mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-11-19 03:12:37 -05:00
Merge remote-tracking branch 'parulin/intro-remove-headings'
This commit is contained in:
commit
59488e73ef
1 changed files with 36 additions and 63 deletions
|
|
@ -13,68 +13,58 @@ What is Qubes OS?
|
||||||
Qubes OS is a free and open-source, security-oriented operating system for
|
Qubes OS is a free and open-source, security-oriented operating system for
|
||||||
single-user desktop computing. Qubes OS `leverages Xen-based virtualization <https://wiki.xen.org/wiki/Xen_Project_Software_Overview>`__ to allow for the creation and management of isolated compartments called :term:`qubes <qube>`.
|
single-user desktop computing. Qubes OS `leverages Xen-based virtualization <https://wiki.xen.org/wiki/Xen_Project_Software_Overview>`__ to allow for the creation and management of isolated compartments called :term:`qubes <qube>`.
|
||||||
|
|
||||||
|
These qubes, which are implemented as :term:`virtual machines (VMs) <vm>`, have specific:
|
||||||
|
|
||||||
These qubes, which are implemented as :term:`virtual machines (VMs)<VM>`, have specific:
|
- **Purposes:** with a predefined set of one or many isolated applications, for personal or professional projects, to manage the :doc:`network stack </developer/system/networking>`, :doc:`the firewall </user/security-in-qubes/firewall>`, or to fulfill other user-defined purposes.
|
||||||
|
|
||||||
- **Purposes:** with a predefined set of one or many isolated
|
- **Natures:** :doc:`full-fledged </user/advanced-topics/standalones-and-hvms>` or :doc:`stripped-down </introduction/getting-started/>` virtual machines based on popular operating systems, such as :doc:`Fedora </user/templates/fedora/fedora>`, :doc:`Debian </user/templates/debian/debian>`, and :doc:`Windows </user/templates/windows/windows>`.
|
||||||
applications, for personal or professional projects, to manage the
|
|
||||||
:doc:`network stack </developer/system/networking>`, :doc:`the firewall </user/security-in-qubes/firewall>`, or to fulfill other
|
|
||||||
user-defined purposes.
|
|
||||||
|
|
||||||
- **Natures:** :doc:`full-fledged </user/advanced-topics/standalones-and-hvms>` or
|
- **Levels of trust:** from complete to non-existent. All windows are displayed in a unified desktop environment with :doc:`unforgeable colored window borders </introduction/getting-started>` so that different security levels are easily identifiable.
|
||||||
:doc:`stripped-down </introduction/getting-started/>` virtual machines based on popular operating systems,
|
|
||||||
such as :doc:`Fedora </user/templates/fedora/fedora>`, :doc:`Debian </user/templates/debian/debian>`, and
|
|
||||||
:doc:`Windows </user/templates/windows/windows>`.
|
|
||||||
|
|
||||||
- **Levels of trust:** from complete to non-existent. All windows are displayed in a unified desktop environment with
|
|
||||||
:doc:`unforgeable colored window borders </introduction/getting-started>` so that different security levels are easily identifiable.
|
|
||||||
|
|
||||||
.. figure:: /attachment/site/qubes-trust-level-architecture.png
|
.. image:: /attachment/site/qubes-trust-level-architecture.png
|
||||||
:alt: Qubes system diagram
|
:alt: Qubes system diagram
|
||||||
|
|
||||||
|
|
||||||
.. note::
|
.. note::
|
||||||
|
|
||||||
**Note:** See our :doc:`glossary </user/reference/glossary>` and :doc:`FAQ </introduction/faq>` for more information.
|
See our :doc:`/user/reference/glossary` and :doc:`/introduction/faq` for more information.
|
||||||
|
|
||||||
|
|
||||||
Features
|
Features
|
||||||
--------
|
--------
|
||||||
|
|
||||||
- **Strong isolation** Isolate different pieces of software as if they were installed on separate
|
Strong isolation
|
||||||
physical machines using advanced virtualization techniques.
|
Isolate different pieces of software as if they were installed on separate physical machines using advanced virtualization techniques.
|
||||||
|
|
||||||
- **Template system** Use :term:`app qubes <app qube>` to
|
Template system
|
||||||
share a root file system without sacrificing security using the innovative
|
Use :term:`app qubes <app qube>` to share a root file system without sacrificing security using the innovative :doc:`Template system </user/templates/templates>`.
|
||||||
:doc:`Template system </user/templates/templates>`.
|
|
||||||
|
|
||||||
|
Multiple operating systems
|
||||||
|
Use multiple operating systems at the same time, including :doc:`Fedora </user/templates/fedora/fedora>`, :doc:`Debian </user/templates/debian/debian/>`, and :doc:`Windows </user/templates/windows/windows>`
|
||||||
|
|
||||||
- **Multiple operating systems** Use multiple operating systems at the same time, including
|
:term:`Disposables <disposable>`
|
||||||
:doc:`Fedora </user/templates/fedora/fedora>`, :doc:`Debian </user/templates/debian/debian/>`, and
|
Create :doc:`disposables </user/how-to-guides/how-to-use-disposables>` on the fly that self-destruct when shut down.
|
||||||
:doc:`Windows </user/templates/windows/windows>`
|
|
||||||
|
|
||||||
- **Disposables** Create :doc:`disposables </user/how-to-guides/how-to-use-disposables>` on the fly that self-destruct when shut down.
|
Whonix integration
|
||||||
|
Run `Tor <https://www.torproject.org/>`__ securely system-wide using `Whonix with Qubes <https://www.whonix.org/wiki/Qubes>`__.
|
||||||
|
|
||||||
- **Whonix integration** Run `Tor <https://www.torproject.org/>`__ securely system-wide using `Whonix with Qubes <https://www.whonix.org/wiki/Qubes>`__.
|
Device isolation
|
||||||
|
Secure :doc:`device handling </user/how-to-guides/how-to-use-devices>` through isolation of network cards and USB controllers.
|
||||||
|
|
||||||
- **Device isolation** Secure :doc:`device handling </user/how-to-guides/how-to-use-devices>` through isolation of network cards and USB controllers.
|
Split GPG
|
||||||
|
Utilize :doc:`Split GPG </user/security-in-qubes/split-gpg>` to keep your private keys safe.
|
||||||
|
|
||||||
- **Split GPG** Utilize :doc:`Split GPG </user/security-in-qubes/split-gpg>` to keep your private keys safe.
|
CTAP proxy
|
||||||
|
Operate :doc:`Qubes CTAP proxy </user/security-in-qubes/ctap-proxy>` to use your two-factor authentication devices without exposing your web browser to the full USB stack.
|
||||||
- **CTAP proxy** Operate :doc:`Qubes CTAP proxy </user/security-in-qubes/ctap-proxy>` to use your two-factor authentication devices without exposing your web browser to the full USB stack.
|
|
||||||
|
|
||||||
- **Open-source** Users are free to use, copy, and modify Qubes OS and :doc:`are encouraged to do so! </introduction/contributing>`
|
|
||||||
|
|
||||||
|
Open-source
|
||||||
|
Users are free to use, copy, and modify Qubes OS and :doc:`are encouraged to do so! </introduction/contributing>`
|
||||||
|
|
||||||
.. note::
|
.. note::
|
||||||
|
|
||||||
**Note:** Given the technical nature of Qubes OS, prior experience with Linux can be helpful.
|
Given the technical nature of Qubes OS, prior experience with Linux can be helpful.
|
||||||
|
|
||||||
|
|
||||||
Why Qubes OS?
|
Why Qubes OS?
|
||||||
-------------
|
-------------
|
||||||
|
|
||||||
|
|
||||||
Physical isolation is a given safeguard that the digital world lacks
|
Physical isolation is a given safeguard that the digital world lacks
|
||||||
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||||
|
|
||||||
|
|
@ -95,11 +85,9 @@ Better yet, it allows us to create new compartments whenever we need them,
|
||||||
and it gives us sophisticated tools for securely managing our activities
|
and it gives us sophisticated tools for securely managing our activities
|
||||||
and data across these compartments.
|
and data across these compartments.
|
||||||
|
|
||||||
.. figure:: /attachment/doc/r4.0-qubes-manager.png
|
.. image:: /attachment/doc/r4.0-qubes-manager.png
|
||||||
:alt: Qubes manager
|
:alt: Qubes manager
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Qubes allows you to compartmentalize your digital life
|
Qubes allows you to compartmentalize your digital life
|
||||||
------------------------------------------------------
|
------------------------------------------------------
|
||||||
|
|
||||||
|
|
@ -126,13 +114,12 @@ physical computer without having to worry about a single successful
|
||||||
cyberattack taking down your entire digital life in one fell swoop. In
|
cyberattack taking down your entire digital life in one fell swoop. In
|
||||||
fact, Qubes has `distinct advantages over physical air gaps <https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf>`__.
|
fact, Qubes has `distinct advantages over physical air gaps <https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf>`__.
|
||||||
|
|
||||||
.. figure:: /attachment/site/qubes-partition-data-flows.jpg
|
.. image:: /attachment/site/qubes-partition-data-flows.jpg
|
||||||
:alt: Compartmentalization example
|
:alt: Compartmentalization example
|
||||||
|
|
||||||
Made to support vulnerable users and power users alike
|
Made to support vulnerable users and power users alike
|
||||||
------------------------------------------------------
|
------------------------------------------------------
|
||||||
|
|
||||||
|
|
||||||
Qubes provides practical, usable security to vulnerable and
|
Qubes provides practical, usable security to vulnerable and
|
||||||
actively-targeted individuals, such as journalists, activists,
|
actively-targeted individuals, such as journalists, activists,
|
||||||
whistleblowers, and researchers. Qubes is designed with the understanding
|
whistleblowers, and researchers. Qubes is designed with the understanding
|
||||||
|
|
@ -157,31 +144,18 @@ software, because the fundamental operating system that constitutes the
|
||||||
core infrastructure of our digital lives **must** be free and
|
core infrastructure of our digital lives **must** be free and
|
||||||
open-source in order to be trustworthy.
|
open-source in order to be trustworthy.
|
||||||
|
|
||||||
|
.. image:: /attachment/doc/r4.0-snapshot12.png
|
||||||
.. figure:: /attachment/doc/r4.0-snapshot12.png
|
|
||||||
:alt: Qubes desktop screenshot
|
:alt: Qubes desktop screenshot
|
||||||
|
|
||||||
|
Qubes OS at a glance
|
||||||
|
--------------------
|
||||||
|
|
||||||
|
:doc:`/introduction/video-tours/`
|
||||||
Video Tours
|
Want to see Qubes OS in action? Sit back and watch one of the guided :doc:`/introduction/video-tours/`!
|
||||||
^^^^^^^^^^^
|
:doc:`/introduction/screenshots/`
|
||||||
|
See what using Qubes actually looks like with various applications running in Qubes.
|
||||||
Want to see Qubes OS in action? Sit back and watch a guided :doc:`tour! </introduction/video-tours/>`
|
:doc:`/introduction/getting-started`
|
||||||
|
Ready to get started with Qubes? Find all you need to know after installing.
|
||||||
|
|
||||||
Screenshots
|
|
||||||
^^^^^^^^^^^
|
|
||||||
|
|
||||||
See what using Qubes actually looks like with these :doc:`screenshots </introduction/screenshots/>` of various
|
|
||||||
applications running in Qubes.
|
|
||||||
|
|
||||||
|
|
||||||
Getting Started
|
|
||||||
^^^^^^^^^^^^^^^
|
|
||||||
|
|
||||||
Ready to get started with Qubes? :doc:`Here's </introduction/getting-started>` what you need to know after installing.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
More information
|
More information
|
||||||
----------------
|
----------------
|
||||||
|
|
@ -190,7 +164,6 @@ This page is just a brief introduction to what Qubes is all about, and
|
||||||
many technical details have been omitted here for the sake of
|
many technical details have been omitted here for the sake of
|
||||||
presentation.
|
presentation.
|
||||||
|
|
||||||
|
|
||||||
- If you’re a current or potential Qubes user, you may want to check out the :doc:`documentation </index>` and the :ref:`user FAQ <introduction/faq:users>`.
|
- If you’re a current or potential Qubes user, you may want to check out the :doc:`documentation </index>` and the :ref:`user FAQ <introduction/faq:users>`.
|
||||||
- If you’re a developer, there’s dedicated :ref:`index:Developer Documentation` and a :ref:`developer FAQ <introduction/faq:developers>` just for you.
|
- If you’re a developer, there’s dedicated :ref:`index:Developer Documentation` and a :ref:`developer FAQ <introduction/faq:developers>` just for you.
|
||||||
- Ready to give Qubes a try? Head on over to the `downloads page <https://www.qubes-os.org/downloads/>`__, and read the :doc:`Installation guide </user/downloading-installing-upgrading/installation-guide>`.
|
- Ready to give Qubes a try? Head on over to the `downloads page <https://www.qubes-os.org/downloads/>`__, and read the :doc:`Installation guide </user/downloading-installing-upgrading/installation-guide>`.
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue