{{Header}} {{hide_all_banners}} {{Title|title=
{{q_project_name_long}} Overview
}} {{#seo:
|description={{q_project_name_short}} -- Advanced Security and Anonymity
|image=Qubes-logo-icon.png
}}
{{qubes_mininav}}
{{ThumbGallery|
[[File:Qubes-logo-icon.png|Qubes Logo|150px|thumb]]
[[File:{{project_name_short}}-logo-text.svg|Whonix Logo|150px|thumb]]
}}
{{intro
|thumb=Qubes-logo-icon.png
|{{q_project_name_short}} is the seamless combination of [https://www.qubes-os.org Qubes OS] and [https://www.whonix.org {{project_name_long}}] for advanced security and anonymity.
}}
= Overview =
{{#widget:Download_Button
|text=Download Qubes-Whonix (FREE!)
|url=Qubes/Install
|os=qubes
}}
In this configuration {{project_name_short}} runs on top of Qubes inside virtual machines (VMs), just like any other OS on the same platform (Fedora, Debian, Arch Linux and so on).
The Qubes bare-metal hypervisor is based on [https://www.xenproject.org Xen] and [https://getfedora.org Fedora]. Via hardware support like [https://en.wikipedia.org/wiki/X86_virtualization#Intel_virtualization_(VT-x) VT-x] and [https://en.wikipedia.org/wiki/X86_virtualization#I/O_MMU_virtualization_(AMD-Vi_and_Intel_VT-d) VT-d] Qubes has successfully implemented a comprehensive yet strict security-by-isolation architecture. Hardware controllers and multiple user domains (qubes) are isolated using separate VMs that are explicitly assigned different levels of trust, yet the desktop experience is user-friendly and well-integrated.
{{project_name_short}} is based on [https://www.debian.org Debian] and [https://www.torproject.org Tor]. The design provides a two-VM, split security architecture: an isolated [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] (ProxyVM; {{project_name_gateway_vm}}
) for complete routing of traffic over Tor; and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] (App Qube; {{project_name_workstation_vm}}
) for all desktop applications, which serves as a tailored OS environment for Tor-based privacy/anonymity.
To use [[Qubes|{{q_project_name_short}}]], Qubes must first be installed as a hypervisor on the physical host computer, followed by installation of the two separate {{project_name_short}} Templates -- {{project_name_gateway_template}}
and {{project_name_workstation_template}}
-- on top of Qubes. From this point, the {{project_name_short}} Templates can be used for customization and creation of multiple {{project_name_gateway_short}} ProxyVMs and {{project_name_workstation_short}} AppVMs, enabling enhanced compartmentalization of user activities for better privacy. The only limitation on the number of possible VMs is available disk space.
For a more in-depth consideration of {{q_project_name_short}} advantages, see: [[Qubes/Why_use_Qubes_over_other_Virtualizers|Why use Qubes over other Virtualizers?]]
[https://forums.whonix.org/t/qubes-whonix-security-disadvantages-help-wanted/8581 Qubes-Whonix Security Disadvantages - Help Wanted!]
'''Figure:''' ''Qubes OS Design'' https://www.qubes-os.org/intro/
[[File:Qubesosoverviewv2.png|border]]
= Guides =
== Common Tasks ==
For major Template and AppVM operations, refer to the following guides:
qvm-tags
] which will result in [https://forums.whonix.org/t/qubes-os-4-1-denied-whonix-newstatus-dom0-permission/12954 Denied: whonix.NewStatus
dom0 notifications]
* [[Qubes/Troubleshooting|{{q_project_name_short}} Tor Connectivity and sdwdate Troubleshooting]]