Quick Look at Qubes OS 4.1.0 - Based on Debian, Fedora and Whonix
In This Video We Are Discussing About Andrew David Wong has announced the release of Qubes OS 4.1.0, a major new update from the project that focuses on Linux operating system security by isolating computing tasks into separate "qubes". This version brings a variety of improvements, bug fixes and component updates.
► Subscribe me here : https://bit.ly/3dI03ff
► Follow me on Tumblr : https://www.tumblr.com/blog/runboxing
► Follow me on Twitter : https://twitter.com/Runboxing1
► Follow me on Pinterest : https://www.pinterest.com/Runboxing1/
Quick Look at Qubes OS 4.1.0 - Based on Debian, Fedora and Whonix
Click Here to Watch More Entertainment :
► Linux Videos : https://bit.ly/2Teia2U
► Buyer Guide Videos : https://bit.ly/35cUaTK
► Raspberry pi Videos : https://bit.ly/3jgfaxQ
► Review Videos : https://bit.ly/2HeIuYo
► Mozilla Videos : https://bit.ly/2IOi3JG
► Vpn Videos : https://bit.ly/3m3V23B
► Ipad Videos : https://bit.ly/34guh6d
► Mac Os Videos : https://bit.ly/37mPrBx
——Subscribe to stay up to date with the channel! ——
Make sure to subscribe to the channel & select the 🔔bell push notifications (click the 🔔BELL icon next to the subscribe button) to be notified immediately when I release a new video.
✅ BE SURE TO LIKE, SUBSCRIBE, AND TURN ON NOTIFICATIONS!!!
If you watched this video and scrolled to the bottom and are reading this I would love to hear from you.
If you have any questions give me a shout on social media & I'll try and answer all the questions you might have.
Thanks for watching and I’ll see you next time!
"At long last, the Qubes 4.1.0 stable release has arrived. The culmination of years of development, this release brings a host of new features, major improvements and numerous bug fixes. The GUI domain is a qube separate from dom0 that handles all display-related tasks and some system management. This separation allows us to more securely isolate dom0 while granting the user more flexibility with respect to graphical interfaces. Qrexec is is an RPC (remote procedure call) mechanism that allows one qube to do something inside another qube. The qrexec policy system enforces 'who can do what and where.' Qubes 4.1 brings a new qrexec policy format, significant performance improvements, support for socket services and policy notifications that make it easier to detect problems."
:: More ::
The fourth release candidate is Qubes OS , a Fedora-based, fully security-focused desktop GNU/Linux distribution announced on January 18, 2022 .The new stable version of 4.1.0, which aims to provide security with strong isolation, was announced by Andrew David Wong. This release brings various improvements, bug fixes and component updates. Finally, Wong said that the stable version of Qubes 4.1.0 has arrived; He stated that this release, the culmination of years of development, brings a host of new features, major improvements and numerous bug fixes. While the GUI domain comes as a separate qube from dom0, which handles all screen-related tasks and some system administration, this separation is said to give the user more flexibility than graphical interfaces. It is stated that Qubes OS 4.1.0 brings a new qrexec policy format that makes it easier to detect problems, significant performance improvements, socket services support and policy notifications.
Qubes OS 4.1.0 released with GUI Qube
Qubes OS is a Linux distribution designed for increased security. Chief developer and security researcher Joanna Rutkowska starts from the premise that with the millions of lines of code and instructions in today's applications, there can be no perfectly error-free desktop user environment and describes Qubes OS as a "reasonably secure operating system". Years ago, Edward Snowden ennobled the system on Twitter when he said nobody did VM isolation better than Qubes OS.
With Qubes OS, the concept for an operating system that is as secure as possible is the subdivision of different areas and applications into virtual machines created by Xen and isolated from one another, which are referred to as Qubes. The user uses guidelines to determine who is allowed to do what with whom.
Fedora 32 as a base
Released nearly four years of development after the release of Qubes OS 4.0 , Qubes OS 4.1.0 is based in dom0 on Fedora 32, with templates for Fedora 34, Debian 11 and Gentoo available. Packages for the Debian template are only installed if they can be proven to be reproducible . Last but not least, there are new templates for Whonix 16 Gateway and Workstation.
GUI in its own Qube
Linux 5.10 is used as the kernel. The biggest change is probably the new domain for the GUI . It is a separate VM from dom0 that handles all GUI and some system administration tasks.
#Qubes #QubesOS #Debian #Fedora #Whonix
Todays Video - Qubes OS 4.1.0 announced!