Hi, if you’re still evaluating, the order would be:
-
Games: I don’t know what you want to play, but I’d recommend the Arch Linux emulator installed from Flatpak. (If you want to venture into implementing a Qubes system with a dedicated graphics card, that’s your own endeavor.)
-
Discord: Installed from Flatpak.
-
Browsing the internet: If you don’t trust anything, use completely disposable Qubes, meaning that no changes persist within them after a reboot.
-
YouTube: Same as browsing the internet.
-
Running .exe apps: I recommend trying the Windows installation on a dedicated Qubes and using the Qube without internet access permanently. Install and use everything only in offline mode.
-
(Optionally, you could try Wine compatibility configurations using bottles or wine-ge), yo instale el office 2016 con bottles.
-
Email and password manager: Debian or Fedora are both options, as they are officially supported by Qubes with ready-to-deploy templates. The email function can be web-based unless you’re interested in using older POP3 servers or similar and require a dedicated app for its management. Regarding passwords, all templates come with the KeePassXC manager, which is reasonably secure when properly configured. However, this should be evaluated by a professional based on your specific threat model.
Now, most importantly, regardless of the distribution you’ll be developing your Qubes on, I recommend installing a firewall solely for connection monitoring. I recommend Portmaster; the free version is sufficient for monitoring connections, but you can purchase the paid version for extra protection features, depending on their privacy model. This might be a small or nonexistent contribution to Qubes, but it’s better than nothing.
Regarding the distribution itself, due to the way qubes work (especially disposable qubes), you can choose Debian or Fedora. The latter only has a few extra layers of protection because it uses SELinux systems, but it’s still hackable. If you’re interested, there are Debian-based options with this, such as KickSecure.
However, I would recommend that you at least make your qube (sys-net) immutable from the installation stage, install a good firewall, an ad blocker in your browser (uBlock Origin), and some malware protection (Malwarebytes). Keep your system updated through a proxy. I recommend securing the Whonix system configuration, as it’s possible you could be hacked through the Tor network for updates. Don’t open more than one qube at a time, and block LAN traffic between qubes, just to prevent incidents.
Use Flatpak installed as your system to limit modifications after each reboot.
At least that’s the basics to start tinkering with your Anemaza model.
You can find more modifications, such as hiding your network name to prevent others from discovering you’re browsing through qubes, or installing other types of firewalls (better?) like Miranda, in the forum threads. Regards.