mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-08-07 06:02:26 -04:00
Merge cd312e6d7d
into ba609d123e
This commit is contained in:
commit
58d3931cc3
1 changed files with 7 additions and 9 deletions
|
@ -6,7 +6,7 @@ What is Qubes OS?
|
||||||
-----------------
|
-----------------
|
||||||
|
|
||||||
Qubes OS is a free and open-source, security-oriented operating system for
|
Qubes OS is a free and open-source, security-oriented operating system for
|
||||||
single-user desktop computing. Qubes OS `leverages Xen-based virtualization <https://wiki.xen.org/wiki/Xen_Project_Software_Overview>`__ to allow for the creation and management of isolated compartments called :ref:`qubes <user/reference/glossary:qube>`.
|
single-user desktop computing. Qubes OS leverages `Xen-based virtualization <https://wiki.xen.org/wiki/Xen_Project_Software_Overview>`__ to allow for the creation and management of isolated compartments called :ref:`qubes <user/reference/glossary:qube>`.
|
||||||
|
|
||||||
|
|
||||||
These qubes, which are implemented as :ref:`virtual machines (VMs)<user/reference/glossary:vm>`, have specific:
|
These qubes, which are implemented as :ref:`virtual machines (VMs)<user/reference/glossary:vm>`, have specific:
|
||||||
|
@ -98,10 +98,6 @@ and data across these compartments.
|
||||||
Qubes allows you to compartmentalize your digital life
|
Qubes allows you to compartmentalize your digital life
|
||||||
------------------------------------------------------
|
------------------------------------------------------
|
||||||
|
|
||||||
.. figure:: /attachment/site/qubes-partition-data-flows.jpg
|
|
||||||
:alt: Compartmentalization example
|
|
||||||
|
|
||||||
|
|
||||||
Many of us are initially surprised to learn that our devices do not
|
Many of us are initially surprised to learn that our devices do not
|
||||||
support the kind of secure compartmentalization that our lives demand, and
|
support the kind of secure compartmentalization that our lives demand, and
|
||||||
we're disappointed that software vendors rely on generic defenses that
|
we're disappointed that software vendors rely on generic defenses that
|
||||||
|
@ -125,6 +121,8 @@ physical computer without having to worry about a single successful
|
||||||
cyberattack taking down your entire digital life in one fell swoop. In
|
cyberattack taking down your entire digital life in one fell swoop. In
|
||||||
fact, Qubes has `distinct advantages over physical air gaps <https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf>`__.
|
fact, Qubes has `distinct advantages over physical air gaps <https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf>`__.
|
||||||
|
|
||||||
|
.. figure:: /attachment/site/qubes-partition-data-flows.jpg
|
||||||
|
:alt: Compartmentalization example
|
||||||
|
|
||||||
Made to support vulnerable users and power users alike
|
Made to support vulnerable users and power users alike
|
||||||
------------------------------------------------------
|
------------------------------------------------------
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue