Who would want to hack me : government agencies, probably.(i have past experiences and clues, but not evidence.)
How much resources they have : at least having suspects of physical survailence
I once had an experience of an attempt of cyberattack. I had no evidence, until i found qubes security bulletin on XSA-458 . so i posted this : https://forum.qubes-os.org/t/noob-question-about-xsa-458/27779cyberattack, sorry for broken english.
Nowdays, i had a severe problem with updating qubes. I sought for all the forum posts for update failure, and i encountered lots of error messages. Some are about fetching packages(some of which can he solved with adding ‘qubes-updates-manager’ service), and lots of it is about curl error, which all the sha256, sha1, md5sum are match but noy sha512.
However… I sometimes encountered weird things. For example, i was not able to upgrade sometimes due to suspicious python script running, incliding dom0, which content was encrypted while executing. Sometimes, i was unable to update VM, including dom0, when i attempted update with the error message indicating another instance of update is going on.
And i had some whacky experience, that the disposable template VM has a storage space, including whonix, which i never managed to turned on. I thought that cyberattack was possible, so i think if the attacker can use any-kind-of cyberattack to execute command or script without authorization, then i can spoof the command via adding another arbitrary number of alphabet and number, and removing the original vm - such as sys-whonix -. I never had executed the command(such as salt, or etc), but system notification said access to sys-whonix is denied. (I suspect that error message popped up because there are no such vm, otherwise it will be executed silently, so the disposable template sys-whonix are able to modified, so qubes manager shows the usage of storage space ).
Regarding my past experience, the attacker is only able to attack the dom0 when i connect it to any source of internet connected directly into dom0. (this includes whonix). I wanted to use i2p, mirage firewall, and openbsd-netvm, but i’m unable to verify the file i downloaded as i can see connection via tor network seems compromised, regardless of the method.