Qubes OS

A reasonably secure operating system. Security through compartmentalization using Xen virtual machines.

Privacy Hacking Advanced

Overview

Based onXen hypervisor with Fedora, Debian, and Whonix VMs (qubes)
Package managerDNF (Fedora qubes), APT (Debian qubes) - depends on the template
Package format.rpm (Fedora), .deb (Debian) - per qube
Release modelFixed releases with regular updates. Currently Qubes 4.x.
Default DEXFCE (dom0)
Init systemsystemd (within qubes)
Websitequbes-os.org

Why Qubes OS?

How Qubes Works

Package Management

Package management in Qubes happens inside template qubes. Each template uses its own package manager.

# Install software in a Fedora template qube
# (Open a terminal in the template, not the app qube)
sudo dnf install firefox thunderbird

# Install software in a Debian template qube
sudo apt update && sudo apt install firefox-esr thunderbird

# After installing in the template, shut it down
# The software will be available in all app qubes based on that template

# Update a Fedora template
sudo dnf update

# Update a Debian template
sudo apt update && sudo apt full-upgrade

Qubes-Specific Commands

# List all qubes
qvm-ls

# Start / shutdown a qube
qvm-start work
qvm-shutdown work

# Create a new app qube
qvm-create --template fedora-39 --label green work-project

# Run a command in a qube from dom0
qvm-run work "firefox https://example.com"

# Copy a file between qubes (uses secure inter-qube copy)
qvm-copy-to-vm target-qube /path/to/file

# Open a file in a disposable qube
qvm-open-in-dvm suspicious-file.pdf

# Clone a qube
qvm-clone work work-backup

# Set a qube's networking
qvm-prefs work netvm sys-whonix    # Route through Tor
qvm-prefs work netvm sys-firewall  # Normal networking
qvm-prefs work netvm none          # No network
Hardware requirements: Qubes needs a CPU with VT-x and VT-d/IOMMU support, at least 16 GB RAM (32 GB recommended), and an SSD. It runs a full Xen hypervisor, so performance is lower than a native Linux install. Check the Hardware Compatibility List before installing.

Common Qube Layouts

# A typical security-conscious setup:
#
# [vault]      - Offline qube for passwords, GPG keys (no network)
# [personal]   - Personal browsing, social media
# [work]       - Work email, documents, code
# [banking]    - Banking and financial sites only
# [untrusted]  - Random browsing, untrusted downloads
# [whonix-ws]  - Tor-routed browsing via Whonix
# [disposable] - One-off tasks, opening sketchy PDFs

Tips