the devs are very busy working on Qubes. They usually only have a chance
to answer questions on the mailing lists once every several days.
* **Be a good community member.** As with any social community, members of the
mailing list earn different reputations for themselves over time. We want the
mailing lists to be a friendly, productive place where information and ideas
are exchanged for the mutual benefit of all. We understand that the best way
to achieve this is to encourage and cultivate other like-minded individuals.
Those who have shown themselves to be good community members through their
past contributions have earned our good will, and we will be especially eager
to help them and collaborate with them. If you are new to the community, you
should understand that it will take time for you to earn the good will of
others. This does not mean that you will not receive help. On the contrary,
we are fortunate to have such a helpful and understanding community that many
of them spend hours of their personal time helping complete strangers,
including many who post to the lists anonymously. (Given the integration of
Qubes with [Whonix], we understand better than most the complexities of
privacy and anonymity, and we know that many users have no other choice but
to post anonymously.) You can read our project's [Code of Conduct][coc] for more information.
### Specific rules and notes ###
* Send your message to the correct list. Read the sections below to determine
which list is correct for your message.
* Do not [top-post].
* Include a precise and informative subject line. This will allow others to
easily find your thread in the future and use it as a reference. (Bad: "Help!
Qubes problems!" Good: "R2B2 Installation problem: Apple keyboard not working
in installer.")
* If your message is not successfully sent to the list, it probably got caught
in the spam filter. We check the spam filter regularly, so please be patient,
and your message should be approved (and your email address added to the
whitelist) within a few days.
* Keep the mailing list CCed throughout the conversation unless there's a
special need for privacy (in which case, use PGP encryption). This increases
the likelihood that a greater quantity of useful information will be
available to everyone in the future.
* Quote appropriately. If you're replying to a thread (whether your own or
someone else's), you should make sure to quote enough from previous messages
in the thread so that people reading your message can understand the context
without having to find and read earlier messages from that thread. Each reply
should continue the conversation and, ideally, be readable as a conversation
in itself. Do not quote advertisements in signatures or inline PGP signature
blocks. (Quoting the latter interferes with the ability of programs like
Enigmail to properly quote replies thereafter).
* If you do not speak English, you should feel free to post in your own
language. However, bear in mind that most members of the list can only read
English. You may wish to include an automated translation in your message out
of consideration for those readers. If you choose to write in English, please
do not apologize for doing so poorly, as it is unnecessary. We understand and
will ask for clarification if needed.
* While we're generally open to hearing suggestions for new features, please
note that we already have a pretty well defined [roadmap], and it's rather
unlikely that we will change our schedule in order to accommodate your
request. If there's a particular feature you'd like to see in Qubes, a much
more effective way to make it happen is to contribute a patch that implements
it. We happily accept such contributions, provided they meet our standards.
Please note, however, that it's always a good idea to field a discussion of
your idea on the `qubes-devel` list before putting in a lot of hard work on
something that we may not be able or willing to accept.
qubes-users
-----------
### How to use this list
This list is for helping users solve various daily problems with Qubes OS.
Examples of topics or questions suitable for this list include:
* [HCL] reports
* Installation problems
* Hardware compatibility problems
* Questions of the form: "How do I...?"
### Read these first
Please try searching both the Qubes website and the archives of the mailing
lists before sending a question. In addition, please make sure that you have
read and understood the following basic documentation prior to posting to the
list:
* The [Installation Guide], [System Requirements], and [HCL] (for problems
related to installing Qubes OS)
* The [User FAQ]
* The [documentation] (for questions about how to use Qubes OS)
### How to subscribe and post
#### Google Groups
You don't have to subscribe in order to post to this list. However, subscribing
might nonetheless be desirable, as it ensures that your messages will not be
eaten by the Google Groups spam filter and allows you to receive messages which
were sent directly to the list.
* To subscribe to the list, send a blank email to
`qubes-users+subscribe@googlegroups.com`.
* Note: A Gmail account is *not* required. Any email address will work.
* To post a message to the list, address your email to
`qubes-users@googlegroups.com`.
* Note: You don't have to be subscribed in order to post.
* To unsubscribe, send a blank email to
`qubes-users+unsubscribe@googlegroups.com`.
* This list also has a [Google Groups web interface][qubes-users-web].
* Some users prefer to interact with the mailing list through the web
interface. This has the advantage that it allows you to search and reply to
messages which were sent prior to your subscription to the list. However, a
Google account is required in order to post through this interface.
#### Gmane
The mailing list is also available via Gmane, a service that provides mailing
lists in the form of newsgroups. This makes it possible for you to subscribe
and read all mails sent to the list without having them all sent to your normal
mail account. To use Gmane, you need a newsreader such as Mozilla Thunderbird.
To add Gmane's server to Thunderbird, follow the instructions in
[Mozilla Thunderbird's documentation for how to add
newsgroups][thunderbird-newsgroup].
In the fourth step replace `news.mozilla.org` with `news.gmane.org`.
* To subscribe to the list, click on **Subscribe...** and search for the
newsgroup [`gmane.os.qubes.user`]. Click on the checkbox besides the name
and **OK**.
* You send and reply to mails the same way you would normally.
* To unsubscribe from the list, click on **Subscribe...**
search for the newsgroup [`gmane.os.qubes.user`], uncheck the checkbox, and
click on **OK**. Thunderbird will automatically remove the newsgroup.
qubes-announce
--------------
This is a read-only list for those who wish to receive only very important,
infrequent messages. Only the core Qubes team can post to this list, and only
[Qubes Security Bulletins (QSBs)][qsb] and new Qubes OS releases are announced
here.
### How to subscribe
#### Google Groups
* To subscribe to the list, send a blank email to
`qubes-announce+subscribe@googlegroups.com`.
* Note: A Gmail account is *not* required. Any email address will work.
* To unsubscribe, send a blank email to
`qubes-announce+unsubscribe@googlegroups.com`.
* This list can also be browsed via an optional [Google Groups web
interface][qubes-announce-web].
qubes-devel
-----------
### How to use this list
This list is primarily intended for people who are interested in contributing to
Qubes or who are willing to learn more about its architecture and
implementation. Examples of topics and questions suitable for this list include:
* Questions about why we made certain architecture or implementation decisions.
* For example: "Why did you implement XYZ this way and not the other way?"
* Questions about code layout and where code is for certain functionality.
* Discussions about proposed new features, patches, etc.
* For example: "I would like to implement feature XYZ."
* Contributed code and patches.
* Security discussions which are relevant to Qubes in some way.
### How to subscribe and post
#### Google Groups
You must be subscribed in order to post to this list.
* To subscribe to the list, send a blank email to
`qubes-devel+subscribe@googlegroups.com`.
* Note: A Gmail account is *not* required. Any email address will work.
* To post a message to the list, address your email to
`qubes-devel@googlegroups.com`.
* Note: You must be subscribed in order to post. If your post does not
appear, please allow time for moderation to occur.
* To unsubscribe, send a blank email to
`qubes-devel+unsubscribe@googlegroups.com`.
* This list has a [Google Groups web interface][qubes-devel-web].
* Some users prefer to interact with the mailing list through the web
interface. This has the advantage that it allows you to search and reply to
messages which were sent prior to your subscription to the list. However, a
Google account is required in order to post through this interface.
#### Gmane
The mailing list is also available via Gmane, a service that provides mailing
lists in the form of newsgroups. This makes it possible for you to subscribe
and read all mails sent to the list without having them all sent to your normal
mail account. To use Gmane, you need a newsreader such as Mozilla Thunderbird.
To add Gmane's server to Thunderbird, follow the instructions in
[Mozilla Thunderbird's documentation for how to add
newsgroups][thunderbird-newsgroup].
In the fourth step replace `news.mozilla.org` with `news.gmane.org`.
* To subscribe to the list, click on **Subscribe...** and search for the
newsgroup [`gmane.os.qubes.devel`]. Click on the checkbox besides the name
and **OK**.
* You send and reply to mails the same way you would normally.
* To unsubscribe from the list, click on **Subscribe...**
search for the newsgroup [`gmane.os.qubes.devel`], uncheck the checkbox, and
click on **OK**. Thunderbird will automatically remove the newsgroup.
qubes-project
-----------
### How to use this list
This list is for non-technical discussion and coordination around the
Qubes OS project.
Examples of topics or question suitable for this list include:
* Participation (talks, workshops, etc.) at upcoming events
* Project funding applications and strategies
* FOSS governance discussions
* Most Github issues tagged "[business]"
### How to subscribe and post
#### Google Groups
You don't have to subscribe in order to post to this list. However, subscribing
might nonetheless be desirable, as it ensures that your messages will not be
eaten by the Google Groups spam filter and allows you to receive messages which
were sent directly to the list.
* To subscribe to the list, send a blank email to
`qubes-project+subscribe@googlegroups.com`.
* Note: A Gmail account is *not* required. Any email address will work.
* To post a message to the list, address your email to
`qubes-project@googlegroups.com`.
* Note: You don't have to be subscribed in order to post.
* To unsubscribe, send a blank email to
`qubes-project+unsubscribe@googlegroups.com`.
* This list also has a [Google Groups web interface][qubes-project-web].
* Some users prefer to interact with the mailing list through the web
interface. This has the advantage that it allows you to search and reply to
messages which were sent prior to your subscription to the list. However, a
Google account is required in order to post through this interface.
#### Gmane
The mailing list is also available via Gmane, a service that provides mailing
lists in the form of newsgroups. This makes it possible for you to subscribe
and read all mails sent to the list without having them all sent to your normal
mail account. To use Gmane, you need a newsreader such as Mozilla Thunderbird.
To add Gmane's server to Thunderbird, follow the instructions in
[Mozilla Thunderbird's documentation for how to add
newsgroups][thunderbird-newsgroup].
In the fourth step replace `news.mozilla.org` with `news.gmane.org`.
* To subscribe to the list, click on **Subscribe...** and search for the
newsgroup [`gmane.os.qubes.project`]. Click on the checkbox besides the name
and **OK**.
* You send and reply to mails the same way you would normally.
* To unsubscribe from the list, click on **Subscribe...**
search for the newsgroup [`gmane.os.qubes.project`], uncheck the checkbox, and
click on **OK**. Thunderbird will automatically remove the newsgroup.
qubes-translation
-----------
### How to use this list
This list is for discussion around the localization and translation of Qubes OS,
its documentation, and the website.
Examples of topics or question suitable for this list include:
* Questions about or issues with [Transifex], the translation platform we use
* Who is managing localization for a given language
* Most Github issues tagged "[localization]"
### How to subscribe and post
#### Google Groups
You must be subscribed in order to post to this list.
* To subscribe to the list, send a blank email to
`qubes-translation+subscribe@googlegroups.com`.
* Note: A Gmail account is *not* required. Any email address will work.
* To post a message to the list, address your email to
`qubes-translation@googlegroups.com`.
* Note: You don't have to be subscribed in order to post.
* To unsubscribe, send a blank email to
`qubes-translation+unsubscribe@googlegroups.com`.
* This list also has a [Google Groups web interface][qubes-translation-web].
* Some users prefer to interact with the mailing list through the web
interface. This has the advantage that it allows you to search and reply to
messages which were sent prior to your subscription to the list. However, a
Google account is required in order to post through this interface.
[qsb]: /security/bulletins/
[qubes-announce-web]: https://groups.google.com/group/qubes-announce
[top-post]: https://en.wikipedia.org/wiki/Posting_style
[roadmap]: https://github.com/QubesOS/qubes-issues/milestones
[smart-questions]: http://www.catb.org/esr/faqs/smart-questions.html
[Whonix]: /doc/whonix/
[HCL]: /doc/hcl/
[Installation Guide]: /doc/installation-guide/
[System Requirements]: /doc/system-requirements/
[User FAQ]: /doc/user-faq/
[documentation]: /doc/
[thunderbird-newsgroup]: https://support.mozilla.org/en-US/kb/creating-newsgroup-account
[qubes-users-web]: https://groups.google.com/group/qubes-users
[qubes-devel-web]: https://groups.google.com/group/qubes-devel
[qubes-translation-web]: https://groups.google.com/group/qubes-translation
[qubes-project-web]: https://groups.google.com/group/qubes-project
[`gmane.os.qubes.user`]: http://dir.gmane.org/gmane.os.qubes.user
[`gmane.os.qubes.devel`]: http://dir.gmane.org/gmane.os.qubes.devel
[`gmane.os.qubes.project`]: http://dir.gmane.org/gmane.os.qubes.project
[business]: https://github.com/QubesOS/qubes-issues/issues?utf8=%E2%9C%93&q=is%3Aissue%20is%3Aopen%20label%3Abusiness
[localization]: https://github.com/QubesOS/qubes-issues/issues?utf8=%E2%9C%93&q=is%3Aissue%20is%3Aopen%20label%3Alocalization
[coc]: /code-of-conduct/
[Transifex]: https://www.transifex.com/otf/qubes/

109
about/partners.md Normal file
View file

@ -0,0 +1,109 @@
---
layout: default
title: Partners
permalink: /partners/
redirect_from: /en/partners/
---
Qubes Partners
==============
This page is dedicated to recognizing the organizations, companies, and
individuals who have contributed support to the development of Qubes OS. The
Qubes Project is grateful for their support! If your organization is interested
in becoming a Qubes Partner, please [contact us]. You can also read more about
how Qubes is [funded] and about making a [monetary donation] to the project.
<table class="partners">
<thead>
<tr>
<th>Tier</th>
<th>Partner</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr id="invisible-things-lab">
<td rowspan="2">
$500,000+
</td>
<td>
<a href="http://invisiblethingslab.com/itl/Welcome.html">
<img src="/attachment/site/itl.png">
</a>
</td>
<td>
<a href="http://invisiblethingslab.com/itl/Welcome.html">Invisible
Things Lab s.c. (ITL)</a> is a privately held company based in
Warsaw, Poland, owned by Joanna Rutkowska and Joanna Gołębiewska. ITL
supported Qubes OS development from the beginning of the project in 2010
until the end of 2014. ITL's primary source of revenue is security
research and development.
</td>
</tr>
<tr id="open-technology-fund">
<td>
<a href="https://www.opentechfund.org/">
<img src="/attachment/site/OTF-logo.png">
</a>
</td>
<td>
<a href="https://www.opentechfund.org/">Open Technology Fund (OTF)</a>
is a United States government-funded program of
<a href="http://www.rfa.org">Radio Free Asia</a>, whose
<a href="https://www.opentech.fund/about/program">stated mission</a> is
to "support open technologies and communities that increase free
expression, circumvent censorship, and obstruct repressive surveillance
as a way to promote human rights and open societies." In 2015-2016, OTF
<a href="https://www.opentech.fund/project/qubes-os">funded</a> the
Qubes project in a number of activities to improve Qubes, make it easier
to use and more accessible. In 2014-2015, OTF
<a href="https://www.opentech.fund/project/qubes-os">funded</a> the
Qubes project to integrate <a href="https://www.whonix.org/">Whonix</a>,
improve hardware compatibility and user experience. The complete
announcement is available
<a href="http://blog.invisiblethings.org/2015/06/04/otf-funding-announcement.html">here</a>.
</td>
</tr>
<tr id="access-now">
<td rowspan="2">
$10,000+
</td>
<td>
<a href="https://www.accessnow.org/">
<img src="/attachment/site/accessnow.png">
</a>
</td>
<td>
<a href="https://www.accessnow.org/">Access Now</a> is an international
human rights organization whose
<a href="https://www.accessnow.org/about-us/">stated mission</a> is to
"defend and extend the digital rights of users at risk around the
world." Beginning in 2015, Access Now generously agreed to provide staff
time to help manage the Qubes OS project.
</td>
</tr>
<tr id="nlnet-foundation">
<td>
<a href="https://nlnet.nl">
<img src="/attachment/site/nlnet.gif">
</a>
</td>
<td>
<a href="https://nlnet.nl">Stichting NLnet</a> ("NLnet Foundation" in
English) is a recognized philanthropic non-profit foundation based in
the Netherlands, whose <a href="https://nlnet.nl/foundation/">stated
mission</a> is "to promote the exchange of electronic information
and all that is related or beneficial to that purpose." In 2016, the
NLnet Foundation provided a grant to the Qubes project to support
improvements in automated build processes, Debian template packaging,
networking & privacy, and hardware compatibility.
</td>
</tr>
</tbody>
</table>
[funded]: /funding/
[monetary donation]: /donate/
[contact us]: mailto:funding@qubes-os.org

26
about/research.md Normal file
View file

@ -0,0 +1,26 @@
---
layout: default
title: Research
permalink: /research/
redirect_from:
- /doc/qubes-research/
- /en/doc/qubes-research/
- /doc/QubesResearch/
- /wiki/QubesResearch/
---
Here are links to various research papers, projects, and blog posts that relate
to Qubes OS.
{% for category in site.data.research.categories %}
<h3>{{category.name}}</h3>
<ul class="add-top more-bottom">
{% for paper in site.data.research.papers %}
{% if paper.category == category.slug %}
<li>
<a href="{{paper.url}}">{{paper.title}}</a> by {{paper.author}}{% if paper.date %}, {{paper.date}}{% endif %}
</li>
{% endif %}
{% endfor %}
</ul>
{% endfor %}

123
about/screenshots.md Normal file
View file

@ -0,0 +1,123 @@
---
layout: default
title: Screenshots
permalink: /screenshots/
redirect_from:
- /media/
- /doc/QubesScreenshots/
- /wiki/QubesScreenshots/
---
Select Qubes OS Screenshots
===========================
[![r32-xfce-desktop.png](/attachment/wiki/QubesScreenshots/r32-xfce-desktop.png)](/attachment/wiki/QubesScreenshots/r32-xfce-desktop.png)
Beginning with Qubes 3.2, the default desktop environment is Xfce4.
* * * * *
[![r2b2-kde-start-menu.png](/attachment/wiki/QubesScreenshots/r2b2-kde-start-menu.png)](/attachment/wiki/QubesScreenshots/r2b2-kde-start-menu.png)
Starting applications from different domains (AppVMs) is very easy.
* * * * *
[![r2b2-kde-three-domains-at-work.png](/attachment/wiki/QubesScreenshots/r2b2-kde-three-domains-at-work.png)](/attachment/wiki/QubesScreenshots/r2b2-kde-three-domains-at-work.png)
In this example, the word processor runs in the “work” domain, which has been assigned the “green” label. It is fully isolated from other domains, such as the “untrusted” domain (assigned the “red” label -- “Watch out!”, “Danger!”) used for random Web browsing, news reading, as well as from the "work-web" domain (assigned the "yellow" label), which is used for work-related Web browsing that is not security critical. Apps from different domains run in different AppVMs and have different X servers, filesystems, etc. Notice the different color frames (labels) and VM names in the titlebars. These are drawn by the trusted Window Manager running in Dom0, and apps running in domains cannot fake them:
* * * * *
[![r2b3-windows-seamless-1.png](/attachment/wiki/QubesScreenshots/r2b3-windows-seamless-1.png)](/attachment/wiki/QubesScreenshots/r2b3-windows-seamless-1.png)
Qubes Release 2 can also run Windows AppVMs in seamless mode, integrated onto the common Qubes trusted desktop, just like Linux AppVMs! The seamless GUI integration has been introduced in Qubes R2 Beta 3. This requires our dedicated Qubes Windows Support Tools to be installed in the Windows VMs first. The Qubes Windows Tools are proprietary but we distribute the binaries for free with current Qubes OS releases.
* * * * *
[![r2b3-windows-seamless-filecopy.png](/attachment/wiki/QubesScreenshots/r2b3-windows-seamless-filecopy.png)](/attachment/wiki/QubesScreenshots/r2b3-windows-seamless-filecopy.png)
Windows AppVMs are fully integrated with the rest of the Qubes OS system, which includes things such as secure, policy governed, inter-VM file copy, clipboard, and generally our whole elastic qrexec infrastructure for secure inter-VM RPC! Starting with Qubes R2 Beta 3 we also support HVM-based templates allowing to instantly create many Windows AppVMs with shared "root filesystem" from the Template VM (but one should ensure their license allows for such instantiation of the OS in the template). Just like with Linux AppVMs!
* * * * *
[![r2b2-xfce4-programmers-desktop-2.png](/attachment/wiki/QubesScreenshots/r2b2-xfce4-programmers-desktop-2.png)](/attachment/wiki/QubesScreenshots/r2b2-xfce4-programmers-desktop-2.png)
Here we see Xfce4.10 Window Manager running in Dom0 (instead of KDE as on previous screens). Qubes supports customized Xfce4 in dom0 beginning with R2 Beta 2!
* * * * *
[![password-prompt.png](/attachment/wiki/QubesScreenshots/password-prompt.png)](/attachment/wiki/QubesScreenshots/password-prompt.png)
It is always clearly visible to which domain a given window belongs. Here its immediately clear that the passphrase-prompting window belongs to some domain with the “green” label. When we look at the titlebar, we see “[work]”, which is the name of the actual domain. Theoretically, the untrusted application (here, the “red” Firefox) beneath the prompt window could draw a similar looking window within its contents. In practice, this would be very hard, because it doesnt know, e.g., the exact decoration style that is in use. However, if this is a concern, the user can simply try to move the more trusted window onto some empty space on the desktop such that no other window is present beneath it. Or, better yet, use the Expose-like effect (available via a hot-key). A malicious application from an untrusted domain cannot spoof the whole desktop because the trusted Window Manager will never let any domain “own” the whole screen. Its titlebar will always be visible.
* * * * *
[![r2b2-kde-tray-icons.png](/attachment/wiki/QubesScreenshots/r2b2-kde-tray-icons.png)](/attachment/wiki/QubesScreenshots/r2b2-kde-tray-icons.png)
Qubes is all about seamless integration from the users point of view. Here you can see how it virtualizes tray icons from other domains. Notice the network icon in a red frame. This icon is in fact managed by the Network Manager running in a separate NetVM. The notes icon (with the green frame around it) has been drawn by the note-taking app running in the work domain (which has the "green" label).
* * * * *
[![r2b2-manager-and-netvm-network-prompt.png](/attachment/wiki/QubesScreenshots/r2b2-manager-and-netvm-network-prompt.png)](/attachment/wiki/QubesScreenshots/r2b2-manager-and-netvm-network-prompt.png)
All the networking runs in a special, unprivileged NetVM. (Notice the red frame around the Network Manager dialog box on the screen above.) This means that in the event that your network card driver, Wi-Fi stack, or DHCP client is compromised, the integrity of the rest of the system will not be affected! This feature requires Intel VT-d or AMD IOMMU hardware (e.g., Core i5/i7 systems).
* * * * *
[![r2b2-software-update.png](/attachment/wiki/QubesScreenshots/r2b2-software-update.png)](/attachment/wiki/QubesScreenshots/r2b2-software-update.png)
Qubes lets you update all the software in all the domains all at once, in a centralized way. This is possible thanks to Qubes' unique TemplateVM technology. Note that the user is not required to shut down any AppVMs (domains) for the update process. This can be done later, at a convenient moment, and separately for each AppVM.
* * * * *
[![copy-paste-1.png](/attachment/wiki/QubesScreenshots/copy-paste-1.png)](/attachment/wiki/QubesScreenshots/copy-paste-1.png) [![copy-paste-2.png](/attachment/wiki/QubesScreenshots/copy-paste-2.png)](/attachment/wiki/QubesScreenshots/copy-paste-2.png)
Qubes supports secure copy-and-paste operations between AppVMs. Only the user can initiate a copy or paste operation using a special key combination (Ctrl-Shift-C/V). Other AppVMs have no access to the clipboard buffer, so they cannot steal data from the clipboard. Only the user decides which AppVM should be given access to the clipboard. (This is done by selecting the destination AppVMs window and pressing the Ctrl-Shift-V combination.)
* * * * *
[!["r2b2-copy-to-other-appvm-1.png](/attachment/wiki/QubesScreenshots/r2b2-copy-to-other-appvm-1.png)](/attachment/wiki/QubesScreenshots/r2b2-copy-to-other-appvm-1.png) [![r2b2-copy-to-other-appvm-3.png](/attachment/wiki/QubesScreenshots/r2b2-copy-to-other-appvm-3.png)](/attachment/wiki/QubesScreenshots/r2b2-copy-to-other-appvm-3.png)
Qubes also supports secure file copying between AppVMs.
* * * * *
[![r2b2-open-in-dispvm-1.png](/attachment/wiki/QubesScreenshots/r2b2-open-in-dispvm-1.png)](/attachment/wiki/QubesScreenshots/r2b2-open-in-dispvm-1.png) [![r2b2-open-in-dispvm-3.png](/attachment/wiki/QubesScreenshots/r2b2-open-in-dispvm-3.png)](/attachment/wiki/QubesScreenshots/r2b2-open-in-dispvm-3.png)
Qubes' unique Disposable VMs (DispVMs) allow the user to open any file in a disposable VM in a matter of seconds! A file can be edited in a disposable VM, and any changes are projected back onto the original file. Currently, there is no way to mark files to be automatically opened in a disposable VM (one needs to right-click on the file and choose the "Open in Disposable VM" option), but this is planned for the R2 Beta 3 release.
* * * * *
[![r2b2-convert-to-trusted-pdf-3.png](/attachment/wiki/QubesScreenshots/r2b2-convert-to-trusted-pdf-3.png)](/attachment/wiki/QubesScreenshots/r2b2-convert-to-trusted-pdf-3.png) [![r2b2-converting-pdf-2.png](/attachment/wiki/QubesScreenshots/r2b2-converting-pdf-2.png)](/attachment/wiki/QubesScreenshots/r2b2-converting-pdf-2.png)
Qubes provides an advanced infrastructure for programming inter-VM services, such as a PDF converter for untrusted files (which is described in [this article](https://blog.invisiblethings.org/2013/02/21/converting-untrusted-pdfs-into-trusted.html)).
* * * * *
[![r2b1-manager-firewall.png](/attachment/wiki/QubesScreenshots/r2b1-manager-firewall.png)](/attachment/wiki/QubesScreenshots/r2b1-manager-firewall.png)
Qubes provides a dedicated firewall that itself runs in an isolated FirewallVM.
* * * * *
And some more screenshots:
[![r2b2-xfce4-start-menu-3.png](/attachment/wiki/QubesScreenshots/r2b2-xfce4-start-menu-3.png)](/attachment/wiki/QubesScreenshots/r2b2-xfce4-start-menu-3.png)
[![r2b2-kde-red-and-green-terminals.png](/attachment/wiki/QubesScreenshots/r2b2-kde-red-and-green-terminals.png)](/attachment/wiki/QubesScreenshots/r2b2-kde-red-and-green-terminals.png)
[![r2b3-windows-seamless-2.png](/attachment/wiki/QubesScreenshots/r2b3-windows-seamless-2.png)](/attachment/wiki/QubesScreenshots/r2b3-windows-seamless-2.png)
* * * * *
The following screenshots, [courtesy of Qubes user nalu](https://groups.google.com/d/topic/qubes-users/KhfzF19NG1s/discussion), demonstrate some of the ways in which KDE can be customized to work with Qubes:
[![r3rc1-nalu-desktop-1.png](/attachment/wiki/QubesScreenshots/r3rc1-nalu-desktop-1.png)](/attachment/wiki/QubesScreenshots/r3rc1-nalu-desktop-1.png)
[![r3rc1-nalu-desktop-2.png](/attachment/wiki/QubesScreenshots/r3rc1-nalu-desktop-2.png)](/attachment/wiki/QubesScreenshots/r3rc1-nalu-desktop-2.png)
[![r3rc1-nalu-desktop-3.png](/attachment/wiki/QubesScreenshots/r3rc1-nalu-desktop-3.png)](/attachment/wiki/QubesScreenshots/r3rc1-nalu-desktop-3.png)
[![r3rc1-nalu-desktop-4.png](/attachment/wiki/QubesScreenshots/r3rc1-nalu-desktop-4.png)](/attachment/wiki/QubesScreenshots/r3rc1-nalu-desktop-4.png)

19
about/statistics.md Normal file
View file

@ -0,0 +1,19 @@
---
layout: default
title: Statistics
permalink: /statistics/
redirect_from:
- /counter/
---
<div style="text-align: center; margin-bottom: 3em;">
<img src="https://tools.qubes-os.org/counter/stats.png" alt="Estimated Qubes OS userbase graph"/>
</div>
The graph is updated daily.
Raw data is available at
[https://tools.qubes-os.org/counter/stats.json](https://tools.qubes-os.org/counter/stats.json).
Format is not documented and may change any time should the developers feel the
need to include something else. Source code is available at
[https://github.com/woju/qubes-stats](https://github.com/woju/qubes-stats).

125
about/team.md Normal file
View file

@ -0,0 +1,125 @@
---
layout: team
title: Team
permalink: /team/
redirect_from:
- /people/
- /doc/QubesDevelopers/
- /wiki/QubesDevelopers/
---
<div id="team-core" class="white-box page-content more-bottom">
<div class="col-lg-12 col-md-12 col-sm-12">
<h2 class="text-center more-bottom">Core Team</h2>
</div>
{% for team in site.data.team %}
{% if team.type == "core" %}
<div class="row team team-core">
<div class="col-lg-2 col-md-2 col-sm-5 col-xs-12 text-center">
<div class="picture more-bottom">
{% if team.picture %}
<a href="/team/#{{team.name | slugify}}"><img src="/attachment/site/{{team.picture}}" title="Picture of {{team.name}}"></a>
{% else %}
<i class="fa fa-user"></i>
{% endif %}
</div>
</div>
<div class="col-lg-4 col-md-4 col-sm-7 col-xs-12" id="{{team.name | slugify}}">
{% assign name_array = team.name | split:" " %}
<a href="/team/#{{team.name | slugify}}"><h4 class="half-bottom">{{team.name}}</h4></a>
<em class="role half-bottom">{{team.role}}</em>
{% if team.email %}
<a href="mailto:{{team.email}}" class="add-right"><i class="fa fa-envelope fa-fw"></i> Email</a>
{% endif %}
{% if team.website %}
<a href="{{team.website}}" class="add-right" target="blank"><i class="fa fa-globe fa-fw"></i> Website</a>
{% endif %}
{% if team.twitter %}
<a href="https://twitter.com/{{team.twitter}}" target="blank"><i class="fa fa-twitter fa-fw"></i> Twitter</a>
{% endif %}
</div>
<div class="col-lg-6 col-md-6 col-sm-12 col-xs-12 text-center">
{% if team.fingerprint %}
<span class="fingerprint" title="{{team.name}}'s PGP Key Fingerprint">{{team.fingerprint}}</span>
{% endif %}
{% if team.pgp_key %}
<a href="{{team.pgp_key}}"><i class="fa fa-lock fa-fw"></i> {{name_array[0]}}'s PGP Key</a>
{% endif %}
</div>
</div>
{% endif %}
{% endfor %}
<div class="text-center more-bottom">
<a href="/join/" class="btn btn-primary"><i class="fa fa-user-plus fa-fw white-icon"></i> Join the team!</a>
</div>
</div>
<div class="white-box page-content more-bottom">
<div class="col-lg-12 col-md-12 col-sm-12">
<h2 class="text-center more-bottom">Emeritus</h2>
<p>Emeriti are honorary members of the Qubes team who previously
contributed to the project in a central way but who are no longer
currently active.</p>
</div>
{% assign emeritus_total = 0 %}
{% for team in site.data.team %}
{% if team.type == "emeritus" %}
{% assign emeritus_total = emeritus_total | plus:1 %}
{% endif %}
{% endfor %}
{% assign emeritus_half = emeritus_total | divided_by:2 %}
{% assign emeritus_shown = 0 %}
<div class="row team">
<div class="col-lg-6 col-md-6 col-sm-6 col-xs-12">
{% for team in site.data.team %}
{% if team.type == "emeritus" %}
{% if emeritus_shown < emeritus_half %}
{% include team-simple.html %}
{% elsif emeritus_shown == emeritus_half %}
</div>
<div class="col-lg-6 col-md-6 col-sm-6 col-xs-12">
{% include team-simple.html %}
{% else %}
{% include team-simple.html %}
{% endif %}
{% assign emeritus_shown = emeritus_shown | plus:1 %}
{% endif %}
{% endfor %}
</div>
</div>
</div>
<div class="white-box page-content more-bottom">
<div class="col-lg-12 col-md-12 col-sm-12">
<h2 class="text-center more-bottom">Community Contributors</h2>
<p>Qubes would not be where it is today without the input of the many users,
testers, and developers of all skill levels who have come together to form
this thriving community. The community's discussions take place primarily on
the <a href="/doc/mailing-lists/">Qubes mailing lists</a>.</p>
</div>
{% assign community_total = 0 %}
{% for team in site.data.team %}
{% if team.type == "community" %}
{% assign community_total = community_total | plus:1 %}
{% endif %}
{% endfor %}
{% assign community_half = community_total | divided_by:2 %}
{% assign community_shown = 0 %}
<div class="row team">
<div class="col-lg-6 col-md-6 col-sm-6 col-xs-12">
{% for team in site.data.team %}
{% if team.type == "community" %}
{% if community_shown < community_half %}
{% include team-simple.html %}
{% elsif community_shown == community_half %}
</div>
<div class="col-lg-6 col-md-6 col-sm-6 col-xs-12">
{% include team-simple.html %}
{% else %}
{% include team-simple.html %}
{% endif %}
{% assign community_shown = community_shown | plus:1 %}
{% endif %}
{% endfor %}
</div>
</div>
</div>

79
about/video-tours.html Normal file
View file

@ -0,0 +1,79 @@
---
layout: default
title: Video Tours of Qubes OS
permalink: /video-tours/
---
<div id="tour">
<div class="row">
<div class="col-lg-8 col-md-12 col-xs-12">
<h2 class="add-bottom">A Video Tour of Qubes 3.1 by Matthew Wilson</h2>
<div id="player0"></div>
<p>This video by Matthew Wilson provides an overview of Qubes 3.1. You can use the menu links to browse to specific chapters.</p>
</div>
<div class="col-lg-4 col-md-12 col-xs-12">
<h2 class="add-bottom">&nbsp;</h2>
<ul id="player0-menu" class="list-unstyled remove-bottom">
<li><a href="00:00" class="player0-seek">An Overview of Qubes OS</a></li>
<li><a href="01:47" class="player0-seek">Web browsing with multiple identities</a></li>
<li><a href="05:26" class="player0-seek">Isolating files in different Qubes</a></li>
<li><a href="07:28" class="player0-seek">Moving files between Qubes</a></li>
<li><a href="09:21" class="player0-seek">Using the secure clipboard</a></li>
<li><a href="11:13" class="player0-seek">Web browsing securely in a Disposable Qube</a></li>
<li><a href="13:51" class="player0-seek">Handling untrusted files in a Disposable Qube</a></li>
<li><a href="16:50" class="player0-seek">Exploring the Qubes Manager</a></li>
<li><a href="18:54" class="player0-seek">Templates and App Qubes</a></li>
<li><a href="20:04" class="player0-seek">Installing temporary applications</a></li>
<li><a href="21:57" class="player0-seek">Installing persistent applications</a></li>
<li><a href="24:20" class="player0-seek">Managing the applications menu</a></li>
<li><a href="25:09" class="player0-seek">Creating & using a Standalone Qube</a></li>
<li><a href="26:38" class="player0-seek">Editing settings of a Qube</a></li>
<li><a href="28:40" class="player0-seek">Creating a Qube for added security & privacy</a></li>
<li><a href="29:42" class="player0-seek">Whonix and Tor for privacy & anonymity</a></li>
</ul>
</div>
</div>
<hr class="more-top more-bottom">
<div class="row">
<div class="col-lg-4 col-md-4 col-xs-12">
<h2>Introduction</h2>
<p>Learn the basics in this introduction to Qubes OS.</p><br>
<a href="/intro/" class="btn btn-primary">
<i class="fa fa-flag"></i> What is Qubes OS?
</a>
</div>
<div class="col-lg-4 col-md-4 col-xs-12">
<h2>Screenshots</h2>
<p>See what using Qubes actually looks like with these screenshots of various applications running in Qubes.</p>
<a href="/screenshots/" class="btn btn-primary">
<i class="fa fa-picture-o"></i> See Screenshots
</a>
</div>
<div class="col-lg-4 col-md-4 col-xs-12">
<h2>Getting Started</h2>
<p>Ready to get started with Qubes? Here's what you need to know after installing.</p>
<a href="/getting-started/" class="btn btn-primary">
<i class="fa fa-cubes"></i> Getting Started
</a>
</div>
</div>
<hr class="more-top more-bottom">
<div class="row">
<div class="col-lg-8 col-md-12 col-xs-12">
<h2 class="add-bottom">French Video Series by Paf LeGeek (6 Parts)</h2>
<div id="player1"></div>
<p>This French series by Paf LeGeek provides a guide to Qubes OS across six videos. You can use the menu links to browse to specific videos in the series.</p>
</div>
<div class="col-lg-4 col-md-12 col-xs-12">
<h2 class="add-bottom">&nbsp;</h2>
<ul id="player1-menu" class="list-unstyled remove-bottom">
<li><a href="q7mCeYCrQ24" class="player1-play">Partie 1: Présentation du projet Qubes OS</a></li>
<li><a href="a8YIVqaP8Lk" class="player1-play">Partie 2: ProxyVM VPN et Tor</a></li>
<li><a href="RcUUAGdAFHo" class="player1-play">Partie 3: Installer Qubes OS</a></li>
<li><a href="Zu9ab7E-Mqk" class="player1-play">Partie 4: Installer Windows 7</a></li>
<li><a href="HgIKtopFZxU" class="player1-play">Partie 5: Créer un coffre fort numérique</a></li>
<li><a href="Yr-oRWtCZGI" class="player1-play">Partie 6: ProxyVM VPN avec kill switch</a></li>
</ul>
</div>
</div>
</div>