---
layout: default1
description: A page containing various information related to QubesOS
title: Qubes OS
permalink: /qubes
---
A collection of Qubes OS-related information.
Website: [https://qubes-os.org](https://qubes-os.org)
#### Table of contents:
-\>> [Best Practices](#best-practices)
-\>> [Template Setup](#template-setup)
- -\> *[Debian](#debian)*
- -\> *[Security](#debian-security)*
- -\> *[Fedora](#fedora)*
- -\> *[Upgrading Fedora](#upgrading-fedora)*
- -\> *[Whonix](#whonix)*
-\>> [Links & Resources](#links--resources)
- -\> *[Customizations](#customizations)*
- -\> *[Guides](#guides)*
- -\> *[Templates](#templates)*
- -\> *[Wiki](#wiki)*
### Best Practices
- All repositories should be routed over Tor and [onionized](https://anonymousland.org/#onionizing-repositories)
- Each application should be installed in its own separate minimal template Qube (provided your system has applicable resources for such)
- `sys-usb` should be configured on a laptop
- Avoid using `sleep` on a Qubes system
- Read all of the Qubes documentation
- Frequently visit the Qubes forums
- Consider creating a shutdown script / shortcut
- Consider if you would benefit by creating backups of your Qubes system
- Update frequently
- Harden Qubes if applicable (Debian kicksecure, Fedora CORP hardened-malloc, etc.)
- Setup a bios password along with a power-on password
- Use an SSD for the Qubes system
### Template Setup
Small notes for template setup
#### Debian
Running in Dom0:
```
sudo qubes-dom0-update qubes-template-debian-11-minimal
```
```
qvm-run --pass-io -u root template-debian-11-minimal 'apt instal qubes-core-agent-passwordless-root'
```
Running inside the template:
```
sudo apt update
```
Installing packages
```
sudo apt install qubes-core-agent-dom0-updates qubes-usb-proxy qubes-gpg-split qubes-core-agent-networking git apt-transport-tor curl
```
Configuring git proxy
```
git config --global http.proxy http://127.0.0.1:8082/
```
#### Debian Security
```
sudo apt-get install grub2 qubes-kernel-vm-support
```
```
sudo apt-get -t bullseye-backports --no-install-recommends install linux-image-amd64 linux-headers-amd64
```
```
sudo grub-install /dev/xvda
```
Adding the Kicksecure repository:
```
curl --proxy http://127.0.0.1:8082/ --tlsv1.3 --proto =https --max-time 180 --output ~/derivative.asc https://www.kicksecure.com/derivative.asc
```
```
sudo cp ~/derivative.asc /usr/share/keyrings/derivative.asc
```
```
echo "deb [signed-by=/usr/share/keyrings/derivative.asc] tor+http://deb.w5j6stm77zs6652pgsij4awcjeel3eco7kvipheu6mtr623eyyehj4yd.onion bullseye main contrib non-free" | sudo tee /etc/apt/sources.list.d/derivative.list
```
Installing Kicksecure package:
``kicksecure-qubes-cli`` and ``kicksecure-qubes-gui`` are available.
```
sudo apt install --no-install-recommends kicksecure-qubes-cli
```
Installing LKRG:
```
sudo apt install --no-install-recommends lkrg-dkms
```
Enabling Hardened Malloc:
```
echo "/usr/lib/libhardened_malloc.so/libhardened_malloc.so" | sudo tee /etc/ld.so.preload
```
#### Fedora
Running in Dom0:
```
sudo qubes-dom0-update qubes-template-fedora-36-minimal
```
```
qvm-run --pass-io -u root template-fedora-36-minimal 'apt instal qubes-core-agent-passwordless-root'
```
Running inside the template:
```
sudo dnf update
```
Installing packages
```
sudo dnf install qubes-core-agent-passwordless-root qubes-core-agent-dom0-updates qubes-usb-proxy qubes-gpg-split qubes-core-agent-networking git
```
Configuring git proxy
```
git config --global http.proxy http://127.0.0.1:8082/
```
#### Upgrading Fedora
Running in Dom0:
```
qvm-clone fedora-35 fedora-36
```
```
truncate -s 5GB /var/tmp/template-upgrade-cache.img
```
```
qvm-run -a fedora-36 gnome-terminal
```
```
dev=$(sudo losetup -f --show /var/tmp/template-upgrade-cache.img)
```
```
qvm-block attach fedora-36 dom0:${dev##*/}
```
Running inside Fedora-36:
```
sudo mkfs.ext4 /dev/xvdi
```
```
sudo mount /dev/xvdi /mnt/removable
```
```
sudo dnf clean all
```
```
sudo dnf --releasever=36--setopt=cachedir=/mnt/removable --best --allowerasing distro-sync
```
Running inside Dom0:
```
qvm-shutdown fedora-36
```
```
sudo losetup -d $dev
```
```
rm /var/tmp/template-upgrade-cache.img
```
#### Whonix
Whonix-GW and Whonix-WS should be upgraded via:
```
upgrade-nonroot
```
Installing LKRG:
```
sudo apt install --no-install-recommends lkrg-dkms
```
Enabling Hardened Malloc:
```
echo "/usr/lib/libhardened_malloc.so/libhardened_malloc.so" | sudo tee /etc/ld.so.preload
```
### Links & Resources
- [qpowerkill](https://github.com/NobodySpecial256/qpowerkill)
- [Qubes for security auditing](https://forum.qubes-os.org/t/qubes-for-organizational-security-auditing-talk-notes/199)
- [Qubes-lite with KVM and Wayland](https://roscidus.com/blog/blog/2021/03/07/qubes-lite-with-kvm-and-wayland/)
#### Customizations
- [Wallpapers](https://forum.qubes-os.org/t/qubes-os-wallpapers/2819)
- [KDE](https://forum.qubes-os.org/t/kde-changing-the-way-you-use-qubes/4730)
- [XFCE Global Dark Mode](https://forum.qubes-os.org/t/guide-xfce-global-dark-mode-in-qubes-4-0-4-1/10757)
#### Guides
- [Advanced Browser Fingerprinting](https://forum.qubes-os.org/t/advanced-browser-fingerprinting/12379)
- [Monero Wallet Isolation](https://forum.qubes-os.org/t/monero-wallet-daemon-isolation-with-qubes-whonix/1121)
- [Fom’s giant list of Qubes OS workarounds, tweaks and shenanigans](https://forum.qubes-os.org/t/fom-s-giant-list-of-qubes-os-workarounds-tweaks-and-shenanigans/15162)
- [Fully ephemeral dispvms](https://forum.qubes-os.org/t/fully-ephemeral-dispvms/12030)
- [Opening all files in disposable qube](https://forum.qubes-os.org/t/opening-all-files-in-disposable-qube/4674)
- [Kicksecure Guide](https://forum.qubes-os.org/t/guide-kicksecure-for-disp-sys/13324)
- [Qubes OS installation encrypted boot and header](https://forum.qubes-os.org/t/qubes-os-installation-detached-encrypted-boot-and-header/6205)
- [Trezor Bridge in 4.1](https://forum.qubes-os.org/t/how-to-set-up-the-trezor-bridge-in-4-1/11103)
- [split-ProtonMail](https://forum.qubes-os.org/t/guide-split-protonmail-offline-send-receive-qubes-pm-bridge-vm/11096)
- [How to create an Android Qube](https://forum.qubes-os.org/t/how-to-create-an-android-qube/8467)
#### Templates
- [Windows](https://github.com/elliotkillick/qvm-create-windows-qube)
- [Minimal](https://www.qubes-os.org/doc/templates/minimal/)
#### Wiki
- [Hardened-Kernel](https://www.kicksecure.com/wiki/Hardened-kernel)
- [VM Fingerprinting](https://www.whonix.org/wiki/VM_Fingerprinting)