mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-10-01 01:25:40 -04:00
Update privacy entries
Thanks to forum user QubicRoot for feedback on these entries.
This commit is contained in:
parent
9bab67ff3b
commit
899c839885
@ -69,22 +69,32 @@ Those concerned about physical hardware attacks will benefit from [Anti Evil Mai
|
||||
|
||||
### How does Qubes OS provide privacy?
|
||||
|
||||
There can be no privacy without security, since security vulnerabilities allow privacy measures to be circumvented.
|
||||
This makes Qubes exceptionally well-suited for implementing effective privacy tools.
|
||||
|
||||
Users concerned about privacy will appreciate the integration of [Whonix][Qubes-Whonix] into Qubes, which makes it easy to use [Tor] securely.
|
||||
For more information about how to use this powerful tool correctly and safely, please see [Whonix][Qubes-Whonix].
|
||||
|
||||
### What about privacy in non-Whonix qubes?
|
||||
|
||||
Non-[Whonix][Qubes-Whonix] qubes do not claim to provide any special privacy (as opposed to security) properties.
|
||||
Qubes OS does not claim to provide special privacy (as opposed to security) properties in non-[Whonix][Qubes-Whonix] qubes.
|
||||
This includes [DisposableVMs][disposable].
|
||||
|
||||
For example, a standard [Fedora](/doc/templates/fedora/) qube is expected to have basically the same privacy properties as that upstream Fedora distribution, enhanced to some degree by the control Qubes provides over that qube.
|
||||
For most users, this level of privacy may be good enough for many common activities.
|
||||
However, users seeking more advanced privacy features should use [Whonix][Qubes-Whonix] qubes.
|
||||
|
||||
Privacy is far more difficult than is commonly understood.
|
||||
In addition to the [web browser](https://www.torproject.org/projects/torbrowser/design/), there is also [VM fingerprinting](https://www.whonix.org/wiki/VM_Fingerprinting) and [advanced deanonymization attacks](https://www.whonix.org/wiki/Advanced_Deanonymization_Attacks) that most users have never considered (and this is just to mention a few examples).
|
||||
The Whonix Project specializes in [protecting against these risks](https://www.whonix.org/wiki/Protocol-Leak-Protection_and_Fingerprinting-Protection).
|
||||
The [Whonix Project](https://www.whonix.org/) specializes in [protecting against these risks](https://www.whonix.org/wiki/Protocol-Leak-Protection_and_Fingerprinting-Protection).
|
||||
|
||||
In order to achieve the same results in non-Whonix qubes (including DisposableVMs), one would have to reinvent Whonix.
|
||||
Such duplication of effort makes no sense when Whonix already exists and is already integrated into Qubes OS.
|
||||
|
||||
When you need privacy, use Whonix.
|
||||
When you use a non-Whonix qube, do not expect it.
|
||||
Therefore, when you need privacy, you should use Whonix qubes.
|
||||
Remember, though, that privacy is difficult to achieve and maintain.
|
||||
Whonix is a powerful tool, but no tool is perfect.
|
||||
Read the [documentation](https://www.whonix.org/wiki/Documentation) thoroughly and exercise care when using it.
|
||||
|
||||
### How does Qubes OS compare to using a "live CD" OS?
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user