The fedora 27 images can easily reach 5Gb of use under heavy load, but in gneneral I have pretty good performances and I usually have a couple of throwaway VMs and the main work VM running and dealing with web, co pilations of various sort and editing.
A little while ago I upgraded my desktop and I now have an 8-core Ryzen 7 1700 (that's 16 threads!) and 32 GB of RAM. I installed Kubuntu on it after the first few results on Google suggested Ubuntu would let me install and use the proprietary drivers for the graphics card that I bought; a GeForce 1060 GTX with 6GB VRAM.
Ubuntu is one of my least favorite distros but the promise of easy setup of Nvidia drivers combined with knowing that a lot of third-parties have Ubuntu quite high up on the list of distros they try and support with their software made me pick Ubuntu (well Kubuntu but it's almost the same except at least I get a Desktop that I think is nice).
Kubuntu works pretty well. Not perfectly but tbh nothing ever really does. One thing that I find particularly annoying though is that the computer freezes on boot when I enter the Full-Disk Encryption key unless I boot it in recovery mode. It became this way after I installed the proprietary Nvidia drivers and because the regular boot FDE key input is graphical whereas the recovery mode boot is text only at the FDE key input stage I think it is related to the Nvidia driver. So not even the thing that primarily made me choose Ubuntu works quite as well as I'd hoped. There is one graphical glitch that occurs while I'm on my desktop also but anyway like I said there will always be some problems, and I won't go into too much detail. Primarily I just wanted to point out that things aren't perfect currently so Qubes OS need not be perfect either.
Probably a lot of people on HN have work stations that are even nicer than this but for me this is such a monumental step up from the computers I have used to have that it feels like I am sitting in front of a TOP500 Supercomputer that somehow everyone else that had access forgot about and so I am left with being able to use it all by myself :P
Here are some of the things that my computer can do and that I enjoy being able to do;
- Run the most recent stable release of Blender (they add awesome new features every now and then that are really useful) - Play video games from Steam and capture my desktop with OBS Studio while doing so. - Use Spotify. - Use Firefox.
Bunch of other things as well.
Anyhow, I was wondering, can I easily install and use the proprietary Nvidia drivers with Qubes OS? Can I play video games from Steam, make use of the CUDA cores for Blender etc, record my desktop with OBS Studio,
Because if so then sign me the heck up :) I would love to run the web browser in isolation for example. Perhaps even have different "cubes" like for example have the web browser that I log into my online bank be separate from everything else, have the browser where I log into YouTube be separate so I can be signed into Google while not being tracked as much across other sites at the same time, separate cube for Reddit, separate cube for HN. Not too many separate cubes but something like that. Speaking of which did anyone set up firewall rules for this kind of separation so that you don't accidentally visit sites outside of YouTube in the YouTube-dedicated browser etc?
But yeah first and foremost I would like to know about Blender and Spotify and Steam and OBS Studio with Qubes OS. Also, full disk encryption and LVM volume groups. How about ZFS? And what kind of guests can run? Can I run FreeBSD guests? I have a lot more questions too I think but I can't think of them all right now and besides too many questions lead to none or just a few getting answered anyway.
I made my GTX980 work on Arch, and tried on Qubes, but Qubes itself was too unstable for my daily driver, so I never got it complete.
I've been wanting to try this out on my X1, but there isn't really any nuance when it comes to guides for it. Just a list of problems and what does and doesn't work.
It was my impression that part of the point was also to isolate programs from one-another in case one of them is compromised. I may be mistaken in my understanding, but if Qubes OS did that then that is a good reason for me if I could for example isolate Steam and all of the proprietary games from the rest of my computer. Likewise with the isolating the environments that I visit different sites from.
> Steam is best kept on Windows because it would be pretty obvious since *you're connecting to your Steam account and you would lose the privacy from it.
I don't run Windows.
> Linux is also not the best environment for your video card, either, because nVidia doesn't have open-source drivers available. Now, yes, there are drivers available for some version of Linux, but they are generally close-source and very likely not the best for privacy reasons.
Proprietary drivers on Linux are still better than proprietary drivers on an OS that is also proprietary. Besides I plain don't like the Windows experience. I use Windows on my work computer because I have to but I will not use in on my private computers (aside from occasionally in a VM for some purpose or other).
Anyway, a sibling to your comment told me that Qubes OS does not have official GPU support so I guess it's not for me sadly.
Anyone have any insider ETA or recommendations? Prefer a practical/reliable laptop over some expensive racehorse.
What laptop does Snowden use?
With a standard Linux system you have vulnerabilities X,Y,Z. With Qubes you have vulnerability X, so let's comment on Qubes and try to discourage people from using it because vulnerability X still exists? It's still better than the alternative!
Something that we haven’t seen that we need to see is a greater hardening of the overall kernels of every operating system through things like grsecurity [a set of patches to improve Linux security], but unfortunately there’s a big usability gap between the capabilities that are out there, that are possible, and what is attainable for the average user."
https://theintercept.com/2015/11/12/edward-snowden-explains-...
Just plug your device and mount it into one of your VM. Really user friendly :-)
If the ring architecture of processor can be circumvented, the protection of privileged code (kernel) is harmed. If you can circumvent the MMU's memory protection, the protection of privileged code is harmed. And if side channel attacks like Spectre and Meltdown are circumventing protecting features, the protection of sensitive data is harmed.
Every systems which has claims on security relies on explicit (that would be better) or implicit assumptions. And every operating systems I know of, at least implicitly assumes that the hardware isn't compromised.
Qubes is marketed as a VM for the "intermediate IT professional," i.e one that can setup a server from scratch and mess with configuration settings, even compile everything he needs from scratch, but not be able to make the informed decisions needed to harden things by himself.
So, this IT professional could install his own VM, set it up to sandbox his connections and programs, after reading documents and how-tos.
The benefits for bespoke:
1). Known toolset
This is pretty common in the "real world," where most would take a tool they're familiar with, than one they're not. In this case it would be the Linux environment. Why? Because the IT professional is already aware of the possible holes that he may need to fill and how to do it "correctly." I'm sure we all have had the experience of trying a new technology, messing up our first attempts at something decent, but then being able to make something good after practice. This is the same here. If you already know Qubes, great. If you don't and you're thinking about using it for your next project, make sure that project isn't mission critical.
2). Better documentation
Qubes OS is laughably under-documented (to parrot someone else's wording). With this comes the inability to be as flexible with the massivley-documented *BSD/Linux environment, limiting your overall productivity, and likewise, security and privacy. This also means you won't know where possible holes could develop, stemming from how the sandboxing really works in RT. This is a mostly solved problem with Unixes. You can harden your setup easily and with confidence, knowing you'll only be hit by massive zero days, if it all. With Qubes, you just don't know. Segue:
3). Qubes isn't battle-tested
The Xen debacle showed this. While Linux is not secure in any sense, we know where those insecurities lie through decades of use and misuse. This isn't the case for Qubes, which has been around less than Android.
4). Xen
Qubes uses stock Xen, which is not terribly good for security (direct access to hardware? What are you doing!?). You could better security by compiling your own version of Xen and removing all of the "niceties" that make Qubes not horrible to use. Or better yet, get a better hypervisor that's made for security in mind.
5). "A reasonably secure operating system"
Need I say more?