Idk if OP edited the post but they said the moved to Qubes which is a lot more secure than mint. - Source: Reddit / 2 months ago
So you could benefit from security by compartmentalization and start pirating, it seems. You may be interested in Qubes OS: https://qubes-os.org. Can't recommend it enough. - Source: Hacker News / 3 months ago
I use https://qubes-os.org and isolate projects plus nice security features. If you need any help and wanna go on a qubes-os adventure let me know! - Source: Reddit / 3 months ago
You should try qubes-os.org on this thing! - Source: Reddit / 3 months ago
Qubes OS [0], my daily driver. Give incredible feeling of security and control over your computer. Can't recommend enough. [0] https://qubes-os.org. - Source: Hacker News / 3 months ago
I would recommend you get qubes-os.org and use Whonix. - Source: Reddit / 3 months ago
There is also a long-term idea with Qubes OS of supporting seL4 as a secure kernel (although there are issues to fix first, some of which also make it clear just why seL4 sees few mention as far as desktops go right now - these are the practical issues I was mentioning). - Source: Reddit / 4 months ago
It is also available for optional use in Qubes, although it usually receives a preprocessed list from another tool. - Source: Reddit / 4 months ago
Then you might be interested in Qubes OS: https://qubes-os.org. - Source: Hacker News / 5 months ago
I hardened my Linux by installing https://qubes-os.org instead. My daily driver for years. - Source: Hacker News / 5 months ago
> Rust isn't the only game in town moving into safer lands. No, it's not. Only security through isolation is a viable approach, see https://qubes-os.org. - Source: Hacker News / 6 months ago
Here is what I think a modern OS should look like: https://qubes-os.org. - Source: Hacker News / 7 months ago
Qubes OS currently does something very similar with dmenu/rofi and launching programs in various qubes/VMs using i3-dmenu-desktop and autogenerated .desktop files in $XDG_DATA_HOME/applications/ (which should provide usable example Python code for coming up with your own setup). - Source: Reddit / 7 months ago
> It makes me sad that we are likely not going to see any new fundamental design rethink for security's sake in mainstream operating systems. Qubes OS has been available for many years: https://qubes-os.org. Can't recommend it enough. - Source: Hacker News / 8 months ago
Indeed, save for the case where you're also using VMs for your personal computing. But besides Qubes OS users and those who DIY'd the same before it existed, few people do that. - Source: Reddit / 8 months ago
This is my own personal config of Qubes OS. If you want I can try to make a how-to on replicating the setup. - Source: Reddit / 8 months ago
If you care about security, you should not rely on a perfect code. Consider compartmentalization instead: https://qubes-os.org. Works for me (or so I hope). - Source: Hacker News / 8 months ago
Good technology can be developed to fight surveillance in a reasonably convenient way. With time, it can attract enough people to make a change. See: https://qubes-os.org. - Source: Hacker News / 8 months ago
I'm using VMs for everything. Disposable, self-destructing VMs for untrusted browsing. Network VM solely for connecting to the Internet, Firewal VM for isolating the network from other parts of my system. Work VM for everything connected to work. Archive VM (with no networking) for storing important files. Banking VM for managing bank accounts. Zoom VM for isolating Zoom from the rest of my system. All this works... - Source: Hacker News / 9 months ago
> to reach a consensus on high-impact actions to take to improve the resiliency and security of open source software. I hope they will find https://qubes-os.org and support it. - Source: Hacker News / 10 months ago
You only need one machine running Qubes OS: https://qubes-os.org. Works for me. - Source: Hacker News / 11 months ago
Do you know an article comparing Qubes OS to other products?
Suggest a link to a post with product alternatives.