You don’t have to carry it with you, in my case the server part of Proxmox is hosted by my friend from work, I connect to it from my lightweight laptop
The update mechanisms in different linux distributions are different, I wouldn’t use a tool to merge them. For example, updates in nix/arch/debian obviously work in different ways. Also, I don’t like the implicit update checking behavior. Even in case you turn off updates in Qubes, it will still notify you when you start AppVM
qubes-core-agent-linux
As you can see the documentation for this tool is very scarce. As a user, I just want to put one or two programs in AppVM and have it work.
I actually don’t really like the idea of AppVMs as such. The core idea of Qubes is that your data is functionally separated—conditionally, one VM is for storage, another for messengers. In this case, the software in “Storage” and the software in “Messengers” is different. With this approach, using AppVMs only creates difficulties. To install new software in an AppVM and keep it after a reboot, you have two options:
- Install the software in the template VM and reboot the AppVM (which disrupts your entire workflow).
- Install the software in both the template VM and the AppVM, which results in downloading and installing the same package twice.
It’s clear that AppVMs should be used in cases where you need to maintain multiple copies of a single VM and update them together. But in my case, once again, I tried to use AppVMs as little as possible because of the reasons described above.
That’s not true. You can use tools like VeraCrypt (VeraCrypt - Free Open source disk encryption with strong security for the Paranoid), which allows:
- Using a fake OS in case someone forces you to reveal the password.
- Making it impossible to prove that there’s another OS on the PC besides the one for which you provided the password above.
I suggest using a physical killswitch router. Essentially, you create a NetVM that wraps all your traffic in a proxy, for example, socks5://user:pass@10.13.37.1:31337
. You use this NetVM for all qubes that need internet access. On the router, you use a killswitch that blocks all traffic except for tcp://10.13.37.1:31337
. This way, even if your processor/OS/hardware has a remote access backdoor, it cannot be used because any data transmission attempts will be blocked by the router. In fact, hardware backdoors become useless, as you know they may have access to network interfaces, so limiting yourself to a virtual router won’t work—only physical isolation will.