Dear Qubes OS fans, prepare yourself for three days of intensive exploration into the world of secure computing and digital privacy, because the Qubes OS Summit is coming: 26-28 September ! And even if you couldn’t visit The Social Hub in Berlin (what’s a pity we don’t have teleports yet ) - luckily this wonderful event will be live-streamed !
Don’t miss this chance to learn more about Qubes OS and privacy-respecting hardware that supports it Please check out this page for more details - including the event’s time schedule, talks descriptions and helpful links:
What I - as an occasional user and not a Qubes developer - would love to learn about at the upcoming summit, and what can be interesting for the Qubes starters from various fields:
New features of Qubes OS and various improvements like GUI and peripheral device handling: how these developments can improve Qubes user experience for my next tryout of this promising OS
Qubes Air: cloud computing done right; its hybrid mode (described here) can help to improve the Qubes performance on my coreboot’ed G505S laptop by offloading some hungry VMs to also-corebooted KGPE-D16 personal server
NovaCustom firmware updates and new products, including a NUC Box MiniPC (Qubes certification pending) - for a flawless Qubes OS experience. Also, a smartphone? How does it compare to the current Linux smartphone offerings like Pinephone and Librem 5 ?
Running Windows as Qubes VM. We all love the opensource and its benefits, but sometimes you may still need the Windows-only software to get things done - and it may refuse to work in Wine: i.e. when I tried to open KGPE-D16 motherboard schematics file in a Boardview software, Wine crashed painfully. Many people also depend on Windows-only software for their jobs - and, if Qubes can run Windows flawlessly, this will allow people to achieve what without the privacy/security sacrifices of running Windows natively
Usage of Qubes in the professional environment, both for corporate and freelance purposes, to earn money while doing what you love
On a previous summit, aside of Qubes OS status - I also learned about various cool hardwares like Nitrokey and Flashkeeper, as well as how to achieve a working GPU passthrough with Qubes: so that, just in case I’d want some rare opensource gaming, it doesn’t turn into a “game of debugging” The recordings of this past event are available at 3mdeb YT channel - and, while counting days until the new summit, you can explore these videos to see what this event looks like
Love all your work and thank you for your service!
@alimirjamali Q&A: Could not hear the questions (only answers)
@marmarta’s and Chris’s “The Future of Qube Manager: Design Session” - a great chunk of it from the start had no audio at all, but it starts later… I believe during Q&A.
Very excited to hear about Ansible finally supported!
Thank you @Guillaume and @fepitre <3
I have nothing against SaltStack - I love it just as much, but Ansible is so much easier for non-developers to learn quickly and use… and opens up so many possibilities with Ansible Galaxy.
My biggest concerns were regarding ssh - I am very happy to hear that qrexec transport was still used.
In terms of GUI for Ansible playbooks, Qubes templates and workflow management, there is a web-based interface that even includes a REST API which might be useful.
In terms of offline/local-first Ansible, it is possible but it requires some effort - things like setting gather_facts: false (as it can’t gather facts during plays), bundling playbooks and dependencies/collections with OCI/Docker/ISO image, etc.
One thing: I already tried it - could not resist - but the package ‘qubes-ansible-dom0’ was not found - do I need to enable specific repo on 4.3rc1? If am planning on rc2 as soon as I back up - or will I have the same issue on 4.3rc2 and have to actually wait next few months for 4.3?