Skip to main content

Qubes OS

A reasonably secure operating system
Qubes OS

Project Links

Qubes OS is a security-focused operating system that protects your digital life through compartmentalization. Rather than running everything in one shared space, it divides your computer into isolated virtual machines called "qubes"—think of them as separate, secure rooms. If malware infects your web browser, it stays trapped in that single qube and cannot access your email, files, or other applications.
qubesos-trustlevel-architecture
Most operating systems try to prevent every possible attack, but Qubes takes a different approach: it assumes compromises will happen and focuses on containing the damage. This means journalists, researchers, privacy advocates, and security-conscious professionals can use their computers with confidence, knowing that a breach in one area won't compromise everything else. Each qube displays with its own colored window border so you always know which environment you're working in.
My Contributions:
  • Bug Fix: Fixed a false-positive reboot prompt in Debian templates when using the dom0-provided kernel —
    's
    was comparing the running kernel against
    , which always differs in this configuration. Disabled
    via
    when dom0 kernel mode is active
    qubes-core-agent-linux #645
  • Feature: Added an optional comment/notes field to firewall rules in Qubes Manager, closing a feature request open since 2015 (issue #952). Comments are stored as metadata and don't affect firewall behavior; qubes-manager #447
  • Docs: Simplified and de-alarmed the Fedora and Debian template upgrade documentation, reducing friction for users who felt intimidated by the existing warning-heavy language
    qubes-doc #1662
  • Security Fix: Prevented
    from attaching devices to dom0 without an explicit
    flag, adding a safeguard against accidental attachment to the privileged domain. Implemented across both the core admin layer and the admin client CLI
    qubes-core-admin #798 · qubes-core-admin-client #466
  • Bug Fix / Consistency: Renamed
    to
    in
    for consistency, with matching documentation update
    qubes-mgmt-salt #45 · qubes-doc #1672