My systems are HP Z420 workstations, so one built in ethernet. I have a couple USB ethernet dongles for various purposes, a number of wifi USB devices, and I periodically try to get networking using bluetooth adapters working … for reasons.
The need to have a USB attached phone that a VM can pull an IP via DHCP and use the phone as its network is a specific use case. Part of what I do includes “ride along” duties. I get a burner phone, a Google Voice number, a Signal account for it, perhaps some social media accounts, then I embed with a group I’m advising. The carrier number only shows up in creating Signal and perhaps the social media registrations.
The burner never has any access to anything that can be attributed to me, it doesn’t get on wifi, its number is never shared with anyone, and the Signal number I known only to those who need it. This is a specific remedy for frivolous litigation and malicious prosecution, which are big problems in the U.S. This construct would not stand up to a full throttle national security FISA 702 warrant investigation, but I am aware of the rules and I avoid those situations.
When I started doing this I had an elderly Toshiba laptop, 2.5KG with a 1366x768 display, a really floppy hinge, and I’d physically swap small SATA drives. I recently spent some time creating VirtualBox VMs for this work. Now I want to shift my desktop to full time Qubes without losing that capability.
There is something to be said for sitting somewhere other than one’s desk using nothing but a single isolated operating environment, it’s a way to “get in character”. My use cases these days are limited to groups that knowingly lean on me for support, so this is much less of an issue. Once the workstation solution behaves, I’ll do the same with a Xeon laptop, then I can go on the road if that’s needed.
An Ubuntu VM with just Authy, Discord, Signal, Telegram, etc would quickly balloon to over 10GB. A Debian Qube when running is about 6GB and when idle they’re under 150 meg. There’s a strong capital incentive in addition to the security angle.