So, I decided to check if any employers care about sysadmins who know how to work with xen. Especially because it’s my daily driver. But I wasn’t able to find any. I also wasn’t able to find any certifications for xen (at least in my location). So then I checked where xen was and is currently used. Apparently when Qubes-os was initially released xen as a hypervisor choice was a no brainer. Not only it’s a microkernel with security by compartmentalization. It was used by all major cloud and vps providers. Nowdays most of them are using customized implementations of kvm. And there are really a lot of those. Or vmware/locally made closed source software by the same company. The only vps provider which claimed to use xen as their hypervisor was linode. Which is somewhat reassuring but it was the only big one I could find. But xen has it’s uses in smart cars sector. And this is about it
Issue is - when Qubes-os was created there was really a lot of attention to it’s hypervisor. So bugs were way less likely to stay hidden for long. Nowdays this attention is focused on kvm and the linux kernel itself
How does this really affects Qubes-os security? Wouldn’t it make kvm based solutions a bit more secure from attention to the source code factor?