I just finished my installation and everything seems to work fine, but I have some questions right on that I can’t find answers at the moment and would appreciate if you can help.
When installing the OS I selected to combine sys-usb and sys-net, does that mean I’m exposed now to rubber ducky threats and such?
The docs seems to be out dated, is this project dying or something like this? I really hope not and this is something due to budget/not many volunteers etc.
Despite the how-to guides in the docs, is there any good guides/tutorials for the new guy to step in? I really liked the “New user guide: How to organize your qubes”, but it feels incomplete in a way, as there’s “no code”, no practical guide on how to actually make this templates and qubes.
It would be helpful if you told us exactly what is outdated in the docs. Also:
This project is very much alive, see the work being done in Qubes Issues. Also, see discussions on this forum. Apart from that, the project does suffer from the lack of volunteers.
You can install templates, or clone an existing template using Qube Manager or qvm-clone and modify it to your liking. You can also use Qube Manager to create a new AppVM based on any existing template. If you have a particular question on how to implement something, feel free to ask it here. See also: Command-line tools | Qubes OS.
The problem is Qubes is not an ordinary operating system. The Qubes developers are not writing the whole OS but reusing a lot of things from others. For example, Xen is used as the hypervisor, Debian and Fedora are used as the operating systems in the VMs by default, and Fedora 32 is currently used in dom0 for managing the VMs and GUI.
The latter defines how your GUI behaves. For example, hitting Alt+F11 makes a window go full screen and hitting Alt+F3 gives you a menu for choosing which app to run. You cannot possibly put all Fedora, Debian, Xen documentations into Documentation | Qubes OS, this would not make it more readable. So for non-Qubes-specific questions users should go to the docs of the corresponding distribution. Perhaps, the above text could be added to the FAQ (which is already very long).
I am happy that you also think this way. I agree with you.
I don’t find this statement accurate. What does it mean if Qubes OS is vulnerable? I’d rather say dom0, and that means that it is vulnerable as Xen is, at least. And that makes it way ahead of other OS’s in terms of security, but still “reasonably”.
When any VM, except templates, they’re already considered compromised by Qubes OS philosophy.