You are describing side-channel attacks performed by spooks.
Tempest (electromagnetic) monitoring, audio/video monitoring, evil maid attacks, and other firmware level
attacks like flashing SPI chip or attacks like USB, SD card, Ethernet, etc. Don’t forget side channels like
insecure smart tvs, laptops, cell
phones (anything with networking drivers). In reference to Tails, there was a legal case against a person
who used Tails in a malicious way and a 0-day in the Tor Browser was used to de-cloak the ip address
which led to an arrest. Whonix would have prevented this and Whonix is the gold standard. Tails is
woefully insufficient on its own. Something like
aforensics https://github.com/aforensics/HiddenVM would be a better option because you can run Whonix
inside of a Tails VM with anti-forensic properties. I was asking about specific steps to harden Qubes
templates (using Saltstack).
Also, I recently found that Alpine Linux has a Xen-specific .iso which can be used in Qubes as a
standalone OS, or as the basis for a template. I think the Qubes community should pursue Alpine Linux
as a means of offering a more secure OS template with exploit mitigations like PIE (Position Independent
Executables), muslc and stack smashing protection.