Replying to Avatar Cyph3rp9nk

Qubes OS

How does Qubes become the most secure operating system today?

By isolation. Qubes is not an ordinary Linux distribution, Qubes is a Xen distribution. Xen is an open source tier 1 (baremetal) hypervisor that runs directly against the hardware. Virtual machines run on top of Xen, each of these virtual machines is the one that provides services to the system. For example, there is a virtual machine that provides access to the network, another virtual machine provides the firewall, another virtual machine dom0 is the one that manages the Xen engine, another virtual machine manages the USB devices, and finally we have the different work environments, with which we can create various levels of reliability.

All this that you are telling me is all Greek to me. In short, if a virtual machine is compromised, it will not affect the rest of the machines, because each machine is isolated from the rest of the system.

Within Qubes, we can run different Linux templates, including Fedora and Debian, and we can also run Windows (I do not recommend it, because it is a severely compromised system).

What are these working environments?

The funny thing about all this, is that we have to re-educate ourselves to use Qubes. The idea is based on having several environments depending on the reliability of each one. For example, we will use the "untrusted" environment for everyday web browsing, we can use the personal environment for accessing password-required websites, and we can use the "work" environment or one created on purpose for the most critical websites such as bank websites. Finally we have an environment called "vault" which does not have Internet access, and in which we should store our files. The working environments are differentiated from each other by the color of their windows, which is customizable. For example, in the default installation the "untrusted" environment has a red window border, the "personal" one is yellow, "work" is blue, and finally the "vault" environment is black.

What does this achieve? That for example, if the "untrusted" environment is compromised, it will not affect the "personal" environment in which we have access to webs with passwords and therefore the access cookies. Or in the same way, if the "untrusted" environment or any other is compromised, it will never have access to our "vault" environment which is where we have the files.

We can create as many environments as we want in just seconds, since these are based on Templates predefined by the system.

How does Qubes achieve privacy?

Through Whonix and the Tor network. Whonix is a Linux distribution configured to use Tor by default, like Tails. Qubes uses a Whonix Template to give access to the Tor network. In case we want privacy, we just have to make use of the whonix machines that Qubes creates by default. We can even configure it so that all Qubes access is through Tor.

What do I need to use Qubes?

A processor and a motherboard that are compatible with Intel's vt-x and vt-d instructions or their AMD equivalents, AMD-V and AMD-Vi.

It's a bit of a pain, because not all computers, especially low-end ones, are compatible, but it's the price to pay for running a "reasonably secure" operating system.

How do you install it?

Well, like any other Linux distribution, it has its graphical wizard and it is not very difficult, but if you have any questions or problems, I will gladly help you.

https://www.qubes-os.org/downloads/

Is there a step down from Qubes that provides isolation with a relatively easy way to administrate? Qubes seems incredibly intimidating for someone who does not have a graybeard background.

The closest I've found is maybe an immutable distro, with some kind of elaborate flatpak sandboxing setup, or some kind of jailing? Distrobox currently does not have sandboxing.

Reply to this note

Please Login to reply.

Discussion

Conventional virtual machines are close to what qubes does, if something happens in a virtual machine it stays in the virtual machine, but qubes goes further and encompasses the whole system and everything is behind tor.

Actually qubes is not complicated, you just have to get familiar with it.

I have VirtualBox on my laptop and run a bunch of VM, which is a strp down from Qubes.

Honestly, I find Qubes (which I have on my desktop) easier to use. Getting files from one VM to anothet is just a matter of "Right Click, Send to Qube" in the file manager.

Thanks for sharing your experience. Do you use your desktop daily and have you run into any situations that Qubes wasn't able to handle?

I want to give it a try now, but lack spare machines to try it on. I will see if I can do some nested virtualization to get a feel for it without downtime.