This is a known feature of Android.
When you choose “File Transfer”, the phone changes its USB “identifier”. For Qubes, this is like you just unplugged the device and (very quickly) plugged another one, unrelated to the removed one. And so the new device is back again into the sys-usb AppVM.
So the easy, simple workaround is to leave the phone connected to sys-usb and open a Files Explorer there. But I don’t remember whether the default packages of the disposable AppVM can handle Android — maybe you must install additional packages.
I’ve struggled with this one myself. The advice you got was correct.
Accessing files on the phone can only be done through the file browser of sys-usb Qube.
I was finally able to access my phone on sys-usb by disabling (unchecking) minimal-usbvm option in sys-usb Qubes Settings > Services. Although, depending on threat models, some should not disable this feature or disable and re-enable after disconnecting the phone. Here is a forum discussion related:
I had the same problem. The combination of disable minimal-usbvm for sys-usb and installing gvfs-backends and mtp-tools in the underling debian template did the trick for me. Now I can open my Android devices via the file manager of sys-usb again. Thanx @parulin and @alannis !
Just so someone has said it: minimal-usbvm should be reactivated when you’re done. Otherwise, you’ll run into problems the next time you want to pass an external hard drive to another Qube.
I actually found a way to do this that is very user friendly.
If you use a Fedora template for your sys-usb you’ll be using much newer drivers for your devices, than the older and more stable Debian template.
You’ll be able to connect to your phone directly to sys-usb, or pass the device to any other qube that runs Fedora (cannot connect when passed to Debian qubes) and connect from there.
I connected my Pixel phone this way with no issues. This was not possible with a Debian template sys-usb.
The strange thing is that my phone comes up in the Qubes USB list as a Camera, but wth…
If you have any concerns about compromising security, which this technically does, I’d suggest using a DVM template based on a Fedora template.
This way even if compromised, on reboot it will revert back to the DVM template.
Also, if you use bluetooth through sys-usb, you’ll be able to have much better connections with modern devices.