mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-08-06 05:34:27 -04:00
Apply a more consistent style to introduction
Following the doc migration from Markdown to RestructuredText, a more logical markup was applied to the *Features* section, but not to the section about *video tours*, *screenshots* and *Getting started*. Now, the links are better, too. The `figure` markup should be used for images with a caption or a description. All the images on this page are purely decorative, thus the alt should be empty. Two images around a title gave a weird result with the new html style so the second one was moved.
This commit is contained in:
parent
ba609d123e
commit
8e99b018d8
1 changed files with 13 additions and 42 deletions
|
@ -8,7 +8,6 @@ What is Qubes OS?
|
|||
Qubes OS is a free and open-source, security-oriented operating system for
|
||||
single-user desktop computing. Qubes OS `leverages Xen-based virtualization <https://wiki.xen.org/wiki/Xen_Project_Software_Overview>`__ to allow for the creation and management of isolated compartments called :ref:`qubes <user/reference/glossary:qube>`.
|
||||
|
||||
|
||||
These qubes, which are implemented as :ref:`virtual machines (VMs)<user/reference/glossary:vm>`, have specific:
|
||||
|
||||
- **Purposes:** with a predefined set of one or many isolated
|
||||
|
@ -24,15 +23,13 @@ These qubes, which are implemented as :ref:`virtual machines (VMs)<user/referenc
|
|||
- **Levels of trust:** from complete to non-existent. All windows are displayed in a unified desktop environment with
|
||||
:doc:`unforgeable colored window borders </introduction/getting-started>` so that different security levels are easily identifiable.
|
||||
|
||||
.. figure:: /attachment/site/qubes-trust-level-architecture.png
|
||||
:alt: Qubes system diagram
|
||||
|
||||
.. image:: /attachment/site/qubes-trust-level-architecture.png
|
||||
:alt:
|
||||
|
||||
.. note::
|
||||
|
||||
**Note:** See our :doc:`glossary </user/reference/glossary>` and :doc:`FAQ </introduction/faq>` for more information.
|
||||
|
||||
|
||||
Features
|
||||
--------
|
||||
|
||||
|
@ -43,7 +40,6 @@ Features
|
|||
share a root file system without sacrificing security using the innovative
|
||||
:doc:`Template system </user/templates/templates>`.
|
||||
|
||||
|
||||
- **Multiple operating systems** Use multiple operating systems at the same time, including
|
||||
:doc:`Fedora </user/templates/fedora/fedora>`, :doc:`Debian </user/templates/debian/debian/>`, and
|
||||
`Windows <https://github.com/Qubes-Community/Contents/blob/master/docs/os/windows/windows.md>`__
|
||||
|
@ -60,16 +56,13 @@ Features
|
|||
|
||||
- **Open-source** Users are free to use, copy, and modify Qubes OS and :doc:`are encouraged to do so! </introduction/contributing>`
|
||||
|
||||
|
||||
.. note::
|
||||
|
||||
**Note:** Given the technical nature of Qubes OS, prior experience with Linux can be helpful.
|
||||
|
||||
|
||||
Why Qubes OS?
|
||||
-------------
|
||||
|
||||
|
||||
Physical isolation is a given safeguard that the digital world lacks
|
||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||
|
||||
|
@ -90,18 +83,12 @@ Better yet, it allows us to create new compartments whenever we need them,
|
|||
and it gives us sophisticated tools for securely managing our activities
|
||||
and data across these compartments.
|
||||
|
||||
.. figure:: /attachment/doc/r4.0-qubes-manager.png
|
||||
:alt: Qubes manager
|
||||
|
||||
|
||||
.. image:: /attachment/doc/r4.0-qubes-manager.png
|
||||
:alt:
|
||||
|
||||
Qubes allows you to compartmentalize your digital life
|
||||
------------------------------------------------------
|
||||
|
||||
.. figure:: /attachment/site/qubes-partition-data-flows.jpg
|
||||
:alt: Compartmentalization example
|
||||
|
||||
|
||||
Many of us are initially surprised to learn that our devices do not
|
||||
support the kind of secure compartmentalization that our lives demand, and
|
||||
we're disappointed that software vendors rely on generic defenses that
|
||||
|
@ -125,11 +112,12 @@ physical computer without having to worry about a single successful
|
|||
cyberattack taking down your entire digital life in one fell swoop. In
|
||||
fact, Qubes has `distinct advantages over physical air gaps <https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf>`__.
|
||||
|
||||
.. image:: /attachment/site/qubes-partition-data-flows.jpg
|
||||
:alt:
|
||||
|
||||
Made to support vulnerable users and power users alike
|
||||
------------------------------------------------------
|
||||
|
||||
|
||||
Qubes provides practical, usable security to vulnerable and
|
||||
actively-targeted individuals, such as journalists, activists,
|
||||
whistleblowers, and researchers. Qubes is designed with the understanding
|
||||
|
@ -154,31 +142,15 @@ software, because the fundamental operating system that constitutes the
|
|||
core infrastructure of our digital lives **must** be free and
|
||||
open-source in order to be trustworthy.
|
||||
|
||||
.. image:: /attachment/doc/r4.0-snapshot12.png
|
||||
:alt:
|
||||
|
||||
.. figure:: /attachment/doc/r4.0-snapshot12.png
|
||||
:alt: Qubes desktop screenshot
|
||||
|
||||
|
||||
|
||||
Video Tours
|
||||
~~~~~~~~~~~
|
||||
|
||||
Want to see Qubes OS in action? Sit back and watch a guided :doc:`tour! </introduction/video-tours/>`
|
||||
|
||||
|
||||
Screenshots
|
||||
~~~~~~~~~~~
|
||||
|
||||
See what using Qubes actually looks like with these :doc:`screenshots </introduction/screenshots/>` of various
|
||||
applications running in Qubes.
|
||||
|
||||
|
||||
Getting Started
|
||||
~~~~~~~~~~~~~~~
|
||||
|
||||
Ready to get started with Qubes? :doc:`Here's </introduction/getting-started>` what you need to know after installing.
|
||||
|
||||
Qubes OS at a glance
|
||||
--------------------
|
||||
|
||||
- :doc:`Video tours</introduction/video-tours/>`: want to see Qubes OS in action? Sit back and watch one of the guided tour!
|
||||
- :doc:`Screenshots </introduction/screenshots/>`: see what using Qubes actually looks like with various applications running in Qubes.
|
||||
- :doc:`Getting started </introduction/getting-started>`: ready to get started with Qubes? Find all you need to know after installing.
|
||||
|
||||
More information
|
||||
----------------
|
||||
|
@ -187,7 +159,6 @@ This page is just a brief introduction to what Qubes is all about, and
|
|||
many technical details have been omitted here for the sake of
|
||||
presentation.
|
||||
|
||||
|
||||
- If you’re a current or potential Qubes user, you may want to check out the :doc:`documentation </index>` and the :ref:`user FAQ <introduction/faq:users>`.
|
||||
- If you’re a developer, there’s dedicated :ref:`developer documentation <index:developer documentation>` and a :ref:`developer FAQ <introduction/faq:developers>` just for you.
|
||||
- Ready to give Qubes a try? Head on over to the `downloads page <https://www.qubes-os.org/downloads/>`__, and read the :doc:`installation guide </user/downloading-installing-upgrading/installation-guide>`.
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue