# Qubes OS
*A reasonably secure operating system*
https://www.qubes-os.org/
## Website
### [What is Qubes OS?](https://www.qubes-os.org/intro/)
Qubes OS is a free and open-source, security-oriented operating system for single-user desktop computing. Qubes OS leverages [Xen-based virtualization](https://wiki.xen.org/wiki/Xen_Project_Software_Overview) to allow for the creation and management of isolated compartments called [qubes](https://www.qubes-os.org/doc/glossary#qube).
These qubes, which are implemented as [virtual machines (VMs)](https://www.qubes-os.org/doc/glossary#vm), have specific:
- **Purposes:** with a predefined set of one or many isolated applications, for personal or professional projects, to manage the [network stack](https://www.qubes-os.org/doc/networking/), [the firewall](https://www.qubes-os.org/doc/firewall/), or to fulfill other user-defined purposes.
- **Natures:** [full-fledged](https://www.qubes-os.org/doc/standalone-and-hvm/) or [stripped-down](https://www.qubes-os.org/doc/getting-started/) virtual machines based on popular operating systems, such as [Fedora](https://www.qubes-os.org/doc/templates/fedora/), [Debian](https://www.qubes-os.org/doc/templates/debian/), and [Windows](https://www.qubes-os.org/doc/windows/).
- **Levels of trust:** from complete to non-existent. All windows are displayed in a unified desktop environment with [unforgeable colored window borders](https://www.qubes-os.org/doc/getting-started/) so that different security levels are easily identifiable.
![[Screen Shot 2022-02-12 at 11.51.09 PM.png]]
#### Features
- Strong isolation
- Template system
- Multiple operating systems
- Disposables
- Whonix integration
- Device isolation
- Split GPG
- U2F proxy
- Open-source