Merge remote-tracking branch 'parulin/intro-remove-headings'

This commit is contained in:
qubedmaiska 2025-09-21 13:13:30 -04:00
commit 59488e73ef
No known key found for this signature in database
GPG key ID: 204BCE0FD52C0501

View file

@ -13,68 +13,58 @@ What is Qubes OS?
Qubes OS is a free and open-source, security-oriented operating system for Qubes OS is a free and open-source, security-oriented operating system for
single-user desktop computing. Qubes OS `leverages Xen-based virtualization <https://wiki.xen.org/wiki/Xen_Project_Software_Overview>`__ to allow for the creation and management of isolated compartments called :term:`qubes <qube>`. single-user desktop computing. Qubes OS `leverages Xen-based virtualization <https://wiki.xen.org/wiki/Xen_Project_Software_Overview>`__ to allow for the creation and management of isolated compartments called :term:`qubes <qube>`.
These qubes, which are implemented as :term:`virtual machines (VMs) <vm>`, have specific:
These qubes, which are implemented as :term:`virtual machines (VMs)<VM>`, have specific: - **Purposes:** with a predefined set of one or many isolated applications, for personal or professional projects, to manage the :doc:`network stack </developer/system/networking>`, :doc:`the firewall </user/security-in-qubes/firewall>`, or to fulfill other user-defined purposes.
- **Purposes:** with a predefined set of one or many isolated - **Natures:** :doc:`full-fledged </user/advanced-topics/standalones-and-hvms>` or :doc:`stripped-down </introduction/getting-started/>` virtual machines based on popular operating systems, such as :doc:`Fedora </user/templates/fedora/fedora>`, :doc:`Debian </user/templates/debian/debian>`, and :doc:`Windows </user/templates/windows/windows>`.
applications, for personal or professional projects, to manage the
:doc:`network stack </developer/system/networking>`, :doc:`the firewall </user/security-in-qubes/firewall>`, or to fulfill other
user-defined purposes.
- **Natures:** :doc:`full-fledged </user/advanced-topics/standalones-and-hvms>` or - **Levels of trust:** from complete to non-existent. All windows are displayed in a unified desktop environment with :doc:`unforgeable colored window borders </introduction/getting-started>` so that different security levels are easily identifiable.
:doc:`stripped-down </introduction/getting-started/>` virtual machines based on popular operating systems,
such as :doc:`Fedora </user/templates/fedora/fedora>`, :doc:`Debian </user/templates/debian/debian>`, and
:doc:`Windows </user/templates/windows/windows>`.
- **Levels of trust:** from complete to non-existent. All windows are displayed in a unified desktop environment with
:doc:`unforgeable colored window borders </introduction/getting-started>` so that different security levels are easily identifiable.
.. figure:: /attachment/site/qubes-trust-level-architecture.png .. image:: /attachment/site/qubes-trust-level-architecture.png
:alt: Qubes system diagram :alt: Qubes system diagram
.. note:: .. note::
**Note:** See our :doc:`glossary </user/reference/glossary>` and :doc:`FAQ </introduction/faq>` for more information. See our :doc:`/user/reference/glossary` and :doc:`/introduction/faq` for more information.
Features Features
-------- --------
- **Strong isolation** Isolate different pieces of software as if they were installed on separate Strong isolation
physical machines using advanced virtualization techniques. Isolate different pieces of software as if they were installed on separate physical machines using advanced virtualization techniques.
- **Template system** Use :term:`app qubes <app qube>` to Template system
share a root file system without sacrificing security using the innovative Use :term:`app qubes <app qube>` to share a root file system without sacrificing security using the innovative :doc:`Template system </user/templates/templates>`.
:doc:`Template system </user/templates/templates>`.
Multiple operating systems
Use multiple operating systems at the same time, including :doc:`Fedora </user/templates/fedora/fedora>`, :doc:`Debian </user/templates/debian/debian/>`, and :doc:`Windows </user/templates/windows/windows>`
- **Multiple operating systems** Use multiple operating systems at the same time, including :term:`Disposables <disposable>`
:doc:`Fedora </user/templates/fedora/fedora>`, :doc:`Debian </user/templates/debian/debian/>`, and Create :doc:`disposables </user/how-to-guides/how-to-use-disposables>` on the fly that self-destruct when shut down.
:doc:`Windows </user/templates/windows/windows>`
- **Disposables** Create :doc:`disposables </user/how-to-guides/how-to-use-disposables>` on the fly that self-destruct when shut down. Whonix integration
Run `Tor <https://www.torproject.org/>`__ securely system-wide using `Whonix with Qubes <https://www.whonix.org/wiki/Qubes>`__.
- **Whonix integration** Run `Tor <https://www.torproject.org/>`__ securely system-wide using `Whonix with Qubes <https://www.whonix.org/wiki/Qubes>`__. Device isolation
Secure :doc:`device handling </user/how-to-guides/how-to-use-devices>` through isolation of network cards and USB controllers.
- **Device isolation** Secure :doc:`device handling </user/how-to-guides/how-to-use-devices>` through isolation of network cards and USB controllers. Split GPG
Utilize :doc:`Split GPG </user/security-in-qubes/split-gpg>` to keep your private keys safe.
- **Split GPG** Utilize :doc:`Split GPG </user/security-in-qubes/split-gpg>` to keep your private keys safe. CTAP proxy
Operate :doc:`Qubes CTAP proxy </user/security-in-qubes/ctap-proxy>` to use your two-factor authentication devices without exposing your web browser to the full USB stack.
- **CTAP proxy** Operate :doc:`Qubes CTAP proxy </user/security-in-qubes/ctap-proxy>` to use your two-factor authentication devices without exposing your web browser to the full USB stack.
- **Open-source** Users are free to use, copy, and modify Qubes OS and :doc:`are encouraged to do so! </introduction/contributing>`
Open-source
Users are free to use, copy, and modify Qubes OS and :doc:`are encouraged to do so! </introduction/contributing>`
.. note:: .. note::
**Note:** Given the technical nature of Qubes OS, prior experience with Linux can be helpful. Given the technical nature of Qubes OS, prior experience with Linux can be helpful.
Why Qubes OS? Why Qubes OS?
------------- -------------
Physical isolation is a given safeguard that the digital world lacks Physical isolation is a given safeguard that the digital world lacks
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
@ -95,11 +85,9 @@ Better yet, it allows us to create new compartments whenever we need them,
and it gives us sophisticated tools for securely managing our activities and it gives us sophisticated tools for securely managing our activities
and data across these compartments. and data across these compartments.
.. figure:: /attachment/doc/r4.0-qubes-manager.png .. image:: /attachment/doc/r4.0-qubes-manager.png
:alt: Qubes manager :alt: Qubes manager
Qubes allows you to compartmentalize your digital life Qubes allows you to compartmentalize your digital life
------------------------------------------------------ ------------------------------------------------------
@ -126,13 +114,12 @@ physical computer without having to worry about a single successful
cyberattack taking down your entire digital life in one fell swoop. In cyberattack taking down your entire digital life in one fell swoop. In
fact, Qubes has `distinct advantages over physical air gaps <https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf>`__. fact, Qubes has `distinct advantages over physical air gaps <https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf>`__.
.. figure:: /attachment/site/qubes-partition-data-flows.jpg .. image:: /attachment/site/qubes-partition-data-flows.jpg
:alt: Compartmentalization example :alt: Compartmentalization example
Made to support vulnerable users and power users alike Made to support vulnerable users and power users alike
------------------------------------------------------ ------------------------------------------------------
Qubes provides practical, usable security to vulnerable and Qubes provides practical, usable security to vulnerable and
actively-targeted individuals, such as journalists, activists, actively-targeted individuals, such as journalists, activists,
whistleblowers, and researchers. Qubes is designed with the understanding whistleblowers, and researchers. Qubes is designed with the understanding
@ -157,31 +144,18 @@ software, because the fundamental operating system that constitutes the
core infrastructure of our digital lives **must** be free and core infrastructure of our digital lives **must** be free and
open-source in order to be trustworthy. open-source in order to be trustworthy.
.. image:: /attachment/doc/r4.0-snapshot12.png
.. figure:: /attachment/doc/r4.0-snapshot12.png
:alt: Qubes desktop screenshot :alt: Qubes desktop screenshot
Qubes OS at a glance
--------------------
:doc:`/introduction/video-tours/`
Video Tours Want to see Qubes OS in action? Sit back and watch one of the guided :doc:`/introduction/video-tours/`!
^^^^^^^^^^^ :doc:`/introduction/screenshots/`
See what using Qubes actually looks like with various applications running in Qubes.
Want to see Qubes OS in action? Sit back and watch a guided :doc:`tour! </introduction/video-tours/>` :doc:`/introduction/getting-started`
Ready to get started with Qubes? Find all you need to know after installing.
Screenshots
^^^^^^^^^^^
See what using Qubes actually looks like with these :doc:`screenshots </introduction/screenshots/>` of various
applications running in Qubes.
Getting Started
^^^^^^^^^^^^^^^
Ready to get started with Qubes? :doc:`Here's </introduction/getting-started>` what you need to know after installing.
More information More information
---------------- ----------------
@ -190,7 +164,6 @@ This page is just a brief introduction to what Qubes is all about, and
many technical details have been omitted here for the sake of many technical details have been omitted here for the sake of
presentation. presentation.
- If youre a current or potential Qubes user, you may want to check out the :doc:`documentation </index>` and the :ref:`user FAQ <introduction/faq:users>`. - If youre a current or potential Qubes user, you may want to check out the :doc:`documentation </index>` and the :ref:`user FAQ <introduction/faq:users>`.
- If youre a developer, theres dedicated :ref:`index:Developer Documentation` and a :ref:`developer FAQ <introduction/faq:developers>` just for you. - If youre a developer, theres dedicated :ref:`index:Developer Documentation` and a :ref:`developer FAQ <introduction/faq:developers>` just for you.
- Ready to give Qubes a try? Head on over to the `downloads page <https://www.qubes-os.org/downloads/>`__, and read the :doc:`Installation guide </user/downloading-installing-upgrading/installation-guide>`. - Ready to give Qubes a try? Head on over to the `downloads page <https://www.qubes-os.org/downloads/>`__, and read the :doc:`Installation guide </user/downloading-installing-upgrading/installation-guide>`.