# Qubes OS *A reasonably secure operating system* https://www.qubes-os.org/ ## Website ### [What is Qubes OS?](https://www.qubes-os.org/intro/) Qubes OS is a free and open-source, security-oriented operating system for single-user desktop computing. Qubes OS leverages [Xen-based virtualization](https://wiki.xen.org/wiki/Xen_Project_Software_Overview) to allow for the creation and management of isolated compartments called [qubes](https://www.qubes-os.org/doc/glossary#qube). These qubes, which are implemented as [virtual machines (VMs)](https://www.qubes-os.org/doc/glossary#vm), have specific: - **Purposes:** with a predefined set of one or many isolated applications, for personal or professional projects, to manage the [network stack](https://www.qubes-os.org/doc/networking/), [the firewall](https://www.qubes-os.org/doc/firewall/), or to fulfill other user-defined purposes. - **Natures:** [full-fledged](https://www.qubes-os.org/doc/standalone-and-hvm/) or [stripped-down](https://www.qubes-os.org/doc/getting-started/) virtual machines based on popular operating systems, such as [Fedora](https://www.qubes-os.org/doc/templates/fedora/), [Debian](https://www.qubes-os.org/doc/templates/debian/), and [Windows](https://www.qubes-os.org/doc/windows/). - **Levels of trust:** from complete to non-existent. All windows are displayed in a unified desktop environment with [unforgeable colored window borders](https://www.qubes-os.org/doc/getting-started/) so that different security levels are easily identifiable. ![[Screen Shot 2022-02-12 at 11.51.09 PM.png]] #### Features - Strong isolation - Template system - Multiple operating systems - Disposables - Whonix integration - Device isolation - Split GPG - U2F proxy - Open-source