update instructions

This commit is contained in:
Anderson Rosenberg 2025-08-21 08:55:08 -04:00
parent 2c3117fe81
commit 6309be9bb4
No known key found for this signature in database
GPG key ID: 7ACF448C0590AB9C
2 changed files with 4 additions and 4 deletions

View file

@ -1,12 +1,12 @@
# qubes-sflc
To compile Shufflecake for QubesOS, you must first create a bootstrap qube. The template does not matter, but it will probably be easiest to use Fedora. Inside the bootstrap qube, you must install Git and Docker via
To compile Shufflecake for QubesOS, you must first create a bootstrap qube. The template does not matter, but it will probably be easiest to use Fedora. You are also advised to name the qube "bootstrap" to be consistent with the installation instructions. Inside the bootstrap qube, you must install Git and Docker via
```sh
sudo dnf install -y git docker
```
or using the relevant package manager for another distribution. Then, clone the reliant-system repository,
or using the relevant package manager for another distribution. Then, clone the reliant-system repository into your home directory,
```sh
git clone https://codeberg.org/andersonarc/reliant-system.git
@ -28,4 +28,4 @@ qvm-run --pass-io bootstrap "cat /home/$USER/reliant-system/qubes-sflc/dm-sflc.k
depmod
```
where `bootstrap` is the name of your bootstrap qube. If successful, Shufflecake will now be available in your dom0 and could be used to mount secure volumes. Unfortunately, this is insufficient to securely operate the system while maintaining plausible deniability. Under normal conditions, the hidden qubes will inevitably leave some traces in the root filesystem of dom0. This is what reliant-system attempts to resolve by freezing the state of dom0.
where `bootstrap` is the name of your bootstrap qube. If successful, Shufflecake will now be available in your dom0 and could be used to mount encrypted volumes. However, this is **insufficient** to securely operate the system while maintaining plausible deniability. Under normal conditions, the hidden qubes will inevitably leave some traces in the root filesystem of dom0. Therefore, please refrain from opening Shufflecake encrypted devices before the system has been fully set up in volatile mode.

View file

@ -1,4 +1,4 @@
FROM fedora:37
RUN dnf install -y gcc make device-mapper-devel libgcrypt-devel
WORKDIR /root/shufflecake-c
ENTRYPOINT make clean && make
ENTRYPOINT make clean; make