Jump to: navigation, search

Qubes/Why use Qubes over other Virtualizers

Why use Qubes over other Virtualizers?[edit]

  • Security
    • Network stack, WiFi drivers are running in a dedicated network VM, which reduces attack surface.
    • Qubes actively discourages using the host (dom0) for any other purposes than running VMs.
    • No networking on the host (dom0). Even the download part of fetching host (dom0) upgrades is done in a dedicated UpdateVM (currently by default NetVM), before those are verified and installed on dom0.
    • DisposableVMs [1]
    • Joanna Rutkowska, security researcher, developer of Qubes OS made a security comparison about software compartmentalization vs. physical separation (pdf), that concluded, that in some cases, notably for specific, desktop-related workflows, Physical Isolation might be less secure sometimes than Qubes (software compartmentalization) approach.
    • Multiple Whonix-Workstations AppVMs can easily use the same Whonix-Gateway ProxyVM without being able to contact each other. [2]
  • Usability
    • Usable, secure clipboard and files copy and paste.
    • Easier backup / restore of VMs.
    • Keyboard layout only needs to be configured once in dom0.
    • No duplicate task bars.
    • Default seamless mode for windows. (Similar to VirtualBox’s Seamless Mode or VMware’s Unity Mode. [3]) Yet, distinction of which window comes from what VM is easily possible. [4]
  • Performance
    • VMs start up much faster, because fewer services need to be started.
    • AppVMs therefore also take much less RAM.
    • AppVMs take much fewer disk space, because those can share the root image of the TemplateVM. (Read more: TemplateImplementation)

Qubes-Whonix advantages over Non-Qubes-Whonix[edit]


  1. There are no disposable Whonix VMs yet, but Qubes encourages using regular / DisposableVMs.
  2. This issue for non-Qubes-Whonix is documented on the Multiple Whonix-Workstations wiki page.
  3. http://www.howtogeek.com/171145/use-virtualboxs-seamless-mode-or-vmwares-unity-mode-to-seamlessly-run-programs-from-a-virtual-machine/
  4. https://www.qubes-os.org/doc/GettingStarted/
  5. [[Post_Install_Advice#Network_Time_Syncing|]
  6. https://phabricator.whonix.org/T71
  7. Whonix VirtualBox issues: VLC / Video Player Crash
  8. Whonix KVM Video issue: https://www.whonix.org/old-forum/index.php/topic,1768.0.html
  9. Whonix VirtualBox: You have duplicate sound settings withing VMs.
  10. Whonix KVM: https://www.whonix.org/old-forum/index.php/topic,1767.0.html

Random News:

Interested in becoming author for Whonix blog? Writing about anonymity/privacy/security? Get in touch!

Impressum | Datenschutz | Haftungsausschluss

https | (forcing) onion
Share: Twitter | Facebook | Google+
This is a wiki. Want to improve this page? Help welcome, volunteer contributions are happily considered! See Conditions for Contributions to Whonix, then Edit! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation. Whonix (g+) is a licensee of the Open Invention Network. Unless otherwise noted above, content of this page is copyrighted and licensed under the same Free (as in speech) license as Whonix itself.