I've been extremely happy with my time with Qubes. The built-in Whonix integration is super useful, and it's nice to know I have a system where I can quickly spin up secure and/or private environments. I haven't found it usable as a daily-driver, and so I use it as a backup machine where I do anything that should go over Tor, for storing sensitive files, torrenting, banking, etc.
I wanted to add: Verifying the download if you use the torrent is less important. It's already validated by the torrent client and the protocol itself.
ya big naughty! :P that hidden log in screen - put "bootmngr is missing,press ctrl+alt+delete to restart your computer" or whatever the default is these days :D
qubes is an interesting build. Half tried it a few years ago (I was noob so I decided to run ubuntu in a vm...), but I wouldn't mind trying it when I get a new computer. crypto currency security needs... It is a really great idea.
Any computer is a testing device start with tails also its better to learn through hard ware and in person first rather vm network chuck and people like that are great but my highschool tech teacher once called ddr2 ram a ecu
I recently installed Qubes (R4.1.0), got it installed fine and the compartmentalization seemed to be working fine but it had graphical glitches/artifacts, followed the troubleshooting documentation and disabled desktop composition but the glitches/artifacts remained making it basically unusable or at least really not nice to use. I updated a kernel think it was dom0 kernel or the 'base vm' kernel but it didn't help, never used Xen before so kinda clueless as to how to update it. I'm guessing it's down to my relatively modern hardware, GPU pacifically (NAVI, rx5700)? Really wish it didn't use fedora, or at least gave the option of using Debian as base, I really dislike fedora (whenever I've used fedora I've had nothing but trouble with it, horrible OS, Debian based distros ftw). Kinda using my own makeshift 'Qubes' now with hardened Debian as host, a personal Debian kvm, a disposable Debian, a personal Whonix kvm and a live read only Whonix kvm, and a Kali kvm just for fun, essentially I just don't use the base OS and only the vm's; obviously no where near as secure as Qubes but it somewhat achieves the compartmentalization aspect of Qubes. Would love to have Qubes up and running perfectly though.
Guys please help. How can I restore default Panel 1 ? I mean menu bar. I accidentally removed it permanently and had to create my own but with another icons and looks not good.
Qubes, a mystery wrapped in an enigma wrapped. Why does she insist on using Fedora? So in addition to whatever Intel/AMD backdoors that she can't do anything about, she insists on having all of the backdoors and "unintentional" exploits of systemd?! Why? Even if systemd was not intended to be malicious from its inception, it's history has shown it has at least as many developmental issues as any other marge number of programs required to handle as many roles as systemd has taken away from other mature, debugged, well-proven programs. Hey, the wants us to replace the init system, and an ever-increasing list of other things as the cancer grows within, with this new, buggy as hell, monstrosity that attempts to do everything. Yeah, lets immediately adopt it everywhere so that every flavor of Linux will have the exact same vulnerabilities! I mean in addition to all the ones hidden in the kernel simply because it's so big that no one can possibly find all of them. Red Hat has never been anything other than a division of the government's Department of Linux. Where did the Master Control Program/Borg stable of Trojan horse originate? Well, if not Maryland, certainly from Red Hat. Why is that suspicious? Not only is the Red Hat link self-evident; but the credited developer recently went to work at Microsoft. Embrace, extend, extinguish? Can't call it anything else.
Wow i want what you’re smoking. Seriously I want to know more about Red Hat and the nefarious backdoors that most people refuse to think about. Could Intel/AMD really have backdoors built into the hardware? Could the basic Linux kernel really be too big to successfully audit? If thats true, then to avoid the alphabet-agencies one would have to construct a completely parallel infrastructure of computing all the way down to the basic hardware and an independent kernel. The only people with the resources to really pull this off are ironically also members of the overall deep st@te. Besides, the N S A is decades ahead in terms of computing. Im sure that ubiquitous backdoors for the deep st@te have existed in nearly every system since widespread commercialization. They probably have something spookier than quantum computing as well. Im pretty sure that intel chips would be simply one of many aspects of the supply chain that have been infiltrated or bought by the state. Gotta get way more paranoid honestly. The whole ecosystem of IT technology has been designed for war and infiltrated from the get-go. If one was actually trying to avoid the eyes of the state, again, one would require a parallel supply chain for every aspect of the hardware. This hardware would also have to be shielded from ‘physics-based attacks’ such as viral injection through RADAR. It would almost be better to invent a new ecosystem of computing that circumvents this, such as an underground or off-planet mechanical computer made of lead that doesn’t emit pressure waves.
Hey, Im new to the channel and appreciate the content so far. Confused about something I hear a lot. What is validating a download? How do you do it? And more importantly, why should I get the PGP key or hash value from the same site (or even the same page usually) I get the software from, if it is the software Im validating? If I cant trust the software then how can I trust the PGP key they offer or the hash value they give along with the software?
Verifying makes sure that what you download is what it is intended. Once, the Linux Mint website was hacked and malicious downloads of the OS were on there for a short time. If you validated the download, you would know something was wrong. You get the hash from the site because they give you a verification file and the file. They are the only ones who can do this. I have an old video on this topic that should still be good (I will be updating content soon). th-cam.com/video/gQ6iTiamVmw/w-d-xo.html
@@SwitchedtoLinux If the site had been hacked and the software supplanted with a malicious version, why wouldnt the hacker also replace the hash value displayed on the site? I just get the sense this isnt compartamentalized enough and we're putting the cart before the horse, in a sense. If you trust the site to give you the right hash value why dont we trust them to give us the right software too... Obviously if one can be perverted, so too can the other. It doesnt make sense to trust the same source to verify itself.
@@leesweets4110 the exact question you’re asking is actually on their installation site! Essentially, there’s a “master key” and a couple of other files you need to validate your download. These files are always the same. So, what they recommend doing is actually going to *different websites* and validating your download against the PGP key from various sources; if one isn’t matching, something may be wrong. Definitely take a read through their installation guide; they explore this in phenomenal detail!
I am watching your channel all the time, currently I stack with Qubes-R4.1.2-x86_64. Many times computer freezing, initial message while started installation was: Unsupported Hardware detected. Missing features: HVM/VT -x/AMD-V but this is related to virtualbox installation. I trying to install on my pc. My computer specification: CPU: AMD FX TM -8350 Eight-Core Processor Mainboard: M5A78L -M PLUS/USB3 Memory: 20GB Graphics: NIVIDIA GeForce GT 430. Would you possibly help me resolve such problems, currently I installed but after ignoring mentioned pre-installation message. Qubes not working properly.
Those missing features are required to run virtual machines. They are processor features that have to be enabled in the BIOS- if your processor is capable.
Good day. I'm glad I found this video ad thanks for the great job. I have been shadowboxing over sometime now trying to achieve something similar, I appreciate if you can help on this. I have HP EliteBook Core i5 8GB Ram, 256 SSD. Recently, I purchased a 5TB HHD I intend to dedicate 1.5TB of the space for QubesOS for the purpose of virtualization where I can have other operating systems such as Windows 11, Kali, Parrot and Android x89 installed, all running through QubesOS. Please is it possible I am able to achieve this with QubesOs? Also will I be able to manage the network configurations easily for remote Pentesting purpose? If yes, please how can I achieve this? At the moment I have already installed my QubesOS on the intended 1.5 partition of my 5TB external HDD but I am having problem connecting my QubesOS to the internet using my android USB tethering. It connects easily on my parrotOS installed on my other computer but I can't get it fixed on QubesOS. I hope you can help me to get this resolved. Thanks.
I don't use VPN's so I already know They won't find me. . . anyone whose trying to be Secure knows the second you ever Try That, that they are now Tracking you.
@@methamphetamememcmeth3422 - We are, just basically, a Video Podcast Group - set up for Hospital Nursing Feeds on Updates in Techniques and Surgery Do's and Don't Weekly. . Sometimes Live Surgical Feed ( which I .. just can't view w/o getting sick! )
That seems pretty ridiculous. There are millions and millions of people who use VPNs every day for mundane stuff including connecting to corporate offices. Even TryHackMe and HackTheBox have helped scrub the activity of OpenVPN by having a few million users from all over the world do classroom activities via the connection. Accessing tor using your ISP DNS is definitely way more sus than simply creating a VPN tunnel
It is not designed to be easy to use; it is designed to be highly secure. Yes, it will find a wireless card on a Mac, but you will need to enable it in the hardware manager.
Like the new beardless look!
I've been extremely happy with my time with Qubes. The built-in Whonix integration is super useful, and it's nice to know I have a system where I can quickly spin up secure and/or private environments. I haven't found it usable as a daily-driver, and so I use it as a backup machine where I do anything that should go over Tor, for storing sensitive files, torrenting, banking, etc.
I wanted to add: Verifying the download if you use the torrent is less important. It's already validated by the torrent client and the protocol itself.
did you post this using whonix or standard browser?
ya big naughty! :P
that hidden log in screen - put "bootmngr is missing,press ctrl+alt+delete to restart your computer" or whatever the default is these days :D
qubes is an interesting build. Half tried it a few years ago (I was noob so I decided to run ubuntu in a vm...), but I wouldn't mind trying it when I get a new computer. crypto currency security needs... It is a really great idea.
Any computer is a testing device start with tails also its better to learn through hard ware and in person first rather vm network chuck and people like that are great but my highschool tech teacher once called ddr2 ram a ecu
4:37 got them to use what?
I recently installed Qubes (R4.1.0), got it installed fine and the compartmentalization seemed to be working fine but it had graphical glitches/artifacts, followed the troubleshooting documentation and disabled desktop composition but the glitches/artifacts remained making it basically unusable or at least really not nice to use. I updated a kernel think it was dom0 kernel or the 'base vm' kernel but it didn't help, never used Xen before so kinda clueless as to how to update it. I'm guessing it's down to my relatively modern hardware, GPU pacifically (NAVI, rx5700)? Really wish it didn't use fedora, or at least gave the option of using Debian as base, I really dislike fedora (whenever I've used fedora I've had nothing but trouble with it, horrible OS, Debian based distros ftw).
Kinda using my own makeshift 'Qubes' now with hardened Debian as host, a personal Debian kvm, a disposable Debian, a personal Whonix kvm and a live read only Whonix kvm, and a Kali kvm just for fun, essentially I just don't use the base OS and only the vm's; obviously no where near as secure as Qubes but it somewhat achieves the compartmentalization aspect of Qubes. Would love to have Qubes up and running perfectly though.
Guys please help. How can I restore default Panel 1 ? I mean menu bar. I accidentally removed it permanently and had to create my own but with another icons and looks not good.
Qubes, a mystery wrapped in an enigma wrapped. Why does she insist on using Fedora? So in addition to whatever Intel/AMD backdoors that she can't do anything about, she insists on having all of the backdoors and "unintentional" exploits of systemd?! Why? Even if systemd was not intended to be malicious from its inception, it's history has shown it has at least as many developmental issues as any other marge number of programs required to handle as many roles as systemd has taken away from other mature, debugged, well-proven programs.
Hey, the wants us to replace the init system, and an ever-increasing list of other things as the cancer grows within, with this new, buggy as hell, monstrosity that attempts to do everything. Yeah, lets immediately adopt it everywhere so that every flavor of Linux will have the exact same vulnerabilities! I mean in addition to all the ones hidden in the kernel simply because it's so big that no one can possibly find all of them.
Red Hat has never been anything other than a division of the government's Department of Linux. Where did the Master Control Program/Borg stable of Trojan horse originate? Well, if not Maryland, certainly from Red Hat. Why is that suspicious? Not only is the Red Hat link self-evident; but the credited developer recently went to work at Microsoft. Embrace, extend, extinguish? Can't call it anything else.
Wow i want what you’re smoking. Seriously I want to know more about Red Hat and the nefarious backdoors that most people refuse to think about. Could Intel/AMD really have backdoors built into the hardware? Could the basic Linux kernel really be too big to successfully audit? If thats true, then to avoid the alphabet-agencies one would have to construct a completely parallel infrastructure of computing all the way down to the basic hardware and an independent kernel. The only people with the resources to really pull this off are ironically also members of the overall deep st@te.
Besides, the N S A is decades ahead in terms of computing. Im sure that ubiquitous backdoors for the deep st@te have existed in nearly every system since widespread commercialization. They probably have something spookier than quantum computing as well. Im pretty sure that intel chips would be simply one of many aspects of the supply chain that have been infiltrated or bought by the state.
Gotta get way more paranoid honestly. The whole ecosystem of IT technology has been designed for war and infiltrated from the get-go. If one was actually trying to avoid the eyes of the state, again, one would require a parallel supply chain for every aspect of the hardware. This hardware would also have to be shielded from ‘physics-based attacks’ such as viral injection through RADAR. It would almost be better to invent a new ecosystem of computing that circumvents this, such as an underground or off-planet mechanical computer made of lead that doesn’t emit pressure waves.
Hey, Im new to the channel and appreciate the content so far. Confused about something I hear a lot. What is validating a download? How do you do it? And more importantly, why should I get the PGP key or hash value from the same site (or even the same page usually) I get the software from, if it is the software Im validating? If I cant trust the software then how can I trust the PGP key they offer or the hash value they give along with the software?
Verifying makes sure that what you download is what it is intended. Once, the Linux Mint website was hacked and malicious downloads of the OS were on there for a short time. If you validated the download, you would know something was wrong.
You get the hash from the site because they give you a verification file and the file. They are the only ones who can do this.
I have an old video on this topic that should still be good (I will be updating content soon).
th-cam.com/video/gQ6iTiamVmw/w-d-xo.html
@@SwitchedtoLinux If the site had been hacked and the software supplanted with a malicious version, why wouldnt the hacker also replace the hash value displayed on the site?
I just get the sense this isnt compartamentalized enough and we're putting the cart before the horse, in a sense. If you trust the site to give you the right hash value why dont we trust them to give us the right software too... Obviously if one can be perverted, so too can the other. It doesnt make sense to trust the same source to verify itself.
@@leesweets4110 the exact question you’re asking is actually on their installation site! Essentially, there’s a “master key” and a couple of other files you need to validate your download. These files are always the same. So, what they recommend doing is actually going to *different websites* and validating your download against the PGP key from various sources; if one isn’t matching, something may be wrong. Definitely take a read through their installation guide; they explore this in phenomenal detail!
You go Tom!
I am watching your channel all the time, currently I stack with Qubes-R4.1.2-x86_64. Many times computer freezing, initial message while started installation was: Unsupported Hardware detected.
Missing features: HVM/VT -x/AMD-V but this is related to virtualbox installation. I trying to install on my pc.
My computer specification:
CPU: AMD FX TM -8350 Eight-Core Processor
Mainboard: M5A78L -M PLUS/USB3
Memory: 20GB
Graphics: NIVIDIA GeForce GT 430.
Would you possibly help me resolve such problems, currently I installed but after ignoring mentioned pre-installation message. Qubes not working properly.
Those missing features are required to run virtual machines. They are processor features that have to be enabled in the BIOS- if your processor is capable.
Good day. I'm glad I found this video ad thanks for the great job. I have been shadowboxing over sometime now trying to achieve something similar, I appreciate if you can help on this. I have HP EliteBook Core i5 8GB Ram, 256 SSD. Recently, I purchased a 5TB HHD I intend to dedicate 1.5TB of the space for QubesOS for the purpose of virtualization where I can have other operating systems such as Windows 11, Kali, Parrot and Android x89 installed, all running through QubesOS. Please is it possible I am able to achieve this with QubesOs? Also will I be able to manage the network configurations easily for remote Pentesting purpose? If yes, please how can I achieve this?
At the moment I have already installed my QubesOS on the intended 1.5 partition of my 5TB external HDD but I am having problem connecting my QubesOS to the internet using my android USB tethering. It connects easily on my parrotOS installed on my other computer but I can't get it fixed on QubesOS. I hope you can help me to get this resolved. Thanks.
I have the same question, can I run the Barrot system on the Qubes system?
its my first time touching linux and started with qubes right away... i hope i can handle it
How'd it go?
Run qubes inside of qubes inside of qubes inside of qubes inside of qubes inside of qubes...
Qubeception....
Where's the beard????
I don't use VPN's so I already know They won't find me.
. . anyone whose trying to be Secure knows the second you ever Try That, that they are now Tracking you.
So they're constantly tracking at least 4 billion people? Why? And who are THEY? You aren't selling nukes on the Dark Web, are you?
@@methamphetamememcmeth3422 - We are, just basically, a Video Podcast Group - set up for Hospital Nursing Feeds on Updates in Techniques and Surgery Do's and Don't Weekly.
. Sometimes Live Surgical Feed ( which I .. just can't view w/o getting sick! )
That seems pretty ridiculous. There are millions and millions of people who use VPNs every day for mundane stuff including connecting to corporate offices. Even TryHackMe and HackTheBox have helped scrub the activity of OpenVPN by having a few million users from all over the world do classroom activities via the connection.
Accessing tor using your ISP DNS is definitely way more sus than simply creating a VPN tunnel
Don't download Qubes OS or Tails without using a VPN
2:56 christian?
th-cam.com/users/ourwalkinchrist
Difficult to use, unusable via Macbook air and cannot identify wifi card. shame
It is not designed to be easy to use; it is designed to be highly secure. Yes, it will find a wireless card on a Mac, but you will need to enable it in the hardware manager.
Seems to be free-there is no free lunch! So u pay in other ways..........
I feel like knowledge of hypervisors would make this system vulnerable but I'm a newb I'm just assuming