Qubes OS is a free and open-source, security-oriented operating system for single-user desktop computing. Qubes OS leverages Xen-based virtualization to allow for the creation and management of isolated compartments called qubes. These qubes, which are implemented as virtual machines (VMs). This allows each component of the operating system to be isolated from other pieces, preenting compromises from spreading or information from leaking.
To compare the software in this project to the software available in other distributions, please see our Compare Packages page.
Notes: In case where multiple versions of a package are shipped with a distribution, only the default version appears in the table. For indication about the GNOME version, please check the "nautilus" and "gnome-shell" packages. The Apache web server is listed as "httpd" and the Linux kernel is listed as "linux". The KDE desktop is represented by the "plasma-desktop" package and the Xfce desktop by the "xfdesktop" package.
Colour scheme:green text = latest stable version, red text = development or beta version. The function determining beta versions is not 100% reliable due to a wide variety of versioning schemes.
TUXEDO
TUXEDO Computers - Linux Hardware in a tailor made suite Choose from a wide range of laptops and PCs in various sizes and shapes at TUXEDOComputers.com. Every machine comes pre-installed and ready-to-run with Linux. Full 24 months of warranty and lifetime support included!
Learn more about our full service package and all benefits from buying at TUXEDO.
Star Labs
Star Labs - Laptops built for Linux.
View our range including the highly anticipated StarFighter. Available with coreboot open-source firmware and a choice of Ubuntu, elementary, Manjaro and more. Visit Star Labs for information, to buy and get support.
I've been using Qubes OS as my daily driver since 2018. As someone without extensive technical expertise, I can confidently say that Qubes OS is accessible and usable for non-experts. The system's focus on security through compartmentalization has given me peace of mind, especially in today's digital landscape.
Qubes OS isolates applications and data into separate virtual environments, or "qubes," ensuring that if one qube is compromised, others remain safe. This feature is invaluable for protecting sensitive information
Despite its complex architecture, Qubes OS has become increasingly user-friendly with each release. The GUI unifies access to all qubes, making it easy to manage and switch between them.
The Qubes OS community is actively working on enhancing the user experience. From better device handling to improved GUI elements, each update brings noticeable improvem.
While Qubes OS may require some learning, it's surprisingly manageable for those without deep technical knowledge. The system's design ensures that you can start using it right away, with features like color-coded qubes helping to avoid mistakes
Conclusion
Qubes OS is not just for experts; it's a robust and secure operating system that anyone can use. Its unique security features combined with an improving user experience make it an excellent choice for those seeking enhanced protection without sacrificing usability. I highly recommend giving it a try if you're looking for a more secure computing environment.
I became interested in Qubes due to an interest in VMs and the desire to understand what it it was like to use a hypervisor. For me I can read about things all day long but until I actually attempt it myself I don't learn as much.
When starting with Qubes, after an unmemorable installation, I had issues with frequent disconnects with my USB WiFi connection which made Qubes unusable. The WiFi worked fine on other distributions and after reading the Qubes forums and increasing the RAM allocations in the USB and NET qubes, there have been no more disconnects, yay!
I'm running Qubes on an older Lenovo with SSD, 16G of RAM, and an intel video card and using it as my personal PC for now.
I really like being able to spin up a VM with a distro I want to try, I've created an hvm qube called distro-test just for this purpose and have successfully installed a distro, wiped it and then tested the live medium without installing on several other distros. Currenlty I'm running a distro on the waiting list, CuerdOS. It's interesting to me that I can run xorg with qubes and wayland in a VM with no issues.
I have installed Remmina for RDP and use it to remote into my Windows PC to run Eve online, I know it's possible to run Windows in a Qube container but there are so many updates to the Eve launcher I'm concerned I would be continually troubleshooting instead of playing the game to take the time to set it up.
For a window manager I'm currently running xfce but was please there is an option to use i3 as well that I can switch to once I'm more familiar with the command line qubes commands. I've really come to like the Pantheon window manager lately and may look into implementing that at some point but really I can make xfce look nice enough for my purposes.
For me the inter qube networking is a little strange. Each qube has it's own /32 IP with a shared gateway. I can understand how this would totally isolate traffic though so it works for this application. Each qube has it's own firewall settings but there is also a general firewall qube as well so everything looks secure by default from the networking perspective,
Anyway thanks/props to the Qubes developers for this excellent OS. I expect I will be using it often in the future. :)
I tried Qubes as an experiment expecting an unusable experience, but I came out realizing just how user friendly it is once you're used to the security minded quirks (took 2 months, been using for 4 months now).
There is a GUI for most everything, VM management is a breeze. Disposable VMs are seamless. Updating is a single three click GUI. The core functionality worked right out of the box. Installing APT packages required no extra effort. The performance is surprising and the storage space is minimal. 7 VM's and only 47GB total disk space used.
I ran into 3 issues so far. If the installation media is plugged into windows it gets corrupted (had to create using Linux). My laptop keyboard internally is USB (fixed by modifying Grub to allow USB during boot). I failed to get GPU passthrough working (Gaming is possible, but requires a lot of work).
You will need to follow the wiki or forum post instructions to handle some situations, but if you can follow instruction, Qubes is less intimidating than "The world's most secure operating system" makes it out to be.