Kicksecure Live ISO (via USB) and Installation
This is a guide for easily creating a Kicksecure Live USB stick, then booting Kicksecure from this stick and then optionally installing Kicksecure to your harddrive from this stick. To prepare, you need a USB stick. In the process, you will download our .iso
file.
Table of contents[edit]
Download, Create Live USB : In this chapter you will learn how to create a Kicksecure Live USB stick. (Steps 1-5)
-
Download ISO
-
Flash ISO to USB
-
Boot from USB
-
Live Kicksecure running
Install Kicksecure (Optional) : In this chapter you learn how to install Kicksecure to your harddrive from the Live USB stick you created. (Steps 4-7)
-
Click install in Live Kicksecure
-
Remove USB, boot from HD
-
Local Kicksecure running
Finalize and further documentation : This chapter gives you further information. (Steps 8,9)
Download, Create Live USB[edit]
Please follow these steps to install Kicksecure Xfce.
Digital signature verification (Optional)
Only experienced users: This step is only useful and recommended for very experienced users. All other user please skip this step.
Optional: Digital signature verification.
Version: 17.2.3.7
- Digital signatures are a tool enhancing download security. They are commonly used across the internet and nothing special to worry about.
- Optional, not required: Digital signatures are optional and not mandatory for using Kicksecure, but an extra security measure for advanced users. If you've never used them before, it might be overwhelming to look into them at this stage. Just ignore them for now.
- Learn more: Curious? If you are interested in becoming more familiar with advanced computer security concepts, you can learn more about digital signatures here digital software signatures.
signify
How to verify the Kicksecure Images: Kicksecure virtual machine images are signed by Kicksecure developer Patrick Schleizer using OpenPGP and signify.
Do you already know how to perform digital software verification using an OpenPGP and/or signify key?
YES Then acquire the Kicksecure Signing Key and the Kicksecure signatures straight away and proceed.
NO Then consider the following instructions:
Write the ISO to USB
- In this process you will use a software tool to create a Kicksecure Live USB by writing our ISO onto this USB stick.
- This procedure is similar for ALL Linux distribution which provide a Live USB stick for installation. The procedure is therefore unspecific to Kicksecure.
WARNINGS: Please be aware of this information before creating a Live USB the first time.
- Target device deletion: Be aware that the process will completely erase everything on the USB drive you use - absolutely all data. It's important to understand that once you start this process, there's no going back, and anything on that USB drive will be permanently lost.
- Backup: Before you start, please make sure you save copies of anything important on your computer. This includes all documents, photos, movies, and save games, ensuring they are securely backed up. That way, if something goes wrong, you won't lose anything valuable. It's not just the USB drive you should worry about; you need to back up your entire computer, just in case. This is because if you accidentally select the wrong device - like your computer's internal hard drive instead of the USB drive - all the data on your computer could be erased. See also Backup. Skip this step only at your own risk.
- Restoration test: After making your backup, check to see if you can actually open and use those files. This is to make sure your backup really works. It's important to verify that the backup is successful and that your important files are safe and accessible, should you need to restore them later.
- Unplug Non-Essential devices and drives: To minimize risk, unplug any non-essential external drives or devices that could be misidentified as a target for flashing.
- Choose your host operating system: Now below, please select the operating system you are currently using and that you intend to use to create the Kicksecure Live USB stick.
- After your selection, only the individual instructions for the selected operating system will be shown.
Windows/Mac
Download balenaEtcher
Optional: A checksum can be found in each release for verification.
For very experience users only. All other users skip this step.
See also: Download Security
Note: Save your download to your usual Downloads folder, not to the USB stick.
Open the balenaEtcher download
At the security warning, confirm that you want to open balenaEtcher.
Choose either method "Flash from file" or "Flash from URL"
Flash from file
Flash from URL
Optional: Digital signature verification.
Unsupported if using "Flash from URL".
Select "Flash from URL".
Get the Kicksecure image URL.
Scroll up to the download link. Right click on it.
Paste the URL to "Use Image URL" then press "OK".
Press "Flash".
Done.
The process of flashing Kicksecure ISO to USB has been completed.
Linux
Install GNOME Disks.
The utility is pre-installed in GNOME desktop environment. Otherwise it can be installed on most if not all Linux distributions.
Select your Linux distribution to get matching installatio instructions.
Ubuntu
- Choose below in which way you want to install the utiliy
- In Ubuntu, package is named
gnome-disk-utility
.
Command Line
Install package(s) gnome-disk-utility
. Follow steps A to E.
Platform specific notice.
- Kicksecure: No special notice.
- Kicksecure-Qubes: In Template.
Update the package lists and upgrade the system .
sudo apt update && sudo apt full-upgrade
Install the gnome-disk-utility
package(s).
Using apt
command line
--no-install-recommends
option
is in most cases optional.
sudo apt install --no-install-recommends gnome-disk-utility
Platform specific notice.
- Kicksecure: No special notice.
- Kicksecure-Qubes: Shut down Template and restart App Qubes based on it as per Qubes Template Modification .
Done.
The procedure of installing package(s) gnome-disk-utility
is complete.
Software Center
Similar to the following.
NOTE: Replace VirtualBox
with GNOME Disks
in the following instructions.
Ubuntu Software Center can be used to install VirtualBox. The process is similar to installation of most other applications.
This only works for users with computers that do not have "SecureBoot" enabled. If the user's computer is using "SecureBoot" the user need to either disable "SecureBoot" in the BIOS or use the command line based instructions. [1]
Open the start menu.
Click on the Ubuntu Software Center icon.
Figure: Ubuntu Software Center icon
Click on the magnifying glass to search. → Type virtualbox
. → Press enter. → In the search results, click on VirtualBox.
Figure: Ubuntu Software Center - Search For VirtualBox
Click on Install and wait.
Figure: Ubuntu Software Center Search Result
Installation of VirtualBox has been completed.
When the installation has completed, the install icon changes to the uninstall icon. Do not click the uninstall button.
Figure: Ubuntu Software Center - VirtualBox has been installed
Click on Show Applications. → Click on Virtual Box start the VirtualBox graphical user interface (GUI).
Figure: Ubuntu Software Center #4
Done.
The procedure of installing and starting VirtualBox is complete.
Debian
In Debian, package is named gnome-disk-utility
.
Install package(s) gnome-disk-utility
. Follow steps A to E.
Platform specific notice.
- Kicksecure: No special notice.
- Kicksecure-Qubes: In Template.
Update the package lists and upgrade the system .
sudo apt update && sudo apt full-upgrade
Install the gnome-disk-utility
package(s).
Using apt
command line
--no-install-recommends
option
is in most cases optional.
sudo apt install --no-install-recommends gnome-disk-utility
Platform specific notice.
- Kicksecure: No special notice.
- Kicksecure-Qubes: Shut down Template and restart App Qubes based on it as per Qubes Template Modification .
Done.
The procedure of installing package(s) gnome-disk-utility
is complete.
Other Linux
Hosts using a non-Debian operating system:
Install GNOME Disks as per the normal mechanism for your Linux distribution. No special instructions for Kicksecure are required. The installation of a GNOME Disks is unspecific to Kicksecure. Consult the documentation of your Linux distribution.
Launch GNOME Disks.
Using the start menu.
Figure: GNOME Disks Xfce Launch
Alternatively, you could also start GNOME disks from the command line.
gnome-disks
Select your device present on the right tab.
Figure: GNOME Disk Select
Figure: GNOME Disk Restore Select
Click on the field of Image to restore
Click on the field of Image to restore and navigate with your file manager to select Kicksecure ISO. After you are finished, click on Start Restoring
.
Figure: GNOME Disk Restore ISO
Make sure you have selected the right device and click on Restore
.
Figure: GNOME Disk Restore ISO Confirm
Wait for the flashing of the ISO to finish.
Figure: GNOME Disk Restoring
After flashing is completed, the Contents field will indicate ISO 9660.
Figure: GNOME Disk Finish
Done.
The process of flashing Kicksecure ISO to USB has been completed.
Terminal
Note: The following steps works on Unix terminals with GNU utilities.
Find the name of your drive, substitute
Find the name of your drive, substitute every reference of My_own_drive
to your own drive ID.
ls -l /dev/disk/by-id/usb-*
Check with lsblk
Check with lsblk
to make sure that My_own_drive
is not mounted (blank field under MOUNTPOINTS).
Note: Replace My_own_drive
with the actual name of your device.
lsblk /dev/disk/by-id/usb-My_own_drive
Copy the Kicksecure ISO to My_own_drive
.
Note: The path to Kicksecure-Xfce-17.2.3.7.iso
needs to be adjusted in case the user did not download the ISO image to the home folder.
sudo cp Kicksecure-Xfce-17.2.3.7.iso /dev/disk/by-id/usb-My_own_drive
Click on 'Learn More' on the right side for other command-line methods.
- Using
pv
andtee
.- Advantage: Progress meter.
- Disadvantage: Not installed by default on many distributions.
- pv Kicksecure-Xfce-17.2.3.7.iso | sudo tee /dev/disk/by-id/usb-My_own_drive >/dev/null
- Using
cat
andtee
.- Advantage: Tools always available.
- Disadvantage: No progress meter.
- cat Kicksecure-Xfce-17.2.3.7.iso | sudo tee /dev/disk/by-id/usb-My_own_drive >/dev/null
- Using
dd
.- Advantage: Progress meter.
- Disadvantage: More complicated syntax.
- sudo dd if=Kicksecure-Xfce-17.2.3.7.iso of=/dev/disk/by-id/usb-My_own_drive bs=4M conv=fsync oflag=direct status=progress
Ensure buffers are fully written to the device before removing it.
sudo sync
Done.
The process of flashing Kicksecure ISO to USB has been completed.
Qubes
Flashing the Kicksecure ISO while using Qubes
Prerequisite knowledge
- Context: Currently using a Qubes VM such as for example a Qubes VM running Debian or another Linux? Attempting to flash the Kicksecure ISO to USB? If you can answer both questions with yes, this wiki tab is for you.
- What this is not: This is not about a Kicksecure Template. For that, go to Kicksecure for Qubes.
- Prior USB storage device usage in Qubes: Having used USB storage devices in Qubes before. This is important because there are many issues with Qubes and USB devices. General issues with be unspecific to Kicksecure and should not be mixed when attempting something slightly more complex such as flashing an operating system to USB.
- Appropriate choice: Properly using a Qubes App Qube to flash a USB drive when following this documentation should have a very low disk of data loss. The usual advice about the importance of backups and a tested backup restoration process of course always applies unrelated to this documentation.
- Choice of method: Choose either Command Line Image Writer or a Graphical Image Writer. Not both.
- Connect only 1 USB device to the App Qube: To guard against data loss, it is recommended and much simpler to only connect 1 USB device to the App Qube to be used for flashing the Kicksecure ISO.
- Usage of examples in documentation: The following documentation uses the files which represent physical devices
/dev/xvdi
(or/dev/sda
) as example devices. These instructions were tested inside a Debian based App Qube on Qubes R4.2. In theory, in later Qubes versions these files might represent other devices. If only 1 USB devices is connected to the App Qube and if only using that App Qube for flashing, the risk of data loss should on other USB devices should be very low. And of course, data in other App Qubes would be secure as usual thanks to Qubes compartmentalization.
Make sure you have the required prerequisite knowledge mentioned above. Do not proceed without it!
Choose one option below for either graphical image writer or command-line image writer to get the matching instructions.
Graphical Image Writer in Qubes
dom0
→ Qubes Device Manger in systray → Use USB Device: → assign the hard drive to the VM.
Note: Data (Block) Devices
cannot be used.
It is possible to use KDE ISO Image Writer, which is available as AppImage and from Flathub.
Done.
The process of flashing Kicksecure ISO to USB has been completed.
Command-Line Image Writer in Qubes
Device method choice.
Choose either using block device or using USB device. Two options. Choose one.
Using Block device
dom0
→ Qubes Device Manger in systray → under "Data (Block) Devices" → select the USB device (for example sda
→ assign the hard drive to the VM.
Inside the VM, flash the image to USB: sudo cp Kicksecure-Xfce-17.2.3.7.iso /dev/xvdi
Using USB Device
dom0
→ Qubes Device Manger in systray → Use USB Device: → assign the hard drive to the VM.
Inside the VM, flash the image to USB: sudo cp Kicksecure-Xfce-17.2.3.7.iso /dev/sda
Inside the VM, write buffers to the disk: sudo sync
In dom0, use the Qubes Device Manger to remove the USB from the VM.
Done.
The process of flashing Kicksecure ISO to USB has been completed.
Boot the ISO
Power off your host computer.
Connect the drive you just flashed to your computer.
Research Boot Menu Key : Find out your computer's motherboard's specific KEY (on the keyboard) that opens the Boot Menu.
Search the table below (click "Expand" to enlarge") or search on the internet to find out the boot menu key for your specific motherboard model. Write down the key "candidates" (because you cannot be sure before trying) for your specific model. Usually only ONE key opens the Boot Menu, but due to different vendors and models, there is no uniform key which opens the boot menu for all computers. Usually one of the following keys will be the one.
F2 F7 F9 F10 F11 F12 ESC OPTION NOVO
RESEARCH BOOT MENU KEY table (Click Expand)
Vendor | Key |
---|---|
Acer | F12, F9, F2, Esc |
Apple | Option |
Asus | Esc |
Clevo | F7 |
Dell | F12 |
Fujitsu | F12, Esc |
HP | F9 |
Huawei | F12 |
Intel | F10 |
Lenovo | F12, Novo |
MSI | F11 |
Samsung | Esc, F12, F2 |
Sony | F11, Esc, F10 |
Toshiba | F12 |
Others | F12, Esc |
CONDITIONAL STEP : Activate your Boot Menu in the BIOS.
This step depends on your operating system. For most users this step is not necessary and can be skipped. But if in the next step (step 5) NO key is working for you to start the Boot Menu you need to do this step.
Web-search and find a good tutorial with this term [my computer / motherboard name] how to enable Boot Menu
Follow the instructions in the tutorial until you're certain that you've enabled the Boot Menu on your system
Now you're ready to process with the next step
Power on your computer. As soon as it starts booting press you Boot Menu Key several times (twice per second should be enough)
This should open the Boot Menu after pressing the key for a couple of seconds. The figure below shows an example of a Boot Menu. The look of different boot menus can vary strongly between vendors. But in principle (1) it says "Boot Menu" and (2) gives you different options to choose from.
Figure: Boot menu example
Try out all the Boot Menu key "candidates"
If the computer starts on another operating system (meaning NOT Kicksecure) or returns an error message, shut down the computer again and repeat step 5 for all the possible Boot Menu key "candidates" identified in step 3.
If you have no luck with any of the Boot Menu key "candidates" or if you enter a menu called "BIOS" then you need to go back to step 4.
If a Boot Menu with a list of devices appears, that's correct. Now select your USB stick (in the example image "Removable Devices", but the name can vary) and press Enter.
GRUB Boot Loader Step
If the computer starts on Kicksecure ISO, the GRUB Boot Loader will appear giving boot options. You can read the instructions or just sit back. After some seconds, it will automatically boot the ISO.
Figure: Kicksecure ISO GRUB
After boot, you will encounter the Kicksecure desktop.
DONE. You can experiment with the Live ISO without saving data persistently, before committing to install Kicksecure to hard drive (optional).
Install Kicksecure (Optional)[edit]
Learn how to install Kicksecure from the newly created Live USB stick, if you so choose.
Start installation
Click on the desktop icon Install to Hard drive.
Figure: ISO Install to hard drive icon
Be welcomed by the Calamares Installer and select your language.
Figure: ISO Calamares Welcome
Choose how to partition your system.
Choose Erase Disk
to replace the operating system on your internal hard drive. Usually no other changes required by most users.
WARNINGS: Please be aware of this information before installing the first time.
- Target device deletion: This procedure will overwrite all data on the selected device, be careful!
- Target device selection: Only installation to an internal hard drive or another USB drive is possible.
- The same in other words:
- It is impossible to write to the same USB drive that was used to boot. Installing Kicksecure on USB is possible, see USB Installation.
- The boot device and the installation target device must be two physically different devices.
- The same in other words:
If you do not agree with summary, press Back
and choose the partition scheme again.
Figure: ISO Calamares Partition
Confirm the partition by looking at a summary of actions that will be done to your drive. If you agree, press Install
to proceed with the installation.
Figure: ISO Calamares Summary
Installation has begun. Soon you will be able to enjoy your new Kicksecure operating system.
Figure: ISO Calamares Install
Installation has been completed. Please uncheck the restart option to avoid booting to the same device again. Click Done
when finished.
Figure: ISO Calamares Uncheck Restart
On the Xfce Panel, click on the Applications icon and launch the Logout application.
Figure: Xfce Launch Logout
On the Logout application, click on Shut Down
.
Figure: Xfce Shutdown
Remove installation media
Please remove the USB flash drive that was used to install Kicksecure.
Boot installed Kicksecure
Power on the computer. If you boot from the correct device (where Kicksecure Xfce is installed), you will face the following bootloader screen. Please wait some seconds for the operating system to start. If you didn't boot with the correct device, repeat the step 4 to select the correct drive.
Figure: Installed Kicksecure GRUB
The Kicksecure desktop will appear.
Finalize and further documentation[edit]
The process is done. Please read further and support the Future of Kicksecure with a Donation.
Done
The process of installing Kicksecure Xfce has been completed, enjoy!
Continue your journey by reading First Kicksecure Steps documentation.
Support the Future of Kicksecure
Kicksecure is made possible thanks to the donation of people like you. ❤️
Please support the Kicksecure development with a donation.
Footnotes[edit]
- ↑
This is unspecific to Kicksecure. This is because during package installation of a package that requires kernel modules when "SecureBoot" is enabled, Ubuntu's
dkms
is prompting the user for a password to encrypt the key which will be used to enroll the kernel module signing key. This is Ubuntu usability issue. It is unknown if any bug report / feature request for this exists. Please contribute, research, report this issue on Ubuntu's issue tracker.
License[edit]
Kicksecure ISO wiki page Copyright (C) Amnesia <amnesia at boum dot org>
Kicksecure ISO wiki page Copyright (C) 2012 - 2024 ENCRYPTED SUPPORT LP <adrelanos(at)kicksecure.com
(Replace(at)
with@
.)Please DO NOT use e-mail for one of the following reasons: Private Contact: Please avoid e-mail whenever possible. (Private Communications Policy) User Support Questions: No. (See Support.) Leaks Submissions: No. (No Leaks Policy) Sponsored posts: No. Paid links: No. SEO reviews: No. >This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it under certain conditions; see the wiki source code for details.
We believe security software like Kicksecure needs to remain Open Source and independent. Would you help sustain and grow the project? Learn more about our 12 year success story and maybe DONATE!