diff options
author | Your Name <you@example.com> | 2025-04-02 23:34:59 -0600 |
---|---|---|
committer | Your Name <you@example.com> | 2025-04-02 23:34:59 -0600 |
commit | c15160c18fb09f0342f4102f080b30d64799d99c (patch) | |
tree | 7d0ad8d0b545d3a3ed15efe95d15a99ad7ef76c2 /feed.html | |
parent | 3581efad49dc8eb79f4eca716195db52acdcacf7 (diff) |
testing new feed
Diffstat (limited to 'feed.html')
-rw-r--r-- | feed.html | 663 |
1 files changed, 90 insertions, 573 deletions
@@ -3,10 +3,10 @@ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <head> -<!-- 2025-04-02 Wed 23:14 --> +<!-- 2025-04-02 Wed 23:29 --> <meta http-equiv="Content-Type" content="text/html;charset=utf-8" /> <meta name="viewport" content="width=device-width, initial-scale=1" /> -<title>Posts</title> +<title>My Feed</title> <meta name="generator" content="Org Mode" /> <style type="text/css"> #content { max-width: 60em; margin: auto; } @@ -196,123 +196,21 @@ </head> <body> <div id="content" class="content"> -<h1 class="title">Posts</h1> -<div id="table-of-contents" role="doc-toc"> -<h2>Table of Contents</h2> -<div id="text-table-of-contents" role="doc-toc"> -<ul> -<li><a href="#org7c927bd">1. Prepping for v2 of my salt repo</a></li> -<li><a href="#org4481cad">2. Methods of installing software in QubesOS with Saltstack</a></li> -<li><a href="#org235e8dd">3. Website update</a></li> -<li><a href="#org3201c6b">4. Convenient torrenting with qBittorrent</a></li> -<li><a href="#org98eb2e0">5. QubesOS Saltstack configuration v1</a></li> -<li><a href="#org07950a9">6. Create an anonymous Whonix environment with KVM + NixOS</a></li> -</ul> -</div> -</div> -<div id="outline-container-org7c927bd" class="outline-2"> -<h2 id="org7c927bd"><span class="section-number-2">1.</span> Prepping for v2 of my salt repo</h2> -<div class="outline-text-2" id="text-1"> +<h1 class="title">My Feed</h1> +<div id="outline-container-org60c4b51" class="outline-2"> +<h2 id="org60c4b51">Prepping for v2 of my salt repo   <span class="tag"><span class="note">note</span></span></h2> +<div class="outline-text-2" id="text-org60c4b51"> <p> I’ve massively restructured my salt repo and added enough features that I’m going to make a new repository and release it again in full, as a 2.0 version. This should be done within the next week or two. </p> </div> </div> -<div id="outline-container-org4481cad" class="outline-2"> -<h2 id="org4481cad"><span class="section-number-2">2.</span> Methods of installing software in QubesOS with Saltstack</h2> -<div class="outline-text-2" id="text-2"> -<p> -Here are some various methods of installing software that I’ve used in my personal salt configuration -</p> +<div id="outline-container-org8698157" class="outline-2"> +<h2 id="org8698157"><a href="org:../website/posts/installing-software-salt-qubes.org">Methods of installing software in QubesOS w/ Saltstack</a>   <span class="tag"><span class="post">post</span></span></h2> </div> -<div id="outline-container-org973b785" class="outline-3"> -<h3 id="org973b785">pkg.installed</h3> -<div class="outline-text-3" id="text-org973b785"> -<p> -Here’s <code>/srv/user_salt/pkgs/accounting.sls</code> as an example. It uses the simplest way of installing programs, which is just listing them under <code>pkg.installed</code> which pulls them from your distros main repositories. This is the most preferable way to install software if it’s available. -</p> - -<div class="org-src-container"> -<pre class="src src-salt"><span style="color: #928374;"># </span><span style="color: #928374;">Install accounting tools</span> -<span style="color: #d3869b;">accounting--install-apps</span>: - <span style="color: #b8bb26;">pkg.installed</span>: - - <span style="color: #83a598;">pkgs</span>: - - hledger <span style="color: #928374;"># </span><span style="color: #928374;">Command-line plain text accounting</span> - - gnucash <span style="color: #928374;"># </span><span style="color: #928374;">Graphical GNU accounting suite</span> -</pre> -</div> -</div> -</div> -<div id="outline-container-org996bf7b" class="outline-3"> -<h3 id="org996bf7b">move a binary file into /usr/bin</h3> -<div class="outline-text-3" id="text-org996bf7b"> -<p> -Here’s <code>/srv/user_salt/pkgs/st.sls</code> as an example. It takes a binary file that’s part of this salt repository, and moves it into the ~/usr/bin/ directory in a qube. -</p> - -<div class="org-src-container"> -<pre class="src src-salt"><span style="color: #928374;"># </span><span style="color: #928374;">Installs my build of st terminal</span> -<span style="color: #d3869b;">/usr/bin/st</span>: - <span style="color: #b8bb26;">file.managed</span>: - - <span style="color: #83a598;">source</span>: <span style="color: #fe8019;">salt://</span>pkgs/bin/st.bin - - <span style="color: #83a598;">user</span>: root - - <span style="color: #83a598;">group</span>: root - - <span style="color: #83a598;">mode</span>: 777 -</pre> -</div> -</div> -</div> -<div id="outline-container-orgd61c221" class="outline-3"> -<h3 id="orgd61c221">Install from third-party repo with a script</h3> -<div class="outline-text-3" id="text-orgd61c221"> -<p> -Here’s <code>/srv/user_salt/pkgs/signal.sls</code> as an example. It starts by installing some dependencies using the most common <code>pkg.installed</code> method, then moves an install script <code>/srv/user_salt/pkgs/install-scripts/signal-repo.sh</code> into a qube and executes it to install the Signal messenger. -</p> - -<div class="org-src-container"> -<pre class="src src-salt"><span style="color: #928374;">...</span> - -<span style="color: #d3869b;">signal--repo-script</span>: - <span style="color: #b8bb26;">file.managed</span>: <span style="color: #928374;"># </span><span style="color: #928374;">file.managed lets you place files from your salt repo into qubes</span> - - <span style="color: #fe8019;">name</span>: /usr/bin/install-repo <span style="color: #928374;"># </span><span style="color: #928374;">this is where the installation script is placed</span> - - <span style="color: #83a598;">source</span>: <span style="color: #fe8019;">salt://</span>pkgs/install-scripts/signal-repo.sh <span style="color: #928374;"># </span><span style="color: #928374;">This is where the installation script was sourced</span> - - <span style="color: #83a598;">user</span>: root <span style="color: #928374;"># </span><span style="color: #928374;">sets the owner of the file, you can usually default to root</span> - - <span style="color: #83a598;">group</span>: root <span style="color: #928374;"># </span><span style="color: #928374;">sets the group of the file, you can usually default to root</span> - - <span style="color: #83a598;">mode</span>: 777 <span style="color: #928374;"># </span><span style="color: #928374;">sets the permissions of the file, you can usually default to 777 (any user on the qube has permissions)</span> - -<span style="color: #928374;"># </span><span style="color: #928374;">This simply executes the install-repo script in a qube</span> -<span style="color: #b8bb26;">'install-repo'</span>: - <span style="color: #b8bb26;">cmd.run</span> -</pre> -</div> - -<p> -Here’s the installation script that’s ran: -</p> -</div> -<div id="outline-container-orgfef4ce7" class="outline-4"> -<h4 id="orgfef4ce7"><code>/srv/user_salt/pkgs/install-scripts/signal-repo.sh</code></h4> -<div class="outline-text-4" id="text-orgfef4ce7"> -<div class="org-src-container"> -<pre class="src src-bash"><span style="color: #928374;"># </span><span style="color: #928374;">Retrieves Signal's key for verifying the package</span> -<span style="color: #928374;"># </span><span style="color: #928374;">The request is proxied through 127.0.0.1:8082 to allow the template qube to access the internet</span> -<span style="color: #fabd2f;">sudo</span> <span style="color: #fabd2f;">curl</span> --proxy 127.0.0.1:8082 -s https://updates.signal.org/desktop/apt/keys.asc | gpg --dearmor | <span style="color: #fabd2f;">sudo</span> tee -a /usr/share/keyrings/signal-desktop-keyring.gpg > /dev/null - -<span style="color: #928374;"># </span><span style="color: #928374;">Defines Signal's repo in /etc/apt/sources.list.d/</span> -<span style="color: #fabd2f;">echo</span> <span style="color: #b8bb26;">'deb [arch=amd64 signed-by=/usr/share/keyrings/signal-desktop-keyring.gpg] https://updates.signal.org/desktop/apt xenial main'</span> | tee /etc/apt/sources.list.d/signal-xenial.list - -<span style="color: #928374;"># </span><span style="color: #928374;">Updates packages and installs signal-desktop through the newly configured repository</span> -<span style="color: #fabd2f;">sudo</span> apt update -<span style="color: #fabd2f;">sudo</span> apt install signal-desktop -y -</pre> -</div> -</div> -</div> -</div> -</div> -<div id="outline-container-org235e8dd" class="outline-2"> -<h2 id="org235e8dd"><span class="section-number-2">3.</span> Website update</h2> -<div class="outline-text-2" id="text-3"> +<div id="outline-container-org6dc4776" class="outline-2"> +<h2 id="org6dc4776">Website update   <span class="tag"><span class="note">note</span></span></h2> +<div class="outline-text-2" id="text-org6dc4776"> <p> I’ve changed a few things about the website: </p> @@ -330,400 +228,19 @@ I’ve figured out how to create an RSS feed using <code>ox-rss</code>, whic </p> </div> </div> -<div id="outline-container-org3201c6b" class="outline-2"> -<h2 id="org3201c6b"><span class="section-number-2">4.</span> Convenient torrenting with qBittorrent</h2> -<div class="outline-text-2" id="text-4"> -</div> -<div id="outline-container-orgc261ddb" class="outline-3"> -<h3 id="orgc261ddb">Introduction</h3> -<div class="outline-text-3" id="text-orgc261ddb"> -<p> -Your access to media should not be limited by money, nor should it be limited by technical ability. I want to demonstrate with this quick guide that torrenting is as accessible and easy as it’s ever been, using Free and open-source software. -</p> -</div> -</div> -<div id="outline-container-org97636f2" class="outline-3"> -<h3 id="org97636f2">Install qBittorrent</h3> -<div class="outline-text-3" id="text-org97636f2"> -<p> -qBittorrent is a Free and open-source BitTorrent client that supports tons of features, but you need to know much at all to get started. To install it, go to their downloads page website at <a href="https://www.qbittorrent.org/download">https://www.qbittorrent.org/download</a> and select the right option for your computer. It supports Windows, MacOS, and can be installed through most common package managers on Linux. -</p> - -<p> -After it’s downloaded, install it like you would with any other program. -</p> -</div> -</div> -<div id="outline-container-org2a7ba27" class="outline-3"> -<h3 id="org2a7ba27">Enable the search engine</h3> -<div class="outline-text-3" id="text-org2a7ba27"> -<p> -To let us search for media, we need to turn on qBittorrent’s search engine. -</p> -<ul class="org-ul"> -<li>Click the “View” button in the toolbar</li> -<li>Check the “Search Engine” box -There should now be a “Search” tab next to “Transfers” under the toolbar</li> -<li>Click the “Search” tab</li> -<li>Click “Search Plugins” at the bottom right</li> -<li>Click “Check for updates”</li> -<li>Click “Ok” and “Close” to exit the search plugins menu</li> -</ul> -</div> -</div> -<div id="outline-container-org3d20c54" class="outline-3"> -<h3 id="org3d20c54">Search for and download some media</h3> -<div class="outline-text-3" id="text-org3d20c54"> -<ul class="org-ul"> -<li>In the “Search” tab, click on the search bar, enter the name of some movie, and press Return. Very quickly, you should see many results, with slightly different titles, sizes, and numbers of “Seeders”, among other things.</li> -</ul> -<p> -“Seeders” refers to the computers that are hosting the media you want. In general, you want to download files being seeded by lots of computers to get the fastest download speeds possible -</p> -<ul class="org-ul"> -<li>Pick a result with a name indicating the media, resolution, and episodes/seasons you want. Double-click it</li> -<li>A download prompt will appear. It has lots of settings, but you can simply click “Ok” to download it normally.</li> -</ul> -</div> -</div> -<div id="outline-container-org5d8d6ea" class="outline-3"> -<h3 id="org5d8d6ea">Now just wait</h3> -<div class="outline-text-3" id="text-org5d8d6ea"> -<p> -You can track the progress of torrents being downloaded in the “Transfers” tab. When it’s 100% complete, you can right-click the file, and click “Preview file” to have it play in your default media player. -</p> - -<p> -If you’re feeling charitable, you can leave qBittorrent running in the background to seed the files for other users. It’ll help keep the media accessible for everyone, and improve download speeds for others. Using a VPN is recommended if you plan on leaving the client running for long periods of time. -</p> -</div> -</div> -<div id="outline-container-orgc95fff4" class="outline-3"> -<h3 id="orgc95fff4">Extra tips</h3> -<div class="outline-text-3" id="text-orgc95fff4"> -</div> -<div id="outline-container-orgd43dcb2" class="outline-4"> -<h4 id="orgd43dcb2">Consider using a VPN</h4> -<div class="outline-text-4" id="text-orgd43dcb2"> -<p> -Some copyright holders use bots to detects users downloading their media. If you’re not using a VPN, these companies can see your IP and potentially send complaints to your ISP. If you download many things and want to keep your ISP happy, using a VPN will ensure your torrenting can’t be traced to your IP address. I personally use and recommend Mullvad ($5/month for 5 devices), but there are other reputable ones like Proton and IVPN. -</p> -</div> -</div> -<div id="outline-container-orga67b8d7" class="outline-4"> -<h4 id="orga67b8d7">Stream Media</h4> -<div class="outline-text-4" id="text-orga67b8d7"> -<p> -When you go to download a torrent and the download prompt pops up, you can optionally select “Download first and last pieces first” and “Download in sequential order”. -</p> - -<p> -This will likely make the total download take longer, but by downloading it in order, you can stream it in real time. Wait until about 5% of the download is complete, then you can watch it while the rest downloads live in the background. -</p> -</div> -</div> -<div id="outline-container-org6f4d2a1" class="outline-4"> -<h4 id="org6f4d2a1">Hosting a media server with Jellyfin</h4> -<div class="outline-text-4" id="text-org6f4d2a1"> -<p> -Jellyfin is a Free and open-source media-hosting server you can run on your computer. It’ll let you sign in to your library on a smart TV, other devices on your local network, or in a browser. -</p> - -<p> -Setting it up is outside the scope of this post, but I highly recommend it. It basically just consists of downloading the server, configuring your libraries, installing the clients on your other devices, and logging in to your server. -</p> - -<p> -<a href="https://jellyfin.org/">https://jellyfin.org/</a> -</p> -</div> -</div> -</div> -</div> -<div id="outline-container-org98eb2e0" class="outline-2"> -<h2 id="org98eb2e0"><span class="section-number-2">5.</span> QubesOS Saltstack configuration v1</h2> -<div class="outline-text-2" id="text-5"> -</div> -<div id="outline-container-orgda05b40" class="outline-3"> -<h3 id="orgda05b40">Notice:</h3> -<div class="outline-text-3" id="text-orgda05b40"> -<p> -<b>The repository is now hosted on this site at <a href="https://git.skylarcloud.xyz">https://git.skylarcloud.xyz</a>, not Github! For up-to-date instructions, refer to the new README.org in the new repo, there have been lots of changes since the publishing of this post.</b> -</p> -</div> -</div> -<div id="outline-container-org10f7e76" class="outline-3"> -<h3 id="org10f7e76">Intro</h3> -<div class="outline-text-3" id="text-org10f7e76"> -<p> -I’m publishing the janky V1 of my QubesOS configuration written with Saltstack. It’ll help set up a window manager, a couple of handy qubes, Doom Emacs, and the 3isec repo to jump-start your QubesOS experience. -</p> - -<p> -It’s not new-user friendly yet, nor is it in a state where anyone can immediately download and apply it. At the very least you’ll need to change the references to my username to yours in the salt files, and make sure the Fedora-40-XFCE and the Debian-12-minimal template are installed on your system. -</p> - -<p> -You can use my configuration almost as-is (just change the username references!) and it does work, but it’s not very feature-filled or optimized, and it’s probable that the next versions will conflict with it. -</p> -</div> -<div id="outline-container-org624a15e" class="outline-4"> -<h4 id="org624a15e">Link to repo on Github</h4> -<div class="outline-text-4" id="text-org624a15e"> -<p> -<a href="https://github.com/bumbleoats/My-QubesOS-Configuration">https://github.com/bumbleoats/My-QubesOS-Configuration</a> -</p> -</div> -</div> -<div id="outline-container-org67ca4e2" class="outline-4"> -<h4 id="org67ca4e2">Installation</h4> -<div class="outline-text-4" id="text-org67ca4e2"> -<p> -Make sure <code>state.user-dirs</code> is active, then just move the repo to <code>/srv/user_salt/</code> in dom0, and apply with <code>sudo qubesctl --all state.apply</code> -</p> -</div> -<ul class="org-ul"> -<li><a id="org192f11c"></a>Resources for installation<br /> -<div class="outline-text-5" id="text-org192f11c"> -</div> -<ul class="org-ul"> -<li><a id="orgb7d850c"></a>Community user guide for user-salt<br /> -<div class="outline-text-6" id="text-orgb7d850c"> -<ul class="org-ul"> -<li><a href="https://forum.qubes-os.org/t/qubes-salt-beginners-guide/20126">https://forum.qubes-os.org/t/qubes-salt-beginners-guide/20126</a></li> -<li>This was the best resource I found as a beginner, I wasn’t able to get anything working until I stumbled on it</li> -</ul> -</div> -</li> -<li><a id="org5bfc2af"></a>Issue I sometimes run into from a fresh QubesOS install<br /> -<div class="outline-text-6" id="text-org5bfc2af"> -<ul class="org-ul"> -<li><a href="https://github.com/QubesOS/qubes-issues/issues/8491">https://github.com/QubesOS/qubes-issues/issues/8491</a></li> -<li>TL;DR: This is the solution that’s worked for me, pulled from the discussion:</li> -</ul> -<div class="org-src-container"> -<pre class="src src-bash"><span style="color: #fabd2f;">ln</span> -s /srv/salt/qubes/user-dirs.top /srv/salt/_tops/base/user-dirs.top -</pre> -</div> -</div> -</li> -</ul> -</li> -</ul> -</div> -</div> -<div id="outline-container-org1aaf5e3" class="outline-3"> -<h3 id="org1aaf5e3">Programs in dom0</h3> -<div class="outline-text-3" id="text-org1aaf5e3"> -<p> -My configuration will install a few programs in dom0. It’s important that I put this at the top because generally, you want to limit the number of packages in dom0. Every new package is more attack surface on your most critical qube. I trust the programs I’ve chosen to add, and by using my configuration, you’re implicitly trusting them too. -</p> - -<p> -Look in <code>/srv/user_salt/</code> to find the related salt files and see the installed programs. -</p> -</div> -</div> -<div id="outline-container-orgdbc0603" class="outline-3"> -<h3 id="orgdbc0603">Window Management</h3> -<div class="outline-text-3" id="text-orgdbc0603"> -</div> -<div id="outline-container-org9dbd7ec" class="outline-4"> -<h4 id="org9dbd7ec">i3</h4> -<div class="outline-text-4" id="text-org9dbd7ec"> -<p> -i3 is a tiling window manager. It’s used primarily through the keyboard, so muscle memory can operate everything very quickly once you get used to it. When a window is opened, it will be ’tiled’, maximizing screen space. To open windows, rofi is used to search for applications and qubes. -</p> -</div> -<ul class="org-ul"> -<li><a id="orge0fb565"></a>Keybindings<br /> -<div class="outline-text-5" id="text-orge0fb565"> -<p> -You can navigate i3 with ’vim-like’ keybindings, inspired by the vi text editor. Some basic keybindings are shown below, and you can see many more by reading i3’s config file at <code>/srv/user_salt/dots/i3</code> -</p> - -<ul class="org-ul"> -<li>S = Shift key</li> -<li>mod = Windows/Command key</li> -</ul> - -<table border="2" cellspacing="0" cellpadding="6" rules="groups" frame="hsides"> - - -<colgroup> -<col class="org-left" /> - -<col class="org-left" /> -</colgroup> -<thead> -<tr> -<th scope="col" class="org-left">keybinding</th> -<th scope="col" class="org-left">function</th> -</tr> -</thead> -<tbody> -<tr> -<td class="org-left">mod + h/j/k/l</td> -<td class="org-left">move focus left/down/up/right</td> -</tr> - -<tr> -<td class="org-left">mod + S + h/j/k/l</td> -<td class="org-left">move focused window left/down/up/right</td> -</tr> - -<tr> -<td class="org-left">mod + d</td> -<td class="org-left">search/launch programs with rofi</td> -</tr> - -<tr> -<td class="org-left">mod + S + d</td> -<td class="org-left">switch between windows with rofi</td> -</tr> - -<tr> -<td class="org-left">mod + S + g</td> -<td class="org-left">window gap settings menu</td> -</tr> -</tbody> -</table> -</div> -</li> -</ul> -</div> -<div id="outline-container-org1f117c8" class="outline-4"> -<h4 id="org1f117c8">Misc</h4> -<div class="outline-text-4" id="text-org1f117c8"> -<p> -<code>wm.sls</code> will do a few other smaller things: -</p> -<ul class="org-ul"> -<li>Sets my default wallpaper</li> -<li>Sets xrandr default screenlayout, replace using ARandR</li> -<li>Creates X11 touchpad configuration for tap-to-click + natural scrolling</li> -<li>Sources default .bashrc config into <code>/root/</code> and <code>/home/skylar/</code> from <code>/srv/user_salt/dots/.bashrc</code></li> -<li>Prioritize xfce4-terminal in <code>/usr/bin/qubes-i3-sensible-terminal</code></li> -<li>Symlink rofi in place of dmenu</li> -</ul> -</div> -</div> -</div> -<div id="outline-container-orgffebae1" class="outline-3"> -<h3 id="orgffebae1">My qubes</h3> -<div class="outline-text-3" id="text-orgffebae1"> -</div> -<div id="outline-container-org2479484" class="outline-4"> -<h4 id="org2479484">Emacs</h4> -<div class="outline-text-4" id="text-org2479484"> -<p> -If you’re a Doom Emacs user (there are dozens of us!) this will hopefully make your life slightly easier. -</p> - -<p> -A template and app qube for Emacs will be created, Doom Emacs will automatically be installed inside the app qube, and the contents of (in dom0) <code>/srv/user_salt/dots/doom-emacs</code> will be added to the Doom Emacs qube. -</p> - -<p> -My personal configuration is in the repository and will be written be default, but it’s super simple to replace for your own (just find the directory mentioned above). I’ve done very little with my configuration, and use it basically as it comes out-of-the-box. -</p> -</div> -</div> -<div id="outline-container-org0387686" class="outline-4"> -<h4 id="org0387686">Torrenting</h4> -<div class="outline-text-4" id="text-org0387686"> -<p> -A template and app qube for qBittorrent will be created. The gruxbox theme that I use will be moved from dom0 to the app qube so it’s easy to apply. -</p> - -<p> -qBittorrent is a torrent client that lets you search for and download large files, particularly media files. You can enable the built-in search utility by doing the following: -</p> - -<ol class="org-ol"> -<li>Navigate to the “View” menu at the top of the window</li> -<li>Enable the “Search Engine” option</li> -<li>A new tab should show up slightly below called “Search”, click it</li> -<li>In the new menu, click “Search plugins…” at the bottom</li> -<li>Click “Check for updates”</li> -<li>Once the search plugins are installed for a default list of trackers, you can close the window and search for media.</li> -</ol> -</div> -<ul class="org-ul"> -<li><a id="org5dbac0d"></a>VPN use<br /> -<div class="outline-text-5" id="text-org5dbac0d"> -<p> -If you’re downloading copyrighted content in an area where it’s illegal, I would strongly urge you consider using a VPN to hide your IP address. LE is unlikely to bust down your door for watching Spongebob, but copyright holders can and will send letters to your ISP, which can eventually get your internet service shut off if you continue. Tor can be used, but it’s extremely slow, and hogs a lot of bandwidth on the network. -</p> - -<p> -Personally, I use Mullvad and don’t have any complaints. Proton and IVPN are reputable as well. -</p> -</div> -</li> -</ul> -</div> -<div id="outline-container-org5270555" class="outline-4"> -<h4 id="org5270555">Personal/work email</h4> -<div class="outline-text-4" id="text-org5270555"> -<p> -A template for email will be created, and two app qubes, “email-personal” and “email-work”. These just have the Thunderbird email client installed so you can sign into your accounts. -</p> -</div> -</div> -</div> -<div id="outline-container-org8f95ecb" class="outline-3"> -<h3 id="org8f95ecb">3isec</h3> -<div class="outline-text-3" id="text-org8f95ecb"> -<p> -The 3isec repo is a handy repository of salt files with some miscellaneous utilities. The repository will be added to dom0, their gpg key will be added from this salt repository, and their graphical interface for it will be installed in dom0. You can start it with ’qubes-task-gui’ in dom0. -</p> - -<p> -I usually install common, mirage-firewall, monitor, mullvad-vpn, and sys-multimedia. -</p> -</div> -</div> -<div id="outline-container-org5029404" class="outline-3"> -<h3 id="org5029404">Post install</h3> -<div class="outline-text-3" id="text-org5029404"> -<p> -Almost everything will be done out of the box, but here are some recommended finishing touches: -</p> -<ul class="org-ul"> -<li>Open Emacs in its app qube, run nerd-icons-install-fonts, and reload your Emacs configuration</li> -<li>Optionally replace config files with your own <code>/srv/user_salt/</code></li> -<li>Optionally install any packages you’ll want with 3isec</li> -<li>Set the storage and networking settings of your qubes to your preference (by default everything will be routed through your default net-qube, probably sys-firewall)</li> -</ul> -</div> -</div> -<div id="outline-container-org2278eb1" class="outline-3"> -<h3 id="org2278eb1">What’s next?</h3> -<div class="outline-text-3" id="text-org2278eb1"> -<p> -This project will develop over time as I learn more about Saltstack and continue to work on my personal configuration. I have lots of plans: -</p> - -<ul class="org-ul"> -<li>Signal! I’m embarrassed to admit that I couldn’t figure out how to add the Signal repo/gpg-key to a template to install signal-desktop. It’s pretty easy to do imperatively, but it’ll be a no-brainer to automate once I know a little bit more about Saltstack.</li> -<li>Replace more templates with minimal ones to save on startup-time/space/updates</li> -<li>qmenu scrips with rofi to do more with the keyboard</li> -<li>Browser configuration. I like to set my browsers up in a similar way almost every time with a couple of favorite extensions and configuration. I want to implement this in Saltstack asap.</li> -<li>A handful of other simple qubes that I often end up creating over time</li> -<li>Write and implement bash and elisp scripts to improve various QubesOS/Emacs workflows</li> -<li>Generally improve at Saltstack to make the config more extendable/robust/optimized</li> -</ul> -</div> +<div id="outline-container-orgfbca32a" class="outline-2"> +<h2 id="orgfbca32a"><a href="org:../website/posts/qbittorrent.org">Convenient torrenting with qBittorrent</a>   <span class="tag"><span class="post">post</span></span></h2> </div> +<div id="outline-container-org5da6f1e" class="outline-2"> +<h2 id="org5da6f1e"><a href="org:../website/posts/qubes-salt-v1.org">QubesOS Saltstack configuration v1</a>   <span class="tag"><span class="post">post</span></span></h2> </div> -<div id="outline-container-org07950a9" class="outline-2"> -<h2 id="org07950a9"><span class="section-number-2">6.</span> Create an anonymous Whonix environment with KVM + NixOS</h2> -<div class="outline-text-2" id="text-6"> +<div id="outline-container-org08f20c8" class="outline-2"> +<h2 id="org08f20c8">Create an anonymous Whonix environment with KVM + NixOS   <span class="tag"><span class="post">post</span></span></h2> +<div class="outline-text-2" id="text-org08f20c8"> </div> -<div id="outline-container-org5713fff" class="outline-3"> -<h3 id="org5713fff">The why</h3> -<div class="outline-text-3" id="text-org5713fff"> +<div id="outline-container-org7f5739f" class="outline-3"> +<h3 id="org7f5739f">The why</h3> +<div class="outline-text-3" id="text-org7f5739f"> <p> I’ve spent significant time using QubesOS on various computers, and I’ve been thoroughly spoiled by the VM magic Zen and the Qubes team have enabled. For a few reasons though, I’ve recently switched my main laptop from running QubesOS to NixOS. NixOS is great: it’s declaratively managed, fast, stable, has tons of fresh packages, but I can’t help but feel like my trust in the system has decreased a little bit due to the lack of isolation via virtualization that QubesOS provides. </p> @@ -741,9 +258,9 @@ To demonstrate this, I’ll be going through a Whonix installation on NixOS </p> </div> </div> -<div id="outline-container-org3c234f9" class="outline-3"> -<h3 id="org3c234f9">What’s Whonix?</h3> -<div class="outline-text-3" id="text-org3c234f9"> +<div id="outline-container-org71bfc86" class="outline-3"> +<h3 id="org71bfc86">What’s Whonix?</h3> +<div class="outline-text-3" id="text-org71bfc86"> <p> Whonix is a 2-VM setup for compartmentalizing your computing, and uses the Tor Network to keep your activity anonymous. It runs on KickSecure (hardened Debian). </p> @@ -757,53 +274,53 @@ The Whonix “Workstation” VM is where you’ll do your actual com </p> </div> </div> -<div id="outline-container-org3ed96a6" class="outline-3"> -<h3 id="org3ed96a6">KVM vs VirtualBox</h3> -<div class="outline-text-3" id="text-org3ed96a6"> +<div id="outline-container-orga47096c" class="outline-3"> +<h3 id="orga47096c">KVM vs VirtualBox</h3> +<div class="outline-text-3" id="text-orga47096c"> <p> Whonix supports 2 type-2 hypervisors: KVM and VirtualBox. KVM is build into the Linux kernel, and is thus fully <a href="https://www.gnu.org/philosophy/free-sw.en.html">Free Software</a>. VirtualBox is developed and maintained by Oracle, and is not Free software. I’ll be using KVM for these examples, but there’s a <a href="https://www.whonix.org/wiki/VirtualBox">convenient guide for VirtualBox</a>. </p> </div> </div> -<div id="outline-container-org6daabcf" class="outline-3"> -<h3 id="org6daabcf">KVM vs QubesOS Zen</h3> -<div class="outline-text-3" id="text-org6daabcf"> +<div id="outline-container-org33aa7b2" class="outline-3"> +<h3 id="org33aa7b2">KVM vs QubesOS Zen</h3> +<div class="outline-text-3" id="text-org33aa7b2"> </div> -<div id="outline-container-org275c4da" class="outline-4"> -<h4 id="org275c4da">Hypervisor simplicity</h4> -<div class="outline-text-4" id="text-org275c4da"> +<div id="outline-container-org6116770" class="outline-4"> +<h4 id="org6116770">Hypervisor simplicity</h4> +<div class="outline-text-4" id="text-org6116770"> <p> KVM is part of the Linux kernel, meaning that the virtualization is being done by a larger, monolithic program than a type-1 hypervisor like Zen, with a larger attack surface. </p> </div> </div> -<div id="outline-container-org9ae4ba2" class="outline-4"> -<h4 id="org9ae4ba2">Type-1 vs type-2 hypervisor</h4> -<div class="outline-text-4" id="text-org9ae4ba2"> +<div id="outline-container-org68b4140" class="outline-4"> +<h4 id="org68b4140">Type-1 vs type-2 hypervisor</h4> +<div class="outline-text-4" id="text-org68b4140"> <p> KVM runs on a host Linux system, and therefor the contents of the VM are only as secure as the host system. This is perhaps the biggest downside to running this KVM setup over Qubes in terms of security. I’d recommend delegating any risky activity to VMs like Whonix to try to mitigate the risk of malware running on your host system. </p> </div> </div> -<div id="outline-container-org32f2690" class="outline-4"> -<h4 id="org32f2690">No sys-net/firewall/usb/audio/etc.</h4> -<div class="outline-text-4" id="text-org32f2690"> +<div id="outline-container-orgf2bdbc2" class="outline-4"> +<h4 id="orgf2bdbc2">No sys-net/firewall/usb/audio/etc.</h4> +<div class="outline-text-4" id="text-orgf2bdbc2"> <p> QubesOS uses VMs to compartmentalize the hardware, and running Whonix on a Linux host keeps those in the domain of the large Linux kernel. </p> </div> </div> -<div id="outline-container-org4322a7c" class="outline-4"> -<h4 id="org4322a7c">Performance</h4> -<div class="outline-text-4" id="text-org4322a7c"> +<div id="outline-container-org2e01a85" class="outline-4"> +<h4 id="org2e01a85">Performance</h4> +<div class="outline-text-4" id="text-org2e01a85"> <p> Whonix on KVM performs about as well as on QubesOS (varying based on how much virtual CPU/memory you allocate of course), but a big benefit of having a Linux host is that the applications ran in it won’t be slowed down by virtualization. Risky activities can be compartmentalized while keeping the main system fast and convenient to use. </p> </div> </div> -<div id="outline-container-org7eb98a5" class="outline-4"> -<h4 id="org7eb98a5">Relevant Whonix security documentation</h4> -<div class="outline-text-4" id="text-org7eb98a5"> +<div id="outline-container-orge8d6502" class="outline-4"> +<h4 id="orge8d6502">Relevant Whonix security documentation</h4> +<div class="outline-text-4" id="text-orge8d6502"> <p> The advantages QubesOS has over KVM listed above are just a few basic examples. QubesOS has a much more robust security model in many ways, and if your security is <b>essential</b>, you should understand the downsides: </p> @@ -813,9 +330,9 @@ The advantages QubesOS has over KVM listed above are just a few basic examples. </div> </div> </div> -<div id="outline-container-org5af74e7" class="outline-3"> -<h3 id="org5af74e7">Installing Whonix on KVM</h3> -<div class="outline-text-3" id="text-org5af74e7"> +<div id="outline-container-org344058d" class="outline-3"> +<h3 id="org344058d">Installing Whonix on KVM</h3> +<div class="outline-text-3" id="text-org344058d"> <p> Make sure to check the relevant NixOS and Whonix documentation to ensure these examples are up-to-date. Always be weary of executing commands from a random blog on the internet, and go to the source whenever possible. </p> @@ -829,9 +346,9 @@ Make sure to check the relevant NixOS and Whonix documentation to ensure these e Some of this setup (packages, user groups, dconf settings, the actual virtualization setup) is declaratively configured, but many of the commands to set up Whonix are not. On a fresh NixOS system build with your configuration.nix, you’ll still need to download the Whonix images and set them up with the commands outlined below. It’s possible more (or even all?) of this could be done declaratively with more NixOS knowledge. </p> </div> -<div id="outline-container-orgbc2b96b" class="outline-4"> -<h4 id="orgbc2b96b">Installing KVM + Virt-manager</h4> -<div class="outline-text-4" id="text-orgbc2b96b"> +<div id="outline-container-orgafc3071" class="outline-4"> +<h4 id="orgafc3071">Installing KVM + Virt-manager</h4> +<div class="outline-text-4" id="text-orgafc3071"> <p> Enable libvirtd and virt-manager </p> @@ -888,9 +405,9 @@ Start qemu’s virtual networking, allowing VMs to communicate </div> </div> </div> -<div id="outline-container-orgaf8fe17" class="outline-4"> -<h4 id="orgaf8fe17">Download the Whonix XFCE .qcow archive</h4> -<div class="outline-text-4" id="text-orgaf8fe17"> +<div id="outline-container-org7dd7a41" class="outline-4"> +<h4 id="org7dd7a41">Download the Whonix XFCE .qcow archive</h4> +<div class="outline-text-4" id="text-org7dd7a41"> <ul class="org-ul"> <li>You can the most up-to-date versions directly from their website: <ul class="org-ul"> @@ -900,9 +417,9 @@ Start qemu’s virtual networking, allowing VMs to communicate </ul> </div> </div> -<div id="outline-container-orgded265b" class="outline-4"> -<h4 id="orgded265b">Extract the archive</h4> -<div class="outline-text-4" id="text-orgded265b"> +<div id="outline-container-org1a59180" class="outline-4"> +<h4 id="org1a59180">Extract the archive</h4> +<div class="outline-text-4" id="text-org1a59180"> <p> Make sure your working directory and archive are both in your home directory. (You may need to <code class="src src-sh"><span style="color: #fabd2f;">mv</span> ~/Downloads/Whonix* ~/</code>) </p> @@ -914,9 +431,9 @@ Make sure your working directory and archive are both in your home directory. (Y </div> </div> </div> -<div id="outline-container-org86694ca" class="outline-4"> -<h4 id="org86694ca">Agree to the Whonix Binary License Agreement</h4> -<div class="outline-text-4" id="text-org86694ca"> +<div id="outline-container-orga618405" class="outline-4"> +<h4 id="orga618405">Agree to the Whonix Binary License Agreement</h4> +<div class="outline-text-4" id="text-orga618405"> <p> To read the agreement, use: </p> @@ -938,9 +455,9 @@ Assuming you agree: </div> </div> </div> -<div id="outline-container-org2ef6650" class="outline-4"> -<h4 id="org2ef6650">Setup Whonix virtual networks</h4> -<div class="outline-text-4" id="text-org2ef6650"> +<div id="outline-container-org8830cfa" class="outline-4"> +<h4 id="org8830cfa">Setup Whonix virtual networks</h4> +<div class="outline-text-4" id="text-org8830cfa"> <div class="org-src-container"> <pre class="src src-sh"><span style="color: #928374;"># </span><span style="color: #928374;">Add virtual networks</span> <span style="color: #fabd2f;">sudo</span> virsh -c qemu:///system net-define Whonix_external*.xml @@ -955,9 +472,9 @@ Assuming you agree: </div> </div> </div> -<div id="outline-container-org11c66b4" class="outline-4"> -<h4 id="org11c66b4">Import Whonix Gateway and Workstation images</h4> -<div class="outline-text-4" id="text-org11c66b4"> +<div id="outline-container-org8b5033f" class="outline-4"> +<h4 id="org8b5033f">Import Whonix Gateway and Workstation images</h4> +<div class="outline-text-4" id="text-org8b5033f"> <div class="org-src-container"> <pre class="src src-sh"><span style="color: #928374;"># </span><span style="color: #928374;">Creates two qemu profiles for the Whonix VMs</span> <span style="color: #fabd2f;">sudo</span> virsh -c qemu:///system define Whonix-Gateway*.xml @@ -966,9 +483,9 @@ Assuming you agree: </div> </div> </div> -<div id="outline-container-orgb03cb17" class="outline-4"> -<h4 id="orgb03cb17">Image File Installation</h4> -<div class="outline-text-4" id="text-orgb03cb17"> +<div id="outline-container-org8e9b87b" class="outline-4"> +<h4 id="org8e9b87b">Image File Installation</h4> +<div class="outline-text-4" id="text-org8e9b87b"> <div class="org-src-container"> <pre class="src src-sh"><span style="color: #928374;"># </span><span style="color: #928374;">Assigns those qemu VMs to the Whonix .qcow2 images</span> <span style="color: #fe8019;">[</span>~/<span style="color: #fe8019;">]</span>$ <span style="color: #fabd2f;">sudo</span> <span style="color: #fabd2f;">mv</span> Whonix-Gateway*.qcow2 /var/lib/libvirt/images/Whonix-Gateway.qcow2 @@ -977,9 +494,9 @@ Assuming you agree: </div> </div> </div> -<div id="outline-container-orgba946c8" class="outline-4"> -<h4 id="orgba946c8">Remove Whonix home clutter</h4> -<div class="outline-text-4" id="text-orgba946c8"> +<div id="outline-container-org7a7d46a" class="outline-4"> +<h4 id="org7a7d46a">Remove Whonix home clutter</h4> +<div class="outline-text-4" id="text-org7a7d46a"> <div class="org-src-container"> <pre class="src src-sh"><span style="color: #928374;"># </span><span style="color: #928374;">WARNING: running this command will delete every file that starts with "Whonix" or "WHONIX" in your working directory.</span> <span style="color: #fe8019;">[</span>~/<span style="color: #fe8019;">]</span>$ <span style="color: #fabd2f;">rm</span> Whonix* @@ -989,9 +506,9 @@ Assuming you agree: </div> </div> </div> -<div id="outline-container-orgece9713" class="outline-3"> -<h3 id="orgece9713">Post-installation</h3> -<div class="outline-text-3" id="text-orgece9713"> +<div id="outline-container-org1ddf6ae" class="outline-3"> +<h3 id="org1ddf6ae">Post-installation</h3> +<div class="outline-text-3" id="text-org1ddf6ae"> <p> Use the virt-manager application to start Whonix-Gateway, and open its terminal. We’ll use setup-dist to create your Tor connection and otherwise prepare Whonix for use. </p> @@ -1023,20 +540,20 @@ Start the Whonix Workstation, and repeat the upgrade step: </div> </div> </div> -<div id="outline-container-org1945854" class="outline-3"> -<h3 id="org1945854">Using Whonix</h3> -<div class="outline-text-3" id="text-org1945854"> +<div id="outline-container-org8d03dd6" class="outline-3"> +<h3 id="org8d03dd6">Using Whonix</h3> +<div class="outline-text-3" id="text-org8d03dd6"> <p> Assuming the VMs are booting properly and can receive updates, you should be good to go! You now have a compartmentalized environment where your traffic will be anonymized, and any malware should generally be contained to the VM (sophisticated enough malware could theoretically jump the KVM hypervisor, but if that’s part of your threat model you probably shouldn’t be getting security advice from this blog :P) </p> </div> -<div id="outline-container-org4e57894" class="outline-4"> -<h4 id="org4e57894">Some tips</h4> -<div class="outline-text-4" id="text-org4e57894"> +<div id="outline-container-org1aef1e0" class="outline-4"> +<h4 id="org1aef1e0">Some tips</h4> +<div class="outline-text-4" id="text-org1aef1e0"> </div> <ul class="org-ul"> -<li><a id="org3a17559"></a>Basic applications<br /> -<div class="outline-text-5" id="text-org3a17559"> +<li><a id="orgaf75173"></a>Basic applications<br /> +<div class="outline-text-5" id="text-orgaf75173"> <ul class="org-ul"> <li>Tor Browser: Fingerprinting-resistant browser made for anonymous internet use</li> <li>VLC: Video player capable of playing almost media file you throw at it</li> @@ -1048,8 +565,8 @@ Assuming the VMs are booting properly and can receive updates, you should be goo </ul> </div> </li> -<li><a id="org8925c37"></a>Staying secure and anonymous<br /> -<div class="outline-text-5" id="text-org8925c37"> +<li><a id="org0d79d33"></a>Staying secure and anonymous<br /> +<div class="outline-text-5" id="text-org0d79d33"> <p> Think before you act! Whonix gives you a good platform for staying anonymous, but you can absolutely de-anonymize yourself if you’re not careful. </p> @@ -1067,8 +584,8 @@ There are an uncountable number of ways you could de-anonymize yourself, so <b>s </p> </div> <ul class="org-ul"> -<li><a id="org9807386"></a>Use a live system when possible<br /> -<div class="outline-text-6" id="text-org9807386"> +<li><a id="org1144945"></a>Use a live system when possible<br /> +<div class="outline-text-6" id="text-org1144945"> <p> When you’re booting the Workstation VM, you can select the option to run it ’live’. This means that when you shutdown the VM, everything you did during the session is erased. </p> @@ -1082,8 +599,8 @@ Ideally, you should only use Whonix persistantly for updating and installing pac </p> </div> </li> -<li><a id="orgfeef66c"></a>Optionally disable Javascript in Tor Browser<br /> -<div class="outline-text-6" id="text-orgfeef66c"> +<li><a id="org0bd9a32"></a>Optionally disable Javascript in Tor Browser<br /> +<div class="outline-text-6" id="text-org0bd9a32"> <p> Javascript adds a massive attack surface to your browser, and disabling it can remove entire categories of browser-based malware. But, many many sites rely on Javascript for basic functionality. </p> @@ -1105,7 +622,7 @@ If you care about further hardening the setup, and are willing to break many web </div> </div> <div id="postamble" class="status"> -<p class="date">Created: 2025-04-02 Wed 23:14</p> +<p class="date">Created: 2025-04-02 Wed 23:29</p> </div> </body> </html> |