A nation state adversary can remotely hack Qubes installed on an ordinary computer, even if it has no preexisting compromises.
This is an oversimplification, a blanket statement which CANNOT be true. By the same measure, a nation state adversary can kill you if they really wish to, see the nuclear physicists of Iran, killed in Iran.
I give you that, if you run QubesOS on a machine with a vulnerable ME, you may be vulnerable to a magic packet attack. Yet none of the disassembled BIOS dumps revealed any occurrence of such code, and I will qualify this statement with “at least in Lenovo’s BIOSes”. There exist vulnerabilities caused by stupidity, like using that free TCP/IP stack from the '90, which everybody used and didn’t care to check. But there are moderately easy ways around this too, from “never connect WiFi” to “always connect through a firewall chain which drops illegal TCP packets” and “never use IP-in-IP or other stupid Cisco hacks”.
In conclusion, I perceive the Qubes warning as fair. Qubes cannot stop you from using “password1” as your disk encryption password either, and this is a greater risk than ME.
Then that person would have poor reading comprehension, as the warning does not say that at all. The warning makes no guarantees about what Qubes OS can or will do. It only points out a limitation of Qubes OS.
Here again is the warning text:
Warning: Qubes has no control over what happens on your computer before you install it. No software can provide security if it is installed on compromised hardware. Do not install Qubes on a computer you don’t trust. See installation security for more information.
Please point out the part that is misleading or incorrect.
Technically it is perfectly correct. However, I don’t think I’m the only one who would read into this that Qubes will provide protection from hardware being compromised, especially remotely.
I really do think a target person could be endangered by a false sense of security. I was not trying to nitpick or be condescending.