<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://lug.mtu.edu/w/index.php?action=history&amp;feed=atom&amp;title=Minutes_2026-02-19</id>
	<title>Minutes 2026-02-19 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://lug.mtu.edu/w/index.php?action=history&amp;feed=atom&amp;title=Minutes_2026-02-19"/>
	<link rel="alternate" type="text/html" href="https://lug.mtu.edu/w/index.php?title=Minutes_2026-02-19&amp;action=history"/>
	<updated>2026-04-06T15:28:16Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.39.10</generator>
	<entry>
		<id>https://lug.mtu.edu/w/index.php?title=Minutes_2026-02-19&amp;diff=8083&amp;oldid=prev</id>
		<title>Freya: Created page with &quot;=Meeting Minutes 2026-02-19= Qubes presentation by Simone  * Traditional OS security is not ideal ** No isolation by default ** Assumes trusted kernel ** Only one compromised app can take over the system ** Easy lateral movement for hacks * Qubes: ** Type 1 hypervisor as desktop OS ** Everything is isolated in VMs ** 1 VM per ** This contains compromised apps within the part of the system they are used on ** Based on Xen hypervisor * Architecture: ** Xen hypervisor, hard...&quot;</title>
		<link rel="alternate" type="text/html" href="https://lug.mtu.edu/w/index.php?title=Minutes_2026-02-19&amp;diff=8083&amp;oldid=prev"/>
		<updated>2026-02-20T00:41:15Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;=Meeting Minutes 2026-02-19= Qubes presentation by Simone  * Traditional OS security is not ideal ** No isolation by default ** Assumes trusted kernel ** Only one compromised app can take over the system ** Easy lateral movement for hacks * Qubes: ** Type 1 hypervisor as desktop OS ** Everything is isolated in VMs ** 1 VM per ** This contains compromised apps within the part of the system they are used on ** Based on Xen hypervisor * Architecture: ** Xen hypervisor, hard...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;=Meeting Minutes 2026-02-19=&lt;br /&gt;
Qubes presentation by Simone&lt;br /&gt;
&lt;br /&gt;
* Traditional OS security is not ideal&lt;br /&gt;
** No isolation by default&lt;br /&gt;
** Assumes trusted kernel&lt;br /&gt;
** Only one compromised app can take over the system&lt;br /&gt;
** Easy lateral movement for hacks&lt;br /&gt;
* Qubes:&lt;br /&gt;
** Type 1 hypervisor as desktop OS&lt;br /&gt;
** Everything is isolated in VMs&lt;br /&gt;
** 1 VM per&lt;br /&gt;
** This contains compromised apps within the part of the system they are used on&lt;br /&gt;
** Based on Xen hypervisor&lt;br /&gt;
* Architecture:&lt;br /&gt;
** Xen hypervisor, hardened&lt;br /&gt;
** Dom0: management VM&lt;br /&gt;
** DomU: unpriveleged VMs&lt;br /&gt;
* Dom0:&lt;br /&gt;
** NOT HOST&lt;br /&gt;
** Priveleged&lt;br /&gt;
** Gets most hardware by default&lt;br /&gt;
** Window Manager/GUI is in Dom0&lt;br /&gt;
** No networking&lt;br /&gt;
** Enforces color coding on&lt;br /&gt;
* AppVMs:&lt;br /&gt;
** Unpriveleged&lt;br /&gt;
** Usually Debian or Fedora&lt;br /&gt;
** Runs user applications&lt;br /&gt;
** Video sent to Dom0&lt;br /&gt;
** Input sent from Dom0&lt;br /&gt;
** Stateless by default: /home persists but root filesystem doesn&amp;#039;t&lt;br /&gt;
* TemplateVMs:&lt;br /&gt;
** Snapshot-based templates&lt;br /&gt;
** Contains installed packages&lt;br /&gt;
** No direct internet access (update by proxy, updates all AppVMs)&lt;br /&gt;
* DisposableVMs:&lt;br /&gt;
** Similar to AppVms, but self-destructs&lt;br /&gt;
** Useful for viewing untrusted files or sites&lt;br /&gt;
** Also useful to get a fresh environment&lt;br /&gt;
** Automatic creation and deletion&lt;br /&gt;
* Virtualization:&lt;br /&gt;
** PVH by default&lt;br /&gt;
** Can be fully virtualized (FVH) as an option&lt;br /&gt;
** Qubes Windows Tools (QWT) to work with Windows better&lt;br /&gt;
** Can use any OS&lt;br /&gt;
* Networking:&lt;br /&gt;
** Dedicated VM for network&lt;br /&gt;
** Hardware passthrough&lt;br /&gt;
** Firewall is between AppVMs and hardware&lt;br /&gt;
** Impossible to sniff network activity from the VMs&lt;br /&gt;
* Peripherals:&lt;br /&gt;
** Dedicated USB VM&lt;br /&gt;
** Can forward USB devices to Qubes&lt;br /&gt;
** Isolates malicious USBs&lt;br /&gt;
*** Can spin up a disposable VM to investigate&lt;br /&gt;
** Audio/Bluetooth have similar systems&lt;br /&gt;
* GUI:&lt;br /&gt;
** Each VM renders own windows&lt;br /&gt;
** Dom0 composites video together&lt;br /&gt;
** Per-VM color coding (makes popups harder to fall for)&lt;br /&gt;
** Each VM has an emulated GPU&lt;br /&gt;
** Anything that requires a real GPU will need hardware passthrough&lt;br /&gt;
* VM Communication:&lt;br /&gt;
** qrexec lets Dom0 control VMs&lt;br /&gt;
** &amp;amp;quot;Send to Qube&amp;amp;quot; to share files between VMs&lt;br /&gt;
** &amp;amp;quot;Open URL in Qube&amp;amp;quot;&lt;br /&gt;
* Whonix/TOR:&lt;br /&gt;
** Whonix is built into Qubes OS&lt;br /&gt;
** Whonix runs everything only through TOR&lt;br /&gt;
*** Really slow&lt;br /&gt;
** Whonix-gateway: runs TOR only&lt;br /&gt;
** Whonix-workstation: routes traffic through gateway, disposable&lt;br /&gt;
* Updates/Trust:&lt;br /&gt;
** sys-whonix: updates over TOR&lt;br /&gt;
** sys-net: updates everything else, managed by Dom0&lt;br /&gt;
* Performance:&lt;br /&gt;
** So many VMs has a cost&lt;br /&gt;
** Most VMs are idle, and Xen reallocates unused memmory&lt;br /&gt;
** Overhead with CPU performance, RAM, and I/O&lt;br /&gt;
** Recommended at elast 32GB RAM, and an SSD&lt;br /&gt;
** Requires hardware virtualization (VT-x/VT-d, AMD-V, IOMMU)&lt;br /&gt;
** Qubes in VM is unsupported&lt;br /&gt;
&lt;br /&gt;
* Useful for journalists, developers, and the paranoid&lt;br /&gt;
* Reduces risk&lt;br /&gt;
* Trains visual/habitual security&lt;br /&gt;
&lt;br /&gt;
* NOT FOR BEGINNERS&lt;br /&gt;
* Not meant for games&lt;br /&gt;
* Firmware malware still a problem&lt;br /&gt;
* Annoying and takes a lot of work to run&lt;br /&gt;
&lt;br /&gt;
* Demo:&lt;br /&gt;
** Lots of VMs on the system&lt;br /&gt;
** VMs for:&lt;br /&gt;
*** Discord&lt;br /&gt;
*** Work&lt;br /&gt;
*** Personal&lt;br /&gt;
*** Vault&lt;br /&gt;
*** Untrusted&lt;br /&gt;
*** USB devices&lt;br /&gt;
*** Firewall&lt;br /&gt;
** Disposable VM can be created to inspect a USB safely&lt;br /&gt;
*** Popups, other sneaky things are both isolated and easy to see&lt;br /&gt;
** All Qubes can be seen on the Qube Manager&lt;/div&gt;</summary>
		<author><name>Freya</name></author>
	</entry>
</feed>