mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-12-29 09:16:22 -05:00
Merge remote-tracking branch 'origin/pr/358'
* origin/pr/358: Rewrite last sentence. Change a word Add Information to tails.md
This commit is contained in:
commit
791212a1d7
@ -9,7 +9,10 @@ redirect_from:
|
|||||||
Running Tails in Qubes
|
Running Tails in Qubes
|
||||||
============================
|
============================
|
||||||
|
|
||||||
[Tails](https://tails.boum.org) is the amnesic incognito live system. It is a live operating system that aims to preserve your privacy and anonymity.
|
[Tails](https://tails.boum.org) stands for The Amnesic Incognito Live System.
|
||||||
|
It is a live operating system that aims to preserve your privacy and anonymity.
|
||||||
|
Tails is intended to be booted off of a live CD and leave no trace on the computer it is run on, but using Tails this way requires the user to restart their computer every time they want to switch from their installed OS to Tails.
|
||||||
|
Despite this, in case that method becomes cumbersome, Tails can be used inside virtualization software and Qubes.
|
||||||
|
|
||||||
To run Tails under Qubes:
|
To run Tails under Qubes:
|
||||||
|
|
||||||
@ -19,7 +22,7 @@ To run Tails under Qubes:
|
|||||||
|
|
||||||
3. Create a HVM
|
3. Create a HVM
|
||||||
|
|
||||||
- in Manager, click VM menu and select "Create VM"
|
- In Manager, click "VM menu" and select "Create VM"
|
||||||
- Name the new qube - "Tails"
|
- Name the new qube - "Tails"
|
||||||
- Select "HVM"
|
- Select "HVM"
|
||||||
- Configure networking
|
- Configure networking
|
||||||
@ -48,13 +51,13 @@ To run Tails under Qubes:
|
|||||||
### Display issues:
|
### Display issues:
|
||||||
**Black screen on start up.**
|
**Black screen on start up.**
|
||||||
|
|
||||||
This was reported with earlier versions of Tails: I believe the problem is now fixed.
|
This was reported with earlier versions of Tails: The problem should now be fixed.
|
||||||
If you do encounter this problem, you can try to constrain display settings by appending vga codes to the Tails boot parameters.
|
If you do encounter this problem, you can try to constrain display settings by appending vga codes to the Tails boot parameters.
|
||||||
(If you do not know the codes, append `vga=999`, and a helpful prompt will appear.)
|
(If you do not know the codes, append `vga=999`, and a helpful prompt will appear.)
|
||||||
|
|
||||||
N.B Tails 2.3 does not appear to honour the vga code.
|
N.B Tails 2.3 does not appear to honour the vga code.
|
||||||
|
|
||||||
**Window extends beyond bottom of screen.**
|
**Window extends beyond the bottom of the screen.**
|
||||||
|
|
||||||
This seems to arise because Tails sizes to the height of the screen, but there is a title bar at the top of the window.
|
This seems to arise because Tails sizes to the height of the screen, but there is a title bar at the top of the window.
|
||||||
Either remove the title bar altogether, or move the window upwards using ALT+drag.
|
Either remove the title bar altogether, or move the window upwards using ALT+drag.
|
||||||
@ -70,5 +73,8 @@ Kill it from the GUI Manager or ```qvm-kill Tails``` in Konsole.
|
|||||||
### Security
|
### Security
|
||||||
You will probably want to implement [MAC spoofing](https://www.qubes-os.org/doc/anonymizing-your-mac-address/).
|
You will probably want to implement [MAC spoofing](https://www.qubes-os.org/doc/anonymizing-your-mac-address/).
|
||||||
|
|
||||||
Read [the warnings](https://tails.boum.org/doc/advanced_topics/virtualization/) from the Tails team about operating in a virtual machine.
|
There are added security concerns for Tails users when running it in a virtual machine.
|
||||||
|
If you intend to do this, you should read [the warnings](https://tails.boum.org/doc/advanced_topics/virtualization/) from the Tails team about it.
|
||||||
While the Qubes security model mitigates most of the risks identified, traces of the Tails session may remain on the disk.
|
While the Qubes security model mitigates most of the risks identified, traces of the Tails session may remain on the disk.
|
||||||
|
Live booting Tails, though less convenient, is always more secure than using it inside virtualization software or Qubes, because you don't run the added risk of the virtualization software or Host OS being compromised.
|
||||||
|
Depending on your threat model, this might induce too much risk.
|
||||||
|
Loading…
Reference in New Issue
Block a user