What would you like to see improved in Qubes OS?

To be clear (who originally raised this issue), have no need for “custom” kernels either. I want to be able to use a perfectly normal Debian kernel in a Debian qube without having to build it into a template (and then copy all that extra stuff every time I clone the template).

I ran into a use case where I simply could no longer use Fedora kernels in my VMs; the combination of Fedora Kernel v. 6.6X plus Debian 12 qube + Zfs is broken.

To my mind if we can’t supply debian kernels for debian qubes, we aren’t really supporting Debian.

1 Like

Also anticipating some measures to spoof internal ipv4 address for named disposables, i’m not sure the attackers using python script is leveraging those, but i’m feeling nervous.

You can’t spoof ipv4 addresses of qubes

ohhhh. got it…
i have no idea why the hell there file exist in my /home/user that indicates the VM name. i’ll report that on this thread :

i’ll upload the file soon.

Wayland with good scaling support. I shouldn’t need to have fonts tiny or massive on my laptop with a weird dpi (Framework 16) and I miss sway. GPU acceleration would also be nice so bloated websites aren’t slow and I don’t need two GPUs in my PC for gaming. I am hoping to be able to use my Framework Desktop when it arrives with Qubes but it does not have enough PCIe lanes for a second GPU. The alpine template becoming an official template would be nice too.

qvm-prefs QUBE ip does.

I never presume to speak for the Qubes team.
When I comment in the Forum I speak for myself.

But this requires access to dom0, right? I meant a qube can’t spoof the IP of a neighborhood qube from itself

I want to install qubes os to usb sticks like Tails.

You can already install Qubes OS onto a USB stick:

https://www.qubes-os.org/doc/installation-guide/#installation-destination

(I haven’t used Tails in a while, though, so I’m not sure if the “like Tails” part indicates some significant difference that I might be missing.)

2 Likes
2 Likes
  1. Integrated flatpak support (similar to your script but where updates will be notified in update manager when a flatpak update is immediately available, not just when apt and dnf packages are available and then flatpak updates bundled in)

  2. Kicksecure template supported without the need for manually distro morphing

  3. OpenBSD template support (without the need for manual intervention) which should probably be the sys-net and sys-firewall default.

  4. Secure Boot compatibility

  5. Category section in the appvm programs menu

  6. Include all the X11 screensavers (xscreensaver) in dom0 - it is a bit of a hassle doing it manually.

  7. Not including firefox esr due to its unique ID tracker

  8. Maybe KDE support? (I really like XFCE though too)

  9. Wayland support because kinetic scrolling is great.

  10. The ability to easily and quickly uninstall unneeded programs in templates from the applications menu in the qubes manager gui.

3 Likes

This depends on the upstream template distro.

Qubes already has KDE support: https://www.qubes-os.org/doc/kde/

A lot of your other suggestions are already in the works. :slight_smile:

1 Like

For example, this:

Some were even mentioned in this very topic, e.g., What would you like to see improved in Qubes OS? - #205 by fsflover

Mozilla decided to include a unique download token in downloads from the Firefox website and uses telemetry to send the token and assign users with IDs. However, releases from the Mozilla FTP doesn’t include the token. If you don’t like any of this circus, choose LibreWolf instead.

Thanks for the secure boot thread though. Interesting. I will have a deeper read on that later but it seems like tpm is needed and my qubes says my tpm 2.0 is not supported?

So it doesn’t affect Firefox on Qubes, since the browser is not downloaded from the website. (And this discussion is off-topic here, which is why I gave a link to the apropriate place.)

2 Likes

ah yes you are absolutely right. sorry about that.

This will be maybe something to add in the standard setup.

2 Likes

I’d like to see Qubes installer offer an “out-of-the-box” VPN installation for the popular VPNs (Mullvad, Proton, Nord) and a decent “browser qube” ditching Firefox (Librewolf? Mullvad? Brave? all of the above?). Then Qubes will legitimately be journalist-friendly.
(from a longer post here)

2 Likes