Hello ![]()
I’m quite curious to know what are the Qubes OS features that are seen as the most valuable by its users, or what Qubes OS offered you that you couldn’t achieve in another operating system?
(this is a personal topic, nothing official
)
Hello ![]()
I’m quite curious to know what are the Qubes OS features that are seen as the most valuable by its users, or what Qubes OS offered you that you couldn’t achieve in another operating system?
(this is a personal topic, nothing official
)
I would say the most obvious advantages are the isolated compartments and the ability to set up offline qubes for storing secrets such as passwords and GPG keys.”
I like that I work with many distros and it takes up little disk space. Idea of templates, appVM, and dvm is brilliant. Often I find cool tools that work only with older Debian/Ubuntu versions, and I don’t have to worry about it. I can use many VPNs simultaneously. And I also have excellent and very convenient forensic protection - thanks to the large fantastic community for guides. @solene thank you too, your guides are really helpful!
That’s not the most valuable feature to me now. But I switched to Qubes OS to run virtual machines (partly for security reasons, but not only) ![]()
But what did Qubes OS bring more here than running Debian with virt-manager? The template system, or integration between VMs?
Yep, I was looking for the integration between VMs and how a single app running in a VM can integrate well in the GUI domain, almost as a regular app in a regular distro. I don’t think I really understood the template system before switching.
It seems like nothing, but VM-dependent description and window colors help me refrain from doing stupid things.
The ability to use Whonix to torify arbitrary applications without fearing leaks and without having to feel like I’m using a VM (only the application window itself shows). This was and still is the #1 selling point of Qubes OS to me.
Agree, was already a Whonix user, managing different OSes. Though the ability to do everything at once does at times have its downsides in terms of focusing on one realm.
Isolating base OS (later learned it’s called dom0 in Qubes) from the network and letting only virtual vm’s (later learned they’re called qubes in Qubes OS) to have network/internet. None had that feature at the time.
Contrary to the motto of reasonable security, I think it was the features first and foremost back then. For example, the possibility of attaching a webcam to a virtual machine and have it working out-of-the-box for video calls, the templating system, and the seamless integration between virtual machines, despite the strong isolation.
And to a lesser extent the UI (I don’t recall seeing the non-flat widgets and the fonts with maximum hinting applied to them ever again after upgrading from Qubes OS 4.0)
Though I had more experience with VMware Workstation, rather than virt-manager back then, and integration features I was using back then allowed for an easier migration to the slightly different workflows, like clipboard sharing and templating systems working differently.
Keep in mind that I’m talking about the version, which has the Unity View working before it was deprecated, so seeing windows from a virtual machine projected into a common desktop, having their icons on the taskbar and having a dedicated desktop menu for browsing virtual machines’ programs was obvious to me, and I know that people coming from different backgrounds might have had a harder time getting to know these concepts.
Here’s a screenshot, how this looked like. Notice the additional menu, the icon on the taskbar and how the window is marked with red border and the icon in the top right.
Compartmentalization along with all of the appropriate pieces and developer attention behind those pieces, even if the specific technology pieces were not my favorite ones.
I was casually targeted by an entity with access to nation state resources and needed something that had strong security isolation that already worked enough (within reason) out of the box. So it was time to finally “grow up” on that issue.
Malware, phishing, and other unpleasant efforts are continually being improved, so I switched to security-focused Qubes to help minimize any damage from these possible attacks. The few other similar-focused options are government-focused, costly, and out-of-reach to most.
Joanna Rutkowska’s writing’s have been most helpful in understanding why Qubes is a reasonably secure OS, while most are not. Many internet posts [incorrectly] describe Qubes as a virtual machine based system like Docker or Windows VM’s and assume they all share the same security benefits, but virtualization doesn’t bring any security advantage by itself. The Qubes OS architecture design is worth the read for those interested. Fortunately, Joanna Rutkowska has written a number of papers and presentations on the subject.
The slickness of the compartmentalization. Before I was doing the same thing with vmware, packer and ansible on a mac. Then switched that to virtualbox to isolate usb. Even had a netvm on a usb wifi that my mac didn’t support. Qubes is better in every way except nested virtualization. Its not that it has compartmentalization. Its the streamlined integration.
The only thing I miss from vmware is being able to copy from the password keeper and having it type into the vm that needed it instead of pasting. For both vmware and virtualbox, copy pasting between vms was a pain.
It is a way to force myself further into the world of virtualization, networking, and security that doesn’t have a suspicious license agreement (looking at proxmox)
Proxmox is using the GPL license, just like Qubes OS.
The frame colours.