Posts

Ultimate privacy setup: Buy certified qubes os laptop and use tor browser/whonix for web browser and ricochet refresh for chat over tor/file sharing

Qubes OS Secure Setup Guide (WebTunnel + Ricochet-Refresh) Qubes OS Secure Setup Guide This guide explains how to build a high-security Qubes OS system using: Certified hardware Whonix with WebTunnel bridges Disposable Tor Browser Ricochet-Refresh over Tor Optional VPN router for defense-in-depth Quick Introduction to Qubes OS Qubes OS is a security-focused operating system that isolates applications into separate virtual machines (VMs). A compromise in one VM does not affect others. TemplateVMs – Base OS and software AppVMs – Daily-use application VMs DisposableVMs – Destroyed after use sys-whonix – Tor gateway for all Whonix-based VMs Step 1: Buy and Configure Certified Qubes Hardware Recommended hardware: NovaCustom V54 Series (preinstalled with Qubes OS). Choose These Options for Maximum Security Coreboot + Heads – verified boot and firmware tamper detection Disable Wi-Fi and Bluetooth – use Ethernet only ...

Use Ricochet Refresh IM on qubes os

Ricochet-Refresh on Qubes OS – Full Guide Ricochet-Refresh on Qubes OS – Full Guide This guide covers setting up Ricochet-Refresh on Qubes OS with: Persistent .onion address Using sys-whonix only (avoiding Tor-over-Tor) Changing your identity safely Step 1: Decide Your Qubes Architecture Component Qube Type Notes Tor network sys-whonix Whonix Gateway handles all Tor traffic Ricochet-Refresh App AppVM based on Whonix or Debian Template Isolated from other AppVMs Persistent storage Dedicated Data Qube (e.g., ricochet-data ) Stores profile folder to preserve .onion address Step 2: Create a Ricochet AppVM Open Qube Manager → “Create Qube”. Set: Name: ricochet-app Template: whonix-ws-XXX (or Debian) Networking: sys-whonix Storage: default Create the Qube. Step 3: Create a Persistent Data Qube Open Qube Manager → “Create Qube”. Set: Name: ricochet-data Type: Standalone or Persistent AppVM Storage: d...

Using ricochet refresh on windows/mac/linux

Here’s a complete, safe guide to preserving your Ricochet‑Refresh .onion address so your contacts stay intact, covering Windows, macOS, and Linux. Ricochet‑Refresh: Keep Your .onion Address / Identity Step 1: Understand What Needs to Be Backed Up Your Ricochet‑Refresh identity is a Tor hidden service, and it’s tied to: A private key (keeps your .onion address the same) Your contacts list and other app configuration All of this is stored in the profile folder of Ricochet‑Refresh. Backing up this folder preserves your identity completely. Step 2: Locate Your Profile Folder OS Default Location Notes Windows C:\Users\<YourUser>\AppData\Roaming\Ricochet-Refresh\ %APPDATA% is a hidden folder, enable “show hidden files” macOS ~/Library/Application Support/Ricochet-Refresh/ ~ is your home folder Linux ~/.local/share/ricochet-refresh/ Hidden folder (dot folder) Inside this folder you’ll find: hostname — contains your .onion ad...