From 639a34e9ceceef4c7e063747aa70a0fee8954aa1 Mon Sep 17 00:00:00 2001 From: Andrew David Wong Date: Sat, 29 Aug 2020 17:16:38 -0500 Subject: [PATCH] Update intro page - Clean up source - Use HTML consistently throughout - Fix images --- introduction/intro.md | 416 +++++++++++++++++++++++++++--------------- 1 file changed, 273 insertions(+), 143 deletions(-) diff --git a/introduction/intro.md b/introduction/intro.md index 8a1a2f74..e632cb68 100644 --- a/introduction/intro.md +++ b/introduction/intro.md @@ -1,5 +1,5 @@ --- -layout: intro +layout: default title: Introduction permalink: /intro/ redirect_from: @@ -10,85 +10,151 @@ redirect_from: - /en/about/ --- -What is Qubes OS? ------------------ +

What is Qubes OS?

-
-
-

Qubes OS is a free and open-source, security-oriented operating system for single-user desktop computing. Qubes OS leverages Xen-based virtualization to allow for the creation and management of isolated compartments called qubes.

-
+
+
+

+ Qubes OS is a free and open-source, security-oriented operating system for + single-user desktop computing. Qubes OS leverages + + Xen-based virtualization to allow for the creation and management of + isolated compartments called qubes. +

-
-
-

These qubes, which are implemented as virtual machines (VMs), have specific:

-
    -
  • Purposes: with a predefined set of one or many isolated applications, for personal or professional projects, to manage the network stack, the firewall, or to fulfill other user-defined purposes.
  • -
  • Natures: full-fledged or stripped-down virtual machines based on popular operating systems, such as Fedora, Debian, and Windows.
  • -
  • Levels of trust: from complete to non-existent. All windows are displayed in a unified desktop environment with unforgeable colored window borders so that different security levels are easily identifiable.
  • -
-
-
- -
+
+ +
+
+

+ These qubes, which are implemented as virtual + machines (VMs), have specific: +

    +
  • + Purposes: with a predefined set of one or many isolated + applications, for personal or professional projects, to manage the + network stack, + the firewall, or to fulfill other + user-defined purposes. +
  • +
  • + Natures: full-fledged or + + stripped-down virtual machines based on popular operating systems, + such as Fedora, + Debian, and + Windows. +
  • +
  • + Levels of trust: from complete to non-existent. All windows are + displayed in a unified desktop environment with + unforgeable colored window borders so + that different security levels are easily identifiable. +
  • +
+

+
+ + Qubes system diagram + +
+

Features

-
-
-

Strong isolation

-

Isolate different pieces of software as if they were installed on separate physical machines using PV or HVM virtualization techniques.

-
-
-

Template system

-

Use AppVMs to share a root file system without sacrificing security using the innovative Template system.

-
-
-

Multiple operating systems

-

Use multiple operating systems at the same time, including Fedora, Debian, and Windows.

-
+
+
+

Strong isolation

+

+ Isolate different pieces of software as if they were installed on separate + physical machines using PV or + HVM virtualization techniques. +

+
+

Template system

+

+ Use AppVMs to + share a root file system without sacrificing security using the innovative + Template system. +

+
+
+

Multiple operating systems

+

+ Use multiple operating systems at the same time, including + Fedora, + Debian, and + Windows. +

+
+
-
-
-
-

DisposableVMs

-

Create DisposableVMs on the fly that self-destruct when shut down.

-
-
-

Whonix integration

-

Run Tor securely system-wide using Whonix with Qubes.

-
-
-

Device isolation

-

Secure device handling through isolation of network cards and USB controllers.

-
-
+
-
-
-
-

Split GPG

-

Utilize Split GPG to keep your private keys safe.

-
-
-

U2F proxy

-

Operate Qubes U2F proxy to use your two-factor authentication devices without exposing your web browser to the full USB stack.

-
-
-

Open-source

-

Users are free to use, copy, and modify Qubes OS and are encouraged to do so!

-
+
+
+

DisposableVMs

+

+ Create DisposableVMs on the fly that + self-destruct when shut down. +

+
+

Whonix integration

+

+ Run Tor securely system-wide + using Whonix with Qubes. +

+
+
+

Device isolation

+

+ Secure device handling through + isolation of network cards and USB controllers. +

+
+
+ +
+ +
+
+

Split GPG

+

+ Utilize Split GPG to keep your private keys + safe. +

+
+
+

U2F proxy

+

+ Operate Qubes U2F proxy to use your + two-factor authentication devices without exposing your web browser to the + full USB stack. +

+
+
+

Open-source

+

+ Users are free to use, copy, and modify Qubes OS and + are encouraged to do so! +

+
+
@@ -96,96 +162,160 @@ What is Qubes OS?

Physical isolation is a given safeguard that the digital world lacks

-
-
-

Throughout our lives, we engage in various activities, such as going to school, working, voting, taking care of our families, and visiting with friends. These activities are spatially and temporally bound: They happen in isolation from one another, in their own compartments, which often represent an essential safeguard, as in the case of voting.

-

In our digital lives, the situation is quite different: All of our activities typically happen on a single device. This causes us to worry about whether it's safe to click on a link or install an app, since being hacked imperils our entire digital existence.

-

Qubes eliminates this concern by allowing us to divide a device into many compartments, much as we divide a physical building into many rooms. Better yet, it allows us to create new compartments whenever we need them, and it gives us sophisticated tools for securely managing our activities and data across these compartments.

-
-
- -
+
+
+

+ Throughout our lives, we engage in various activities, such as going to + school, working, voting, taking care of our families, and visiting with + friends. These activities are spatially and temporally bound: They happen + in isolation from one another, in their own compartments, which often + represent an essential safeguard, as in the case of voting. +

+

+ In our digital lives, the situation is quite different: All of our + activities typically happen on a single device. This causes us to worry + about whether it's safe to click on a link or install an app, since being + hacked imperils our entire digital existence. +

+

+ Qubes eliminates this concern by allowing us to divide a device into many + compartments, much as we divide a physical building into many rooms. + Better yet, it allows us to create new compartments whenever we need them, + and it gives us sophisticated tools for securely managing our activities + and data across these compartments. +

+
+ + Qube Manager + +
+

Qubes allows you to compartmentalize your digital life

-
-
- -
-
-

Many of us are initially surprised to learn that our devices do not support the kind of secure compartmentalization that our lives demand, and we're disappointed that software vendors rely on generic defenses that repeatedly succumb to new attacks.

-

In building Qubes, our working assumption is that all software contains bugs. Not only that, but in their stampeding rush to meet deadlines, the world's stressed-out software developers are pumping out new code at a staggering rate — far faster than the comparatively smaller population of security experts could ever hope to analyze it for vulnerabilities, much less fix everything. Rather than pretend that we can prevent these inevitable vulnerabilities from being exploited, we've designed Qubes under the assumption that they will be exploited. It's only a matter of time until the next zero-day attack.

-

In light of this sobering reality, Qubes takes an eminently practical approach: confine, control, and contain the damage. It allows you to keep valuable data separate from risky activities, preventing cross-contamination. This means you you can do everything on the same physical computer without having to worry about a single successful cyberattack taking down your entire digital life in one fell swoop. In fact, Qubes has distinct advantages over physical air gaps.

-
+
+ +
+

+ Many of us are initially surprised to learn that our devices do not + support the kind of secure compartmentalization that our lives demand, and + we're disappointed that software vendors rely on generic defenses that + repeatedly succumb to new attacks. +

+

+ In building Qubes, our working assumption is that all software contains + bugs. Not only that, but in their stampeding rush to meet deadlines, the + world's stressed-out software developers are pumping out new code at a + staggering rate — far faster than the comparatively smaller + population of security experts could ever hope to analyze it for + vulnerabilities, much less fix everything. Rather than pretend that we can + prevent these inevitable vulnerabilities from being exploited, we've + designed Qubes under the assumption that they will be exploited. + It's only a matter of time until the next zero-day attack. +

+

+ In light of this sobering reality, Qubes takes an eminently practical + approach: confine, control, and contain the damage. It allows you to keep + valuable data separate from risky activities, preventing + cross-contamination. This means you you can do everything on the same + physical computer without having to worry about a single successful + cyberattack taking down your entire digital life in one fell swoop. In + fact, Qubes has + + distinct advantages over physical air gaps. +

+
+

Made to support vulnerable users

-
-
-

Qubes provides practical, usable security to vulnerable and actively-targeted individuals, such as journalists, activists, whistleblowers, and researchers. Qubes is designed with the understanding that people make mistakes, and it allows you to protect yourself from your own mistakes. It's a place where you can click on links, open attachments, plug in devices, and install software free from worry. It's a place where you have control over your software, not the other way around.

-
-
+
+
+

+ Qubes provides practical, usable security to vulnerable and + actively-targeted individuals, such as journalists, activists, + whistleblowers, and researchers. Qubes is designed with the understanding + that people make mistakes, and it allows you to protect yourself from your + own mistakes. It's a place where you can click on links, open attachments, + plug in devices, and install software free from worry. It's a place where + you have control over your software, not the other way around. +

+
+
-

snapshot12.png

+

+ + Qubes desktop screenshot + +


-
-
-

Video Tours

-

Want to see Qubes OS in action? Sit back and watch a guided tour!

- - Video Tours - -
-
-

Screenshots

-

See what using Qubes actually looks like with these screenshots of various applications running in Qubes.

- - Screenshots - -
-
-

Getting Started

-

Ready to get started with Qubes? Here's what you need to know after installing.

- - Getting Started - -
+ +
+
+

Video Tours

+

+ Want to see Qubes OS in action? Sit back and watch a guided tour! +

+ + Video Tours +
+
+

Screenshots

+

+ See what using Qubes actually looks like with these screenshots of various + applications running in Qubes. +

+ + Screenshots + +
+
+

Getting Started

+

+ Ready to get started with Qubes? Here's what you need to know after + installing. +

+ + Getting Started + +
+
+

More information

-More information ----------------- - -This page is just a brief introduction to what Qubes is all about, and many technical details have been omitted here for the sake of presentation. - - * If you're a current or potential Qubes user, you may want to check out the [documentation][doc] and the [user FAQ][user-faq]. - * If you're a developer, there's dedicated [developer documentation] and an [developer FAQ][devel-faq] just for you. - * Ready to give Qubes a try? Head on over to the [downloads] page, and read the [installation guide]. - * Need help, or just want to join the conversation? Learn more about [help, support, the mailing lists, and the forum][support]. - - -[disposable qube]: /doc/disposablevm/ -[networking]: /doc/networking/ -[firewalls]: /doc/firewall/ -[USB]: /doc/usb/ -[file]: /doc/copying-files/ -[clipboard]: /doc/copy-paste/ -[Template]: /doc/templates/ -[Qubes-Whonix]: /doc/whonix/ -[Whonix]: https://www.whonix.org/ -[Tor]: https://www.torproject.org/ -[Anti Evil Maid]: /doc/anti-evil-maid/ -[Tails]: https://tails.boum.org/ -[Xen]: https://www.xenproject.org -[doc]: /doc/ -[user-faq]: /faq/#users -[developer documentation]: /doc/#developer-documentation -[devel-faq]: /faq/#developers -[downloads]: /downloads/ -[getting started]: /getting-started/ -[installation guide]: /doc/installation-guide/ -[support]: /support/ +

+ This page is just a brief introduction to what Qubes is all about, and many + technical details have been omitted here for the sake of presentation. +

+