To be clear (who originally raised this issue), have no need for “custom” kernels either. I want to be able to use a perfectly normal Debian kernel in a Debian qube without having to build it into a template (and then copy all that extra stuff every time I clone the template).
I ran into a use case where I simply could no longer use Fedora kernels in my VMs; the combination of Fedora Kernel v. 6.6X plus Debian 12 qube + Zfs is broken.
To my mind if we can’t supply debian kernels for debian qubes, we aren’t really supporting Debian.
Also anticipating some measures to spoof internal ipv4 address for named disposables, i’m not sure the attackers using python script is leveraging those, but i’m feeling nervous.
Wayland with good scaling support. I shouldn’t need to have fonts tiny or massive on my laptop with a weird dpi (Framework 16) and I miss sway. GPU acceleration would also be nice so bloated websites aren’t slow and I don’t need two GPUs in my PC for gaming. I am hoping to be able to use my Framework Desktop when it arrives with Qubes but it does not have enough PCIe lanes for a second GPU. The alpine template becoming an official template would be nice too.
Integrated flatpak support (similar to your script but where updates will be notified in update manager when a flatpak update is immediately available, not just when apt and dnf packages are available and then flatpak updates bundled in)
Kicksecure template supported without the need for manually distro morphing
OpenBSD template support (without the need for manual intervention) which should probably be the sys-net and sys-firewall default.
Secure Boot compatibility
Category section in the appvm programs menu
Include all the X11 screensavers (xscreensaver) in dom0 - it is a bit of a hassle doing it manually.
Not including firefox esr due to its unique ID tracker
Maybe KDE support? (I really like XFCE though too)
Wayland support because kinetic scrolling is great.
The ability to easily and quickly uninstall unneeded programs in templates from the applications menu in the qubes manager gui.
Mozilla decided to include a unique download token in downloads from the Firefox website and uses telemetry to send the token and assign users with IDs. However, releases from the Mozilla FTP doesn’t include the token. If you don’t like any of this circus, choose LibreWolf instead.
Thanks for the secure boot thread though. Interesting. I will have a deeper read on that later but it seems like tpm is needed and my qubes says my tpm 2.0 is not supported?
So it doesn’t affect Firefox on Qubes, since the browser is not downloaded from the website. (And this discussion is off-topic here, which is why I gave a link to the apropriate place.)
I’d like to see Qubes installer offer an “out-of-the-box” VPN installation for the popular VPNs (Mullvad, Proton, Nord) and a decent “browser qube” ditching Firefox (Librewolf? Mullvad? Brave? all of the above?). Then Qubes will legitimately be journalist-friendly.
(from a longer post here)