What would you like to see improved in Qubes OS?

Liteqube is the way!

2 Likes

Right Click Qube in Qube Manager to Launch App…

2 Likes

But not updated for Qubes OS 4.2, right?

But you can already to it. You have to enter the app name though. Do you expect to get a list of apps like in Qubes Domains widget? I’m not sure how to make it without overloading the menu.

please more colors for VMs :wink:

1 Like

Post can’t be empty

3 Likes

But how, I don’t see it :wink:

Option for “Starter Button” to run all Elements in Starter Element with one Click…

More secure defaults for things we use as daily drivers.

There are far too many things that a n00b user takes for granted while using a Linux distro like Ubuntu which require manual configuration on Qubes.

It seems a lot of configuration depends on dom0 whose terminal we can’t easily copy to and the configurations are usually quite elaborate (see the policy file for setting up an audio qube as an example.

It would be nice if dom0 was split into two terminals. A “true” root terminal that retains the security of not being able to be pasted into and another terminal that has enough privileges for writing up configs so that it is less difficult to troubleshoot and experiment.

Right now I would like to be more secure but choosing security comes across as being hard and a user can’t easily undo their choices if they make mistakes. Leading to a situation where the average user will prefer to stick with the defaults and the defaults if not that secure, in and of themselves increase the security risk of the user.

like what?

2 Likes

AFAIK the jump in security while switching from any other OS to Qubes is much higher than that from tinkering with Qubes and using its advanced features.

Many advanced features of Qubes, including Audio qube, are not sufficiently tested and therefore not included in the default configuration yet. With time, bugs are fixed and the default configuration gets more secure, like disposable sys-usb and sys-firewall were introduced in R4.1. These disposable sys-* qubes could be configured manually before 4.1, like sys-audio can be done now.

Additionally, some configurations can and will be distributed as Salt formulas by the developers.

Have a look at Admin API: you can have qubes that can manage a subset of other qubes giving you the convenience and still keeping the compartmentalization for critical things.

2 Likes
  • How to setup and use Bluetooth
  • How to setup the WiFi network card that comes with a laptop.
  • Safe installation of software. This is complicated by the fractured nature of the Linux ecosystem already, but as an example when I installed an AppImage, I discovered that you have to get the steps right from the beginning

I think there should be some attempt to consolidate the documentation so that a user is able after they’ve setup Qubes OS, they quickly know how to do things the right way.
An example of this is how to organize qubes

Don’t get me wrong, I am very thankful to the community members for helping me whenver I have trouble, but that relies on them having time and since the undo process with Qubes is complex, you can get stuck for a while with a problem. It would great to have some kind of path/roadmap, where as a user, one can gradually become more knowledgeable regarding Qubes and becoming better at using it as a daily driver.

Not all of us have extra machines to try things out on and be the change we want to see in this area.

Hope that clarifies it and thanks for asking the question :innocent:

Better power management. Xenpm isn’t as strict as cpupower

Qubes Backup:

Uncheck the Open File Manager Checkbox automatically when selecting to shutdown PC after successful backup as I think it blocks shutdown when enabled… Also move this checkbox to the first dialog where the other options are set…