Blocking traffic inside sys-net

I can’t give you a ruleset, it would require a lot of testing to guarantee it does the job.

It’s possible if you prevent sys-net from connecting to anything and only allow to relay the NAT connection, I think it’s doable. The same should be done in each netvm qube until you reach your vpn qube.

Checking for updates requires ~80 MB of traffic each time on fedora IIRC, the repository metadata are huge. The updates can be a lot smaller. The update check is just to tell you there is something to update.

You can disable update check per qube using this Route ALL Qubes traffic through VPN - #7 by DVM

Different threat models, it’s not possible to have a configuration that matches everyone’s needs. There is no piece of documentation mentioning that Qubes OS tries to hide you are using it.

I can understand this can be misleading if someone comes with expectations that does not match implementation reality. :confused: