Secureblue for Default TemplateVM and Dom0?

What is thought about this hardened Fedora distro:

It is a good candidate for sys-* VMs? For dom0? Has proper graphics

and DE support?

2 Likes

I would rather use Kicksecure:

1 Like

Why? You prefer Debian based distro?

1 Like

I use and trust Whonix (based on Kicksecure), therefore I trust @adrelanos as well.

This means you are placing more trust in Whonix, over secureblue?

1 Like

Yes.

This is due to more trust in the lead developers of Whonix?

1 Like

Yes.

There is a qubesOS kicksecure template? Or distro morph is the preferred

method.

1 Like
2 Likes

Ok cool; there is also the distromorph:

2 Likes

Why is Fedora default dom0 distro and not Debian? The argument

made for this was superior graphics and desktop environment support in Fedora.

Is this true? If dom0 default was debian, you could distro morph to kicksecure.

1 Like

Also, this is being actively worked on recently:

2 Likes

Template is here:

https://qubes.3isec.org/Templates/

2 Likes

Kicksecure-17 template is buggy at present. Apps will not show up and

crashes.

Distromorph in testing.

1 Like

I am using debian minimal with kicksecure morphing CLI for all my tasks for long time (couple years).

1 Like

any glitches with distromorphing?

1 Like

unable to locate package “kicksecure-qubes-gui”

1 Like

Secureblue is much more hardened than Kicksecure, which makes it a good fit for QubesOS which is security focused.

1 Like

It is also Wayland reliant, and Wayland support in Qubes is a little way
off.

I never presume to speak for the Qubes team.
When I comment in the Forum I speak for myself.

1 Like