Qubes OS installed on HDD is sluggish and crashes

Qubes OS installed on an HDD becomes extremely slow and freezes even on PCs with high‑end processors and GPUs!

My experience: Qubes OS installed on an HDD is very sluggish and crashes even on machines with top‑tier CPUs and graphics cards. Have you encountered this problem as well?

The issue with using Qubes on an SSD is that secure erase on SSDs is difficult and many researchers report substantial failures—even when using methods like TRIM or the manufacturer’s secure‑erase software. Specialists say they were still able to recover data! Using an HDD gives a much higher guarantee—or a better chance of guaranteed data destruction—with secure erase. Simply shredding the HDD already prevents data recovery; shredding does not work on SSDs! Is there a special HDD that Qubes runs well on? Are there any processor, GPU, or RAM requirements for Qubes to run smoothly on a hard disk?

1 Like

In my experience, you can run QubesOS in a HDD, however, QubesOS is heavy on I/O so it always will be slow. You can speedup things with a HDD RAID configuration. And for the subject of SSD wiping, if you encrypt your disk (default settings with QubesOS), and you later wipe the disk using software, then for an attack to succeed, the attacker need:

  • Retrieve the physical disk
  • Known the encryption key of the disk
  • Find at least one full block of encrypted data, to retrieve it, decrypt it, and try to understand what it contains and hoping that it contains something actually usefull.

So you are probably fine with both HDD and SSD.
And if that is not enough, you can add addtionnal layer of encryption for your sensitive data (encrypting the sensitives files, or a full qube), and physically destroy the disk after you logically destroyed everything on it (Physically destroying a SSD is more complex than it seems, you need to target specific area, just hammering the things could leave some small area containing the data intact)

2 Likes

Yeah, use full disk encryption instead of trying to ‘secure erase’
or better yet, don’t give away your used SSD :wink:

no surprise, that’s why the system requirements suggest:
High-speed solid-state drive strongly recommended

1 Like
(likely LLM post)

This is a well-known pain point in the Qubes community. Your experience is completely normal — Qubes is extraordinarily I/O-intensive compared to conventional operating systems, because it runs multiple VMs simultaneously, each with its own virtual disk image. An HDD simply gets hammered by all that concurrent random I/O, which is why even a fast CPU can’t save you. The GPU is essentially irrelevant to the bottleneck.

Why Qubes on HDD is so painful

Qubes runs dom0 plus several AppVMs and a sys-net, sys-firewall, and often sys-usb simultaneously. Each VM has its own qcow2 disk image, and they all compete for the same spinning disk heads at the same time. HDDs handle sequential reads well but are catastrophically slow at random concurrent I/O — latency of 5–15ms per seek versus ~0.05ms on an NVMe SSD. The result is exactly what you’re seeing: freezes, sluggishness, and near-unusable performance regardless of how fast your CPU is.

HDD selection tips if you’re committed to it

If you must use an HDD, the factors that matter most are:

  • Spindle speed: A 7200 RPM drive is the minimum — 5400 RPM will be borderline unusable. Enterprise-class 10,000 RPM drives (like the old Western Digital Velociraptor line) are significantly better, though they’re now hard to find new.
  • Cache size: Larger onboard cache (64MB or 128MB) helps with burst workloads.
  • Brand/reliability: Enterprise-oriented lines like Seagate IronWolf Pro or WD Gold/WD Red Pro have better sustained throughput and are built for heavier workloads, though the fundamental seek-time problem remains.
  • Dedicated swap: Put swap on a separate physical drive if possible, so VM memory pressure doesn’t compete directly with VM disk I/O on the same heads.

CPU and RAM are actually the more important levers

Since the HDD will be the bottleneck, you want to minimize how much disk activity happens by keeping more in RAM. Qubes’ own recommendations call for 16 GB as a practical minimum, but 32 GB makes a substantial difference because VMs can stay fully in memory rather than swapping. More RAM won’t fix disk I/O but it dramatically reduces how often it has to happen. CPU matters less, but VT-x/VT-d support with IOMMU is required, and more cores help with running more concurrent VMs without contention.

On your secure-erasure concern

Your concern is legitimate and well-founded. The difficulty of verifying SSD secure erase is a real issue, particularly with drives that do internal wear-leveling and remapping — data written to one logical block may physically reside in multiple locations, and TRIM-based erasure doesn’t guarantee overwriting every cell that ever held your data. Physical destruction (shredding, degaussing, or disintegration) is indeed far more reliable for HDDs than for SSDs, where shredding still leaves individual flash chips potentially recoverable in a sophisticated lab setting.

A practical middle-ground some security researchers use is full-disk encryption (which Qubes does by default via LUKS) combined with destroying only the LUKS header — this cryptographically destroys access to all data on the drive without needing to overwrite every sector. This works equally well on SSDs and HDDs and is considered cryptographically sound, though it requires trusting the encryption implementation rather than physical destruction. For the highest assurance, your instinct toward HDDs with physical destruction is the more conservative and defensible choice.

Realistic expectations

Even with a fast 7200 RPM enterprise HDD and 32 GB of RAM, Qubes will still feel noticeably slower than on an SSD — boot times will be long, VM startup will take many seconds, and heavy multitasking will still cause occasional pauses. It’s usable for security-critical work where you’re patient and disciplined about not running too many VMs simultaneously, but it won’t feel like a normal desktop OS.

1 Like

This is not how it works on qubes os, the qubes swap is on the same volume as their storage. Given the format and where bold text is used, looks like llm output.

3 Likes

No.

High-speed solid-state drives.

Yes:

2 Likes