As great as the idea of qubes is, as shitty is the implementation unfortunately...
Discussion
Hard disagree here.
I've seen a lot of vulnerabilities in Xen that did not affect Qubes because of how they implemented their system.
The ability to safely get data from one VM to another in Qubes is sublime.
The support for quickly switching VMs between Tor, a VPN, or other network configurations is easy to use.
There are hardware compatibility limitations, which is inherent when you are using security features that other OSes don't use, but once it's up and running, the implementation is solid.
I mostly referred to the usability with my claim, updates, which are available all the time, for example take so much longer than on normal OS which makes users tend to ignore them.
Also crucial stuff like a simple night shift mode is missing making it hard to use as daily driver without compromising the security model somehow. No secure boot support, updating Tor browser is weird somehow,...
I think its a cool OS but a bit unpolished which makes me doubt the security from time to time. Tails, for example, on the other hand while having a different target group is really stable, polished and straightforward to use which also makes it harder to be misused.
There are frequent updates to the guest OSes (Fedora, Debian) and occassional updates to dom0, but they go faster than Windows or macOS updates. This is even true when Qubes updated go through Tor. They also don't interrupt anything nor force a reboot, which is a stark contrast to Windows and macOS.
I don't use night shift, but it should be an option in dom0 since that is running X11. I'll look for it when I'm back up and running.
No secure boot out of the box is a fair point, but they do have two more secure alternatives (Anti Evil Maid or Heads) which has the advantage of limiting the trust you have to put the BIOS.
I like Tails too. That's my go to solution when I need to use someone else's computer. I can just reboot before and after I do something risky, like downloading and running software vs something more sensitive such as encrypted messaging, moving money around, or signing into certain accounts.
I don't tend to do much of those sensitive things while on the go, let alone using someone else's computer, so it's not very many reboots to switch context in practice.
At home it's nice to have different nyms separated, easy backups, and different networking setups for different things (force everything through various VPNs, Tor, a combination of those two, or no networking). Those are the main three things I like about Qubes (beyond the isolation that prevents one vulnerability from meaning "game over", of course).