←back to thread

What Is Qubes OS?

(www.qubes-os.org)
224 points LinuxBender | 1 comments | | HN request time: 0.303s | source
Show context
neodymiumphish ◴[] No.32038239[source]
Maybe this isn't the best place to ask this, but I'll try anyway:

I'm a consultant involved in cybersecurity who often has to build and run VMs to either test out software, run things in sandbox, or connect to TOR from a VM I'll never use again.

Having said that, I currently use Windows with VMWare Workstation, but I find it frustrating and would prefer something that's less frustrating and feels more built-in.

Is there a solution that anyone would recommend for this kind of thing? Internal networks, Windows and Linux sandboxes, etc. I use Microsoft office products regularly, and my workstation (Dell Inspiron with an i9, 64GB ram, 2tb SSD) is connected to a thunderbolt 4 dock with 2 1440 monitors. I'd prefer for a Windows VM to have passthrough to the monitors and be able to interact with the host OS via that VM, so I can still share my screen during meetings and while coordinating efforts.

replies(4): >>32038449 #>>32038481 #>>32039430 #>>32039846 #
Dracophoenix ◴[] No.32038449[source]
I don't known of this works with all your criteria, but you might want to go with UnRaid or Proxmox or a Type 1 hypervisor like vSphere/ESXi or Xen.
replies(2): >>32038565 #>>32038596 #
tryauuum ◴[] No.32038596[source]
I don't get the distinction between type 1 and type 2.

E.g. xen is type 1 and KVM is type 2. But at the end of the day it's a Linux kernel in both cases that runs the virtual machines, so what's the point of distinction?

replies(2): >>32038704 #>>32038938 #
1. transpute ◴[] No.32038938[source]
It's about reducing the size and attack surface of the most-privileged code which runs in the system, e.g. moving code out of the kernel, making hypervisor/VMM smaller, nested VMs, hardware enclaves. This video covers some of the changes over the last decade, including Xen and Bromium, https://youtube.com/watch?v=bNVe2y34dnM