So, one of the apps I had to install does some os fingerprinting. Now I thought hard about how to do so. My idea first idea was - use flatpak. But I found it too complicated. Other solution would have had been using a web version or standalone vm. But those two options are also too complicated for me
But then I remembered how I used to install some apps on distros which don’t have much packages in their default repos
DIstrobox
So, I copied a Debian 13 template. Called it distrobox. Then installed Distrobox into it. After installing Distrobox I made an app vm. Into it I downloaded the default container and let it install packages into itself. Then I cloned it just in case. Then I installed the app I wanted from the default package manager. The result was what I wanted. The app identified my session as “Podman”. Meaning I successfully avoided giving away the fact that I am using Qubes
Distrobox by default creates a separated root file system. While the home folder is shared. So the main giveaway of the fact that it is Qubes is Qubes incoming folder. But there are some others System Identity Camouflage and Virtual Machine Cloaking It will not protect from apps with more invasive fingerprinting techniques