Search Results

Found 1 results for "ac29fe3554ceafd97fa4903b7d27f1bd" across all boards searching md5.

Anonymous /g/105825955#105827060
7/7/2025, 3:50:04 PM
>>105825955
Some tips from a long-time Qubes user
1. "Reasonably secure" is part of their security model. The original thesis and whitepaper that led to the creation of Qubes argues that there's no such thing as secure software, and created an OS around that model. The point is low attack surface (hardened Xen) + isolation, and you're supposed to use it with the assumption that certain VMs (like the one you install a web browser to and browse the internet with) are compromised at all times. It's essentially an OS that is designed to assume you will be compromised and give you the tools to reasonably secure regardless, instead of the default model which just applies security patches and hopes for the best.
2. Qubes isn't a Linux distribution. It's literally not Linux (even though it comes with a stripped down Fedora Linux that runs in a VM for management/DE) so people who lump it in with Linux don't know what they are talking about. It doesn't boot the Linux kernel and you don't have to use Linux on it. Chances are you will use at least 2 different Linux distros on it at minimum (Fedora and Debian) and possibly Windows.
3. It's not useful for a beginner, or even a skilled user who isn't interested in learning an autistic paradigm. It has a suite of original software and unique Qubes-specific terminology (TemplateVM/AppVM, Salt, qrexec policies, qubes-fireall and networking) that you have to learn to reap the security benefits, otherwise there's no point in using it. If you use it incorrectly and just stumble around with trial and error, there's a 100% chance you accidentally do something that compromises your security, so it's a big ask from the user.