This is the Chinese version, the English version is at the back
Qubes OS 是專為注重安全與隱私的用戶設計的操作系統。然而,根據你的威脅模型,如果不適合直接從 Qubes OS 官方網站下載 ISO,你可以考慮以下其他方法。
在此之前,請務必學習如何驗證下載的 ISO 檔案,即便是來自官方網站!具體驗證步驟請參考官方文檔:https://www.qubes-os.org/security/verifying-signatures/
1. I2P 網絡(推薦)
I2P 是一種高匿名性的點對點網絡,適合需要隱私保護的用戶。
首先:學習使用 I2P
- 新手可參考 https://geti2p.net 下載和學習使用 I2P Java 版本。
- 高階用戶可選擇性能更優的 I2Pd,這是 I2P 的輕量化實現。
提示:Qubes OS 在 I2P 網絡中有一個非官方鏡像網站
qubes.i2p
,可用於瀏覽相關新聞或下載 ISO。
方法一:出口代理下載(低難度)
- 設置 I2Pd 或 I2P Java 並啟用出口代理(outproxy)。
- 通過出口代理訪問 Qubes OS 官方網站 https://www.qubes-os.org 下載 ISO。
使用出口代理時,流量會先經過若干 I2P 節點,然後進入出口代理(如轉入 Tor 網絡)。這種方式比直接使用 Tor 更難被監測。
方法二:匿名檔案共享(較高難度)
- 安裝 I2Pd 並使用支持 I2P 的 BitTorrent 軟體(如 qBittorrent)。
- 配置方法可參考:https://strict3443.codeberg.page/i2p-info/hugo/public/posts/how-to-use-i2p-on-qbittorrent-nox/
- 進入 I2P 的洪流站點 http://tracker2.postman.i2p,搜尋 “Qubes”。
- 點擊下載磁力鏈接,qBittorrent 會自動完成下載。
注意:使用 I2P 的洪流下載可能需要較長時間,但匿名性更強。
2. 使用 Tor 瀏覽器
- 打開 Tor 瀏覽器,訪問 Qubes OS 官方網站下載頁面:https://www.qubes-os.org/downloads
- 如果網速允許,也可使用官方的
.onion
地址:
http://ti4mfvefw2sx2xpf2l3dpaa6iuwiors7ef3hm3nyal7xhq3chrygorqd.onion
優點:Tor 是較易使用的匿名工具,適合新手用戶。
3. 中國用戶的鏡像源選擇
阿里雲提供了 Qubes OS 的 ISO 文件,下載地址:https://mirrors.aliyun.com/qubes/
提醒:對於處於中國的用戶,阿里雲的鏡像源可以提供更快的下載速度。但由於其屬於第三方來源,請務必驗證下載的 ISO 文件是否完整且未被篡改。
最後建議
- 一定要驗證 ISO 文件的完整性與簽名!(無論來源為何)
- 選擇下載方式時,根據自己的威脅模型和環境需求進行判斷。
english
Qubes OS is an operating system designed for users who prioritize security and privacy. However, depending on your threat model, if it’s not ideal to download the ISO directly from the official Qubes OS website, you can consider the following alternative methods.
Before proceeding, make sure to verify the downloaded ISO file, even if it comes from the official website! For specific verification steps, please refer to the official documentation: https://www.qubes-os.org/security/verifying-signatures/
1. I2P Network (Recommended)
I2P is a highly anonymous peer-to-peer network, ideal for users needing privacy protection.
First: Learn to Use I2P
- Beginners can refer to https://geti2p.net to download and learn how to use the I2P Java version.
- Advanced users may choose I2Pd, a lightweight implementation of I2P that offers better performance.
Tip: Qubes OS has an unofficial mirror site
qubes.i2p
within the I2P network, which can be used to browse related news or download the ISO.
Method 1: Outproxy Download (Low Difficulty)
- Set up I2Pd or I2P Java and enable an outproxy.
- Use the outproxy to access the official Qubes OS website at https://www.qubes-os.org to download the ISO.
Using an outproxy will route traffic through multiple I2P nodes before exiting via the outproxy (e.g., routing into the Tor network). This method is harder to detect than using Tor directly.
Method 2: Anonymous File Sharing (Higher Difficulty)
- Install I2Pd and use I2P-compatible torrent software, such as qBittorrent.
- For setup instructions, refer to: https://strict3443.codeberg.page/i2p-info/hugo/public/posts/how-to-use-i2p-on-qbittorrent-nox/
- Visit the I2P torrent site http://tracker2.postman.i2p and search for “Qubes”.
- Click to download the magnet link, and qBittorrent will automatically begin downloading.
Note: Using torrents over I2P may take longer but offers stronger anonymity.
2. Using Tor Browser
- Open Tor Browser and visit the official Qubes OS download page: https://www.qubes-os.org/downloads.
- If your internet speed allows, you can also use the official
.onion
address:
http://ti4mfvefw2sx2xpf2l3dpaa6iuwiors7ef3hm3nyal7xhq3chrygorqd.onion
Advantages: Tor is easier to use and suitable for novice users.
3. Mirror Sources for Users in China
Aliyun (Alibaba Cloud) offers Qubes OS ISO files, and the download link is: https://mirrors.aliyun.com/qubes/
Reminder: For users in China, Aliyun’s mirror source may provide faster download speeds. However, since it’s a third-party source, always verify that the downloaded ISO file is complete and unmodified.
Final Recommendations
- Always verify the integrity and signature of the ISO file! (Regardless of the source)
- When choosing a download method, make sure to assess it based on your threat model and environmental needs.