>> WHAT IS QUBES?

Qubes OS uses compartmentalization - running different activities in isolated virtual machines (qubes). If one qube is compromised, others remain safe.

  • [ISOLATION] Each qube is separate VM
  • [WHONIX] Built-in Whonix integration
  • [DISPOSABLE] Throw-away VMs for risky tasks
  • [ADVANCED] Steep learning curve

>> TYPICAL SETUP

┌─────────────┐ ┌─────────────┐ ┌─────────────┐
│  PERSONAL   │ │   WORK      │ │  DARKNET    │
│  (vault)    │ │  (untrust)  │ │  (whonix)   │
└─────────────┘ └─────────────┘ └─────────────┘
      │               │               │
      └───────────────┴───────────────┘
                      │
              ┌───────────────┐
              │    DOM0       │
              │  (admin)      │
              └───────────────┘

>> FOR TORZON

Create dedicated Whonix qube for TorZon:

  • [1] Install Qubes with Whonix template
  • [2] Create AppVM based on whonix-ws-16
  • [3] Use this VM exclusively for TorZon
  • [4] Store nothing else in this qube
  • [5] Use disposable VMs for browsing links

>> REQUIREMENTS

  • [RAM] 16GB minimum (32GB recommended)
  • [CPU] VT-x/VT-d, IOMMU support
  • [STORAGE] SSD, 256GB+ recommended
  • [HARDWARE] Check HCL compatibility list
>> NOTE

Qubes is for advanced users. Start with Tails or Whonix if you're new to secure operating systems.