mirror of
https://codeberg.org/andersonarc/reliant-system.git
synced 2025-11-14 05:10:38 -05:00
update instructions
This commit is contained in:
parent
2c3117fe81
commit
6309be9bb4
2 changed files with 4 additions and 4 deletions
|
|
@ -1,12 +1,12 @@
|
|||
# qubes-sflc
|
||||
|
||||
To compile Shufflecake for QubesOS, you must first create a bootstrap qube. The template does not matter, but it will probably be easiest to use Fedora. Inside the bootstrap qube, you must install Git and Docker via
|
||||
To compile Shufflecake for QubesOS, you must first create a bootstrap qube. The template does not matter, but it will probably be easiest to use Fedora. You are also advised to name the qube "bootstrap" to be consistent with the installation instructions. Inside the bootstrap qube, you must install Git and Docker via
|
||||
|
||||
```sh
|
||||
sudo dnf install -y git docker
|
||||
```
|
||||
|
||||
or using the relevant package manager for another distribution. Then, clone the reliant-system repository,
|
||||
or using the relevant package manager for another distribution. Then, clone the reliant-system repository into your home directory,
|
||||
|
||||
```sh
|
||||
git clone https://codeberg.org/andersonarc/reliant-system.git
|
||||
|
|
@ -28,4 +28,4 @@ qvm-run --pass-io bootstrap "cat /home/$USER/reliant-system/qubes-sflc/dm-sflc.k
|
|||
depmod
|
||||
```
|
||||
|
||||
where `bootstrap` is the name of your bootstrap qube. If successful, Shufflecake will now be available in your dom0 and could be used to mount secure volumes. Unfortunately, this is insufficient to securely operate the system while maintaining plausible deniability. Under normal conditions, the hidden qubes will inevitably leave some traces in the root filesystem of dom0. This is what reliant-system attempts to resolve by freezing the state of dom0.
|
||||
where `bootstrap` is the name of your bootstrap qube. If successful, Shufflecake will now be available in your dom0 and could be used to mount encrypted volumes. However, this is **insufficient** to securely operate the system while maintaining plausible deniability. Under normal conditions, the hidden qubes will inevitably leave some traces in the root filesystem of dom0. Therefore, please refrain from opening Shufflecake encrypted devices before the system has been fully set up in volatile mode.
|
||||
|
|
|
|||
|
|
@ -1,4 +1,4 @@
|
|||
FROM fedora:37
|
||||
RUN dnf install -y gcc make device-mapper-devel libgcrypt-devel
|
||||
WORKDIR /root/shufflecake-c
|
||||
ENTRYPOINT make clean && make
|
||||
ENTRYPOINT make clean; make
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue