Qubes OS
A reasonably secure operating system
Tech Stack :

Project Links
Qubes OS is a security-focused operating system that protects your digital life through compartmentalization. Rather than running everything in one shared space, it divides your computer into isolated virtual machines called "qubes"—think of them as separate, secure rooms. If malware infects your web browser, it stays trapped in that single qube and cannot access your email, files, or other applications.

Most operating systems try to prevent every possible attack, but Qubes takes a different approach: it assumes compromises will happen and focuses on containing the damage. This means journalists, researchers, privacy advocates, and security-conscious professionals can use their computers with confidence, knowing that a breach in one area won't compromise everything else. Each qube displays with its own colored window border so you always know which environment you're working in.
My Contributions:
-
Bug Fix: Fixed a false-positive reboot prompt in Debian templates when using the dom0-provided kernel — 's was comparing the running kernel against , which always differs in this configuration. Disabled via when dom0 kernel mode is active
qubes-core-agent-linux #645 -
Feature: Added an optional comment/notes field to firewall rules in Qubes Manager, closing a feature request open since 2015 (issue #952). Comments are stored as metadata and don't affect firewall behavior; qubes-manager #447
-
Docs: Simplified and de-alarmed the Fedora and Debian template upgrade documentation, reducing friction for users who felt intimidated by the existing warning-heavy language
qubes-doc #1662 -
Security Fix: Prevented from attaching devices to dom0 without an explicit flag, adding a safeguard against accidental attachment to the privileged domain. Implemented across both the core admin layer and the admin client CLI
qubes-core-admin #798 · qubes-core-admin-client #466 -
Bug Fix / Consistency: Renamed to in for consistency, with matching documentation update
qubes-mgmt-salt #45 · qubes-doc #1672
