Qubes is a security-oriented, free and open-source operating system for personal computers that allows you to securely compartmentalize your digital life.| Qubes OS
We have published Qubes Security Bulletin (QSB) 109: Intel microcode updates. The text of this QSB and its accompanying cryptographic signatures are reproduced below, followed by a general explanation of this announcement and authentication instructions. Qubes Security Bulletin 109 ---===[ Qubes Security Bulletin 109 ]===--- 2025-08-14 Intel microcode updates User action ------------ Continue to update normally [1] in order to receive the security updates described in the "Patching" section b...| Qubes OS
We’re pleased to announce that the first release candidate (RC) for Qubes OS 4.3.0 is now available for testing. This minor release includes many new features and improvements over Qubes OS 4.2. What’s new in Qubes 4.3? Dom0 upgraded to Fedora 41 (#9402). Xen upgraded to version 4.19 (#...| Qubes OS
New Fedora 42 templates are now available for Qubes OS 4.2 in standard, minimal, and Xfce varieties. There are two ways to upgrade a template to a new Fedora release: Recommended:Install a fresh template to replace an existing one. This option is simpler for less experienced users, but it won’t preserve any modifications you’ve made to your template. After you install the new template, you’ll have to redo your desired template modifications (if any) and switch everything that was set to...| Qubes OS
We’re pleased to announce that we’re officially migrating to Read the Docs as our documentation generation and hosting platform. Our documentation source files will continue to reside in the qubes-doc Git repository with PGP-signed tags and commits, and the live documentation published ...| Qubes OS
Qubes is a security-oriented, free and open-source operating system for personal computers that allows you to securely compartmentalize your digital life.| Qubes OS
You can now purchase on-site tickets to attend Qubes OS Summit 2025 in person! Please note that a limited number of on-site tickets are available, and tickets are more heavily discounted the earlier they’re purchased. For those who would prefer to participate remotely instead, the event will be broadcast live on YouTube, where anyone can watch with no ticket required. We’ll also use Jitsi for remote attendees who wish to participate actively without using YouTube (including remote speaker...| Qubes OS
The Xen Project has released one or more Xen security advisories (XSAs). The security of Qubes OS is affected. XSAs that DO affect the security of Qubes OS The following XSAs do affect the security of Qubes OS: XSA-471See QSB-108 XSAs that DO NOT affect the security of Qubes OS The following XSAs do not affect the security of Qubes OS, and no user action is necessary: (none) About this announcement Qubes OS uses the Xen hypervisor as part of its architecture. When the Xen Project publicly dis...| Qubes OS
We have published Qubes Security Bulletin (QSB) 108: Transitive Scheduler Attacks (XSA-471). The text of this QSB and its accompanying cryptographic signatures are reproduced below, followed by a general explanation of this announcement and authentication instructions. Qubes Security Bulletin 108 ---===[ Qubes Security Bulletin 108 ]===--- 2025-07-08 Transitive Scheduler Attacks (XSA-471) Changelog ---------- 2025-07-08: Original QSB 2025-07-11: Revise language User action ------------ Contin...| Qubes OS
The Qubes OS Project and 3mdeb are excited to announce the upcoming Qubes OS Summit 2025! This event will be an incredible opportunity for the community to come together, share knowledge, and discuss the future of secure computing. Event Details: Date: Fri, Sep 26, 2025 10:00 AM – Sun, ...| Qubes OS
The Xen Project has released one or more Xen security advisories (XSAs). The security of Qubes OS is not affected. XSAs that DO affect the security of Qubes OS The following XSAs do affect the security of Qubes OS: (none) XSAs that DO NOT affect the security of Qubes OS The following XS...| Qubes OS
We have published Qubes Canary 043. The text of this canary and its accompanying cryptographic signatures are reproduced below. For an explanation of this announcement and instructions for authenticating this canary, please see the end of this announcement. Qubes Canary 043 ---===[ Qube...| Qubes OS
The Qubes OS Project uses digital signatures to guarantee the authenticity and integrity of certain important assets. This page explains how to verify those signatures. It is extremely important for your security to understand and apply these practices. What digital signatures can and c...| Qubes OS
The Qubes security pack (qubes-secpack) is a Git repository that contains: Qubes security bulletins (QSBs) Qubes canaries Qubes ISO cryptographic hash values Qubes fund information Qubes PGP keys Security-related information and announcements (e.g., key revocations) While qubes-secpack ...| Qubes OS
This page is about updating your system while staying on the same supported version of Qubes OS. If you’re instead looking to upgrade from your current version of Qubes OS to a newer version, see Upgrade guides. It is important to keep your Qubes OS system up-to-date to ensure you have ...| Qubes OS
Testing new Qubes OS releases and updates is one of the most helpful ways in which you can contribute to the Qubes OS Project. If you’re interested in helping with this, please join the testing team. There are several different types of testing, which we’ll cover below. Warning: Softwar...| Qubes OS
This page provides a central hub for topics pertaining to the security of the Qubes OS Project. For topics pertaining to software security within Qubes OS, see security in Qubes. The following is a list of important project security pages: Qubes security pack (qubes-secpack) Qubes secur...| Qubes OS
Since the Qubes R3.1 release we have included the Salt (also called SaltStack) management engine in dom0 as default (with some states already configured). Salt allows administrators to easily configure their systems. In this guide we will show how it is set up and how you can modify it ...| Qubes OS
In Getting Started, we covered the distinction in Qubes OS between where you install your software and where you run your software. Your software is installed in templates. Each template shares its root filesystem (i.e., all of its programs and system files) with all the qubes based on ...| Qubes OS
Qubes is a security-oriented, free and open-source operating system for personal computers that allows you to securely compartmentalize your digital life.| Qubes OS
Qubes is a security-oriented, free and open-source operating system for personal computers that allows you to securely compartmentalize your digital life.| Qubes OS