Qubes 4.0.2 OS update using virtualization for application isolation

A year since the last release ΠΎΠΏΡƒΠ±Π»ΠΈΠΊΠΎΠ²Π°Π½ΠΎ operating system update Qubes 4.0.2, implementing the idea of ​​using a hypervisor for strict isolation of applications and OS components (each class of applications and system services run in separate virtual machines). For loading prepared by 4.6 GB installation image. For work subscription is required a system with 4 GB of RAM and a 64-bit Intel or AMD CPU with support for VT-x with EPT/AMD-v with RVI and VT-d/AMD IOMMU technologies, preferably an Intel GPU (NVIDIA and AMD GPUs are not well tested).

Applications in Qubes are divided into classes depending on the importance of the data being processed and the tasks to be solved, each class of applications, as well as system services (network subsystem, work with storage, etc.). When the user launches an application from the menu, the application starts in a specific virtual machine that runs a separate X server, a lightweight window manager, and a stub video driver that translates output to the control environment in composite mode. At the same time, applications are seamlessly available within the same desktop and are highlighted for clarity with different window frame colors. Each environment has read access to the underlying root FS and local storage that does not overlap with the storage of other environments. The user shell is based on Xfce.

In the new release, the versions of the programs that form the basic system environment (dom0) are updated, including the transition to the Linux kernel 4.19 (previously the 4.14 kernel was used). Templates
to create virtual environments, updated to Fedora 30, Debian 10 and Whonix 15.

Source: opennet.ru

Add a comment